Intrusion detection and protection
Members
Description
Systems and users are very vulnerable to attacks of different typology and impact: virus, trojans, ransomware, spyware, data leakage, etc. This way, a principal topic addressed by NESG is that of protecting network environments by means of two subsequent procedures: detection of malicious behaviors, and adoption of countermeasures.
For that, specific research lines are:
- - Behavior modeling and classification (multivariate, HMM, clustering, SVM, GA, ...)
- - Anomaly detection
- - Malware detection and classification
- - Countermeasures and response mechanisms
Publications
-
Goméz Hernández, J. A., Sánchez-Fernández, R. & García-Teodoro, P. (2021). Inhibiting crypto-ransomware on windows platforms through a honeyfile-based approach with R-Locker. IET Information Security, , 1-11. [More]
-
Goméz Hernández, J. A., Camacho, J., Holgado-Terriza, J. A., García-Teodoro, P. & Maciá-Fernández, G. (2021). ARANAC: A Bring-Your-Own-Permissions Network Access Control Methodology for Android Devices. IEEE Access, 9, 101321-101334,. [More]
-
Goméz Hernández, J. A., García-Teodoro, P., Holgado-Terriza, J. A., Maciá-Fernández, G., Camacho, J. & Noguera-Comino, J. M (2021). Monitoring Android Communications for Security. In IEEE INFOCOM 2021 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pages 1-2. IEEE. [More]
-
Goméz Hernández, J. A., García-Teodoro, P., Holgado-Terriza, J. A., Maciá-Fernández, G., Camacho, J. & Robles Carrillo, M (2021). AMon: A Monitoring Multidimensional Feature Application to Secure Android Environments. In Security, I. & (SPW)P), P. W. (editors), pages 31-36. IEEE. [More]
-
Sebé, J. M. () (2021). Lı́neas de Defensa y Seguridad en Redes ad hoc: un Estudio Sistemático. In Sebé, J. M. (editor), Actas de la XVI Reunión Española sobre Criptologı́a y Seguridad de la Información (RECSI). [More]
Projects