Diseño de Red Bayesiana para tomar decisiones proactivas frente a ataques de secuestro de datos dentro de Pymes prestadoras de servicios
| dc.contributor.author | Rey Sepulveda, Yeison Alexander | |
| dc.contributor.author | Gomez Bautista, Fabian Andrés | |
| dc.contributor.cvlac | Gomez Bautista, Fabian Andrés [0000155175] | spa |
| dc.contributor.researchgate | Gomez Bautista, Fabian Andrés [Fabian-Gomez-Bautista] | spa |
| dc.contributor.researchgroup | Semilleros de Investigación UNAB | spa |
| dc.coverage.campus | UNAB Campus Bucaramanga | spa |
| dc.coverage.spatial | Bucaramanga (Santander, Colombia) | spa |
| dc.coverage.temporal | 2019 | spa |
| dc.date.accessioned | 2023-10-18T22:01:59Z | |
| dc.date.available | 2023-10-18T22:01:59Z | |
| dc.date.issued | 2019-11 | |
| dc.description.abstract | En este documento se detallan las indicaciones básicas a seguir para la presentación de trabajos de investigación al VI Encuentro de Semilleros de Investigación UNAB. En este documento se detalla la investigación realizada para la presentación de trabajo de investigación de Semilleros de Investigación UNAB con el fin de diseñar el modelo de una red bayesiana para predecir ataques informáticos de secuestro de datos en pymes prestadoras de servicios con el fin de promover la toma de decisiones proactivas dentro de estas organizaciones. | spa |
| dc.description.abstractenglish | In this paper, we detailed the investigation made for the presentation of an investigation work from Semilleros de Investigación UNAB with the enphasis on designing the model of a Bayesian Netowrk to predict ransomware attacks on Pymes Service Providers in order promote the proactive decision regard security information inside this organizations. | spa |
| dc.description.learningmodality | Modalidad Presencial | spa |
| dc.format.mimetype | application/pdf | spa |
| dc.identifier.instname | instname:Universidad Autónoma de Bucaramanga - UNAB | spa |
| dc.identifier.issn | ISSN 2344-7079 | spa |
| dc.identifier.reponame | reponame:Repositorio Institucional UNAB | spa |
| dc.identifier.repourl | repourl:https://repository.unab.edu.co | spa |
| dc.identifier.uri | http://hdl.handle.net/20.500.12749/22330 | |
| dc.language.iso | spa | spa |
| dc.publisher.deparment | Sistema de Investigación SIUNAB | spa |
| dc.publisher.faculty | Facultad Ingeniería | |
| dc.publisher.grantor | Universidad Autónoma de Bucaramanga UNAB | spa |
| dc.publisher.program | Pregrado Ingeniería de Sistemas | |
| dc.relation.ispartofseries | Generación Creativa : Encuentro de Semilleros de Investigación UNAB | spa |
| dc.relation.references | [1] Barbosa, S. (2010). Bayes Networks and Markov Random Files. Retrieved from https://www.yumpu.com/en/document/read/18745646/lesso n-5-bayes-networks-and-markov-random-fields-infocom | spa |
| dc.relation.references | [2] CCN-CERT. (2018). Medidas de seguridad contra ransomware. Retrieved from https://www.ccn- cert.cni.es/informes/informes-ccn-cert-publicos/2877-ccncert-ia-11-18-medidas-de-seguridad-contraransomware/file.html | spa |
| dc.relation.references | [3] Chockalingam, S., Pieters, W., Teixeira, A., & van Gelder, P. (2017). Bayesian Network Models in Cyber Security: A Systematic Review (pp. 105–122). https://doi.org/10.1007/978-3-319-70290-2_7 | spa |
| dc.relation.references | [4] Clark, D. D., Pogran, K. T., & Reed, D. P. (1978). An introduction to local area networks. Proceedings of the IEEE, 66(11), 1497–1517. https://doi.org/10.1109/PROC.1978.11152 | spa |
| dc.relation.references | [5] CONPES 3854. (2016). Política Nacional de Seguridad Digital. | spa |
| dc.relation.references | [6] DNP. (2015). La clasificación por tamaño empresarial en Colombia: Historia y limitaciones para una propuesta. Retrieved from https://colaboracion.dnp.gov.co/CDT/Estudios Econmicos/434.pdf | spa |
| dc.relation.references | [7] ESET. (2017a). RoT: el ransomware de las cosas, en detalle. We Live Security. Retrieved from https://www.welivesecurity.com/laes/2017/02/03/ransomware-de-las-cosas/ | spa |
| dc.relation.references | [8] ESET. (2017b). Security Report Latinoamérica 2017 | spa |
| dc.relation.references | [9] ESET. (2018a). ESET Security Report Latinoamérica 2018 (Vol. 1). Argentina. Retrieved from https://www.welivesecurity.com/la-es/2018/06/19/esetsecurity-report-2018-el-estado-de-la-seguridad-de-lainformacion-en-las-empresas-de-la-region/ | spa |
| dc.relation.references | [10] ESET. (2018b). Lejos de desaparecer, el ransomware se reinventa. Argentina. Retrieved from https://register.gotowebinar.com/recording/3775545201697 720066 | spa |
| dc.relation.references | [11] Garcia, P., & Santos, I. (2010). Bayesian Networks for Network Intrusion Detection. In Bayesian Network. Sciyo. https://doi.org/10.5772/10069 | spa |
| dc.relation.references | [12] Heikkila, M., Rattya, A., Pieska, S., & Jamsa, J. (2016). Security challenges in small- and medium-sized manufacturing enterprises. In 2016 International Symposium on Small-scale Intelligent Manufacturing Systems (SIMS) (pp. 25–30). IEEE. https://doi.org/10.1109/SIMS.2016.7802895 | spa |
| dc.relation.references | [13] Hsiao, S.-C., & Kao, D.-Y. (2018). The static analysis of WannaCry ransomware. In 2018 20th International Conference on Advanced Communication Technology (ICACT). IEEE. https://doi.org/10.23919/ICACT.2018.8323679 | spa |
| dc.relation.references | [14] IEEE Computer Society. (1998). 802.3-1985 - IEEE Standards for Local Area Networks: Carrier Sense Multiple Access with Collision Detection (CSMA/CD) Access Method and Physical Layer Specifications. https://doi.org/10.1109/IEEESTD.1984.7508550 | spa |
| dc.relation.references | [15] IEEE Computer Society. (2017). 802.3-2015/Cor 1-2017 - IEEE Standard for Ethernet - Corrigendum 1: Multi-lane Timestamping. https://doi.org/10.1109/IEEESTD.2017.7907155 | spa |
| dc.relation.references | [16] ITU. (2011). Ciberseguridad. Actualidades de La UIT, 9, 20– 22. Retrieved from https://www.itu.int/net/itunews/issues/2011/05/38-es.aspx | spa |
| dc.relation.references | [17] Jabbar, M. A., Aluvalu, R., & Satyanarayana Reddy, S. S. (2017). Intrusion Detection System Using Bayesian Network and Feature Subset Selection. In 2017 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC) (pp. 1–5). IEEE. https://doi.org/10.1109/ICCIC.2017.8524381 | spa |
| dc.relation.references | [18] Kao, D.-Y., & Hsiao, S.-C. (2018). The dynamic analysis of WannaCry ransomware. In 2018 20th International Conference on Advanced Communication Technology (ICACT). IEEE. https://doi.org/10.23919/ICACT.2018.8323681 | spa |
| dc.relation.references | [19] Ministerio de Tecnologías de la Información y las Comunicaciones. (2017). Impacto de los incidentes de seguridad digital en Colombia 2017 . https://doi.org/10.18235/0000843 | spa |
| dc.relation.references | [20] Okutan, A., Yang, S. J., & McConky, K. (2017). Predicting cyber attacks with bayesian networks using unconventional signals. In Proceedings of the 12th Annual Conference on Cyber and Information Security Research - CISRC ’17 (pp. 1–4). New York, New York, USA: ACM Press. https://doi.org/10.1145/3064814.3064823 | spa |
| dc.relation.references | [21] Peñuela Vasquez, Y. D. (2018). Análisis e identificacióndel estado actual de la seguridad informática dirigido a las organizaciones en Colombia, que brinde un diagnóstico general sobre la importancia y medidas necesarias para proteger el activo de la información. Retrieved from https://repository.unad.edu.co/bitstream/10596/17260/1/35 254395.pdf | spa |
| dc.relation.references | [22] Roohparvar, R. (2018). 3 Reasons why cybersecurity is more important that ever. Retrieved from http://www.infoguardsecurity.com/3-reasons-whycybersecurity-is-more-important-than-ever/ | spa |
| dc.relation.references | [24] Song, J., Takakura, H., Okabe, Y., Eto, M., Inoue, D., & Nakao, K. (2011). Statistical analysis of honeypot data and building of Kyoto 2006+ dataset for NIDS evaluation. In Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security - BADGERS ’11 (pp. 29–36). New York, New York, USA: ACM Press. https://doi.org/10.1145/1978672.1978676 | spa |
| dc.relation.references | [25] Sucar, L. E. (2006). Redes Bayesianas. Retrieved from https://ccc.inaoep.mx/~esucar/Clases-mgp/caprb.pdf | spa |
| dc.relation.references | [26] Tanasache, F. D., Sorella, M., Bonomi, S., Rapone, R., & Meacci, D. (2019). Building an emulation environment for cyber security analyses of complex networked systems. In Proceedings of the 20th International Conference on Distributed Computing and Networking - ICDCN ’19. New York, New York, USA: ACM Press. https://doi.org/10.1145/3288599.3288618 | spa |
| dc.relation.references | [27] Thomas Bayes. (1763). Bayes Theorem. In An essay towards solving a problem in the doctrine of chances, Philosophical (pp. 370–418). | spa |
| dc.relation.references | [28] Xie, P., Ou, X., Levy, R., Li, J. H., & Liu, P. (2010). Using Bayesian Networks for Cyber Security Analysis. https://doi.org/https://doi.org/10.1109/DSN.2010.5544924 | spa |
| dc.relation.references | [29] Zimba, A., Wang, Z., & Chen, H. (2017). Reasoning crypto ransomware infection vectors with Bayesian networks. In 2017 IEEE International Conference on Intelligence and Security Informatics (ISI) (pp. 149–151). IEEE. https://doi.org/10.1109/ISI.2017.8004894 | spa |
| dc.relation.references | [30] Zuech, R., Khoshgoftaar, T. M., Seliya, N., Najafabadi, M. M., & Kemp, C. (2015). A New Intrusion Detection Benchmarking System. Retrieved from https://www.aaai.org/ocs/index.php/FLAIRS/FLAIRS15/pa per/viewFile/10368/103 | spa |
| dc.relation.uri | http://hdl.handle.net/20.500.12749/14243 | |
| dc.rights.accessrights | info:eu-repo/semantics/openAccess | spa |
| dc.rights.creativecommons | Atribución-NoComercial-SinDerivadas 2.5 Colombia | * |
| dc.rights.local | Abierto (Texto Completo) | spa |
| dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/2.5/co/ | * |
| dc.source | Rey, Y. A. & Gomez, F. A. (2019). Diseño de Red Bayesiana para tomar decisiones proactivas frente a ataques de secuestro de datos dentro de Pymes prestadoras de servicios. Recuperado de: http://hdl.handle.net/20.500.12749/22330 | spa |
| dc.subject.keywords | Informatics engineering | spa |
| dc.subject.keywords | Informatic security | spa |
| dc.subject.keywords | Industry | spa |
| dc.subject.keywords | Investigation | spa |
| dc.subject.keywords | Innovation | spa |
| dc.subject.keywords | Infrastructure | spa |
| dc.subject.keywords | SMEs providing services | spa |
| dc.subject.keywords | Data theft | spa |
| dc.subject.lemb | Ingeniería informática | spa |
| dc.subject.lemb | Seguridad informática | spa |
| dc.subject.lemb | Industria | spa |
| dc.subject.lemb | Investigación | spa |
| dc.subject.proposal | Innovación | spa |
| dc.subject.proposal | Infraestructura | spa |
| dc.subject.proposal | Pymes prestadoras de servicios | spa |
| dc.subject.proposal | Robo de datos | spa |
| dc.title | Diseño de Red Bayesiana para tomar decisiones proactivas frente a ataques de secuestro de datos dentro de Pymes prestadoras de servicios | spa |
| dc.title.translated | Bayesian Network Design to Make Proactive Decisions against data hijacking attacks within SMEs service providers | spa |
| dc.type | Conference | eng |
| dc.type.coar | http://purl.org/coar/resource_type/c_f744 | |
| dc.type.coarversion | http://purl.org/coar/version/c_ab4af688f83e57aa | spa |
| dc.type.driver | info:eu-repo/semantics/conferenceProceedings | spa |
| dc.type.hasversion | info:eu-repo/semantics/acceptedVersion | spa |
| dc.type.local | Memoria de eventos | spa |
| dc.type.redcol | http://purl.org/redcol/resource_type/EC_AC |
Archivos
Bloque original
1 - 1 de 1
Cargando...
- Nombre:
- 2019_Articulo_Gomez_Bautista_Fabian_Andres.pdf
- Tamaño:
- 279.54 KB
- Formato:
- Adobe Portable Document Format
- Descripción:
- Artículo
Bloque de licencias
1 - 1 de 1
Cargando...
- Nombre:
- license.txt
- Tamaño:
- 829 B
- Formato:
- Item-specific license agreed upon to submission
- Descripción:
