The number of attacks on government websites has escalated in the last years. In order to assist in the detection process conducted by cybersecurity analysts, this document suggests implementing machine learning techniques over web server access logs. The overall objective is to optimize the detection time using a customized classifier which selects traces corresponding to anomalous activity. Specifically, web server combined log format (CLF) access logs coded as real vectors are an input to a weighted K-NN nearest neighbors’ model. The methodology was tested on datasets and premises provided by the CERTuy (National Cybersecurity Event Response Team) and the SOC (Security Operations Center). According to evaluations 82% of cybersecurity off...
By means of the proposed objective; to visualize the main characteristics and methods of compu...
El objetivo de este trabajo de fin de grado es explicar la importancia de la seguridad informática e...
Social networks, shopping websites, discussion forums or access to any type of information and conte...
The number of attacks on government websites has escalated in the last years. In order to assist in ...
Cyber attribution is a fundamental part of a State's cyber defense. The task of assigning someone ...
Los ataques a los sistemas siguen incrementándose día a día, el mayor conocimiento tanto de las herr...
En la actualidad prácticamente todo el mundo conoce Internet y dispone de él en casa, o en su empres...
Esta investigación tuvo como objetivo diseñar una solución para la toma de decisiones mediante Intel...
El análisis forense en redes se basa en la captura, almacenamiento y análisis de eventos de una red ...
El ataque de Denegación de Servicios Distribuidos (DDoS) es uno de los ciberataques más peligrosos e...
Cyber-attacks to websites are increasing steadily affecting the integrity and availability of inform...
The continuous reports of security vulnerabilities and new ways to have access to privileged resourc...
tareas, realizar negocios online, entre otras actividades; sin embargo en la mayoría de adelantos de...
The purpose of this research was to determine the most common key cyber-attack techniques to conside...
Cybercrime statistics about destructive malware, botnets anddenial of services attacks, show that we...
By means of the proposed objective; to visualize the main characteristics and methods of compu...
El objetivo de este trabajo de fin de grado es explicar la importancia de la seguridad informática e...
Social networks, shopping websites, discussion forums or access to any type of information and conte...
The number of attacks on government websites has escalated in the last years. In order to assist in ...
Cyber attribution is a fundamental part of a State's cyber defense. The task of assigning someone ...
Los ataques a los sistemas siguen incrementándose día a día, el mayor conocimiento tanto de las herr...
En la actualidad prácticamente todo el mundo conoce Internet y dispone de él en casa, o en su empres...
Esta investigación tuvo como objetivo diseñar una solución para la toma de decisiones mediante Intel...
El análisis forense en redes se basa en la captura, almacenamiento y análisis de eventos de una red ...
El ataque de Denegación de Servicios Distribuidos (DDoS) es uno de los ciberataques más peligrosos e...
Cyber-attacks to websites are increasing steadily affecting the integrity and availability of inform...
The continuous reports of security vulnerabilities and new ways to have access to privileged resourc...
tareas, realizar negocios online, entre otras actividades; sin embargo en la mayoría de adelantos de...
The purpose of this research was to determine the most common key cyber-attack techniques to conside...
Cybercrime statistics about destructive malware, botnets anddenial of services attacks, show that we...
By means of the proposed objective; to visualize the main characteristics and methods of compu...
El objetivo de este trabajo de fin de grado es explicar la importancia de la seguridad informática e...
Social networks, shopping websites, discussion forums or access to any type of information and conte...