Mostrar el registro sencillo del ítem

dc.contributorEscuela de Ingenierias Industrial, Informática y Aeroespaciales_ES
dc.contributor.authorCampazas Vega, Adrián 
dc.contributor.authorCrespo Martínez, Ignacio Samuel 
dc.contributor.authorGuerrero Higueras, Ángel Manuel 
dc.contributor.authorFernández Llamas, Camino 
dc.contributor.otherArquitectura y Tecnologia de Computadoreses_ES
dc.date2020-12-18
dc.date.accessioned2024-03-19T13:08:23Z
dc.date.available2024-03-19T13:08:23Z
dc.identifier.citationCampazas-Vega, A., Crespo-Martínez, I. S., Guerrero-Higueras, Á. M., and Fernández-Llamas, C. (2020). Flow-data gathering using netflow sensors for fitting malicious-traffic detection models. Sensors (Switzerland), 20(24), 1-13. https://doi.org/10.3390/S20247294es_ES
dc.identifier.urihttps://hdl.handle.net/10612/19087
dc.description.abstract[EN] Advanced persistent threats (APTs) are a growing concern in cybersecurity. Many companies and governments have reported incidents related to these threats. Throughout the life cycle of an APT, one of the most commonly used techniques for gaining access is network attacks. Tools based on machine learning are effective in detecting these attacks. However, researchers usually have problems with finding suitable datasets for fitting their models. The problem is even harder when flow data are required. In this paper, we describe a framework to gather flow datasets using a NetFlow sensor. We also present the Docker-based framework for gathering netflow data (DOROTHEA), a Docker-based solution implementing the above framework. This tool aims to easily generate taggable network traffic to build suitable datasets for fitting classification models. In order to demonstrate that datasets gathered with DOROTHEA can be used for fitting classification models for malicious-traffic detection, several models were built using the model evaluator (MoEv), a general-purpose tool for training machine-learning algorithms. After carrying out the experiments, four models obtained detection rates higher than 93%, thus demonstrating the validity of the datasets gathered with the tool.es_ES
dc.languageenges_ES
dc.publisherMDPIes_ES
dc.rightsAtribución 4.0 Internacional*
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/*
dc.subjectCibernéticaes_ES
dc.subjectInformáticaes_ES
dc.subject.otherNetFlowes_ES
dc.subject.otherPacket Flowes_ES
dc.subject.otherAdvanced Persistent Threates_ES
dc.subject.otherMalicious traffices_ES
dc.subject.otherDatasetes_ES
dc.titleFlow-Data Gathering Using NetFlow Sensors for Fitting Malicious-Traffic Detection Modelses_ES
dc.typeinfo:eu-repo/semantics/articlees_ES
dc.identifier.doi10.3390/s20247294
dc.description.peerreviewedSIes_ES
dc.relation.projectIDinfo:eu-repo/grantAgreement/AEI/Programa Programa Estatal de I+D+i Orientada a los Retos de la Sociedad/RTI2018-100683-B-100/ES/DETECCION Y CARACTERIZACION AUTOMATICA DE PROBLEMAS DE CIBERSEGURIDAD EN PLATAFORMAS ROBOTICASes_ES
dc.relation.projectIDInstituto Nacional de Ciberseguridad de España (ADENDA 4: Detección de nuevas amenazas y patrones desconocidos (Red Regional de Ciencia y Tecnología)es_ES
dc.rights.accessRightsinfo:eu-repo/semantics/openAccesses_ES
dc.identifier.essn1424-8220
dc.journal.titleSensorses_ES
dc.volume.number20es_ES
dc.issue.number24es_ES
dc.page.initial7294es_ES
dc.type.hasVersioninfo:eu-repo/semantics/publishedVersiones_ES
dc.subject.unesco1207.03 Cibernéticaes_ES
dc.subject.unesco1203.17 Informáticaes_ES
dc.description.projectInstituto Nacional de Ciberseguridades_ES
dc.description.projectMinisterio de Ciencia, Innovación y Universidadeses_ES


Ficheros en el ítem

Thumbnail

Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem

Atribución 4.0 Internacional
Excepto si se señala otra cosa, la licencia del ítem se describe como Atribución 4.0 Internacional