Intrusion detection and protection
Members
Description
Systems and users are very vulnerable to attacks of different typology and impact: virus, trojans, ransomware, spyware, data leakage, etc. This way, a principal topic addressed by NESG is that of protecting network environments by means of two subsequent procedures: detection of malicious behaviors, and adoption of countermeasures.
For that, specific research lines are:
- - Behavior modeling and classification (multivariate, HMM, clustering, SVM, GA, ...)
- - Anomaly detection
- - Malware detection and classification
- - Countermeasures and response mechanisms
Publications
-
Goméz Hernández, J. A., Sánchez-Fernández, R. & García-Teodoro, P. (2021). Inhibiting crypto-ransomware on windows platforms through a honeyfile-based approach with R-Locker. IET Information Security, , 1-11. [More]
-
Goméz Hernández, J. A., Camacho, J., Holgado-Terriza, J. A., García-Teodoro, P. & Maciá-Fernández, G. (2021). ARANAC: A Bring-Your-Own-Permissions Network Access Control Methodology for Android Devices. IEEE Access, 9, 101321-101334,. [More]
-
Goméz Hernández, J. A., García-Teodoro, P., Holgado-Terriza, J. A., Maciá-Fernández, G., Camacho, J. & Noguera-Comino, J. M (2021). Monitoring Android Communications for Security. In IEEE INFOCOM 2021 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pages 1-2. IEEE. [More]
-
Goméz Hernández, J. A., García-Teodoro, P., Holgado-Terriza, J. A., Maciá-Fernández, G., Camacho, J. & Robles Carrillo, M (2021). AMon: A Monitoring Multidimensional Feature Application to Secure Android Environments. In Security, I. & (SPW)P), P. W. (editors), pages 31-36. IEEE. [More]
-
Sebé, J. M. () (2021). Lı́neas de Defensa y Seguridad en Redes ad hoc: un Estudio Sistemático. In Sebé, J. M. (editor), Actas de la XVI Reunión Española sobre Criptologı́a y Seguridad de la Información (RECSI). [More]
-
Soufiane, S., Magán-Carrión, R., Medina-Bulo, I. & Bouden, H. (2021). Preserving authentication and availability security services through Multivariate Statistical Network Monitoring. Journal of Information Security and Applications, 58, 102785. [More]
-
Ruiz-Zafra, A. & Magán-Carrión, R (2020). A Distributed Digital Object Architecture to Support Secure IoT Ecosystems. In Dorronsoro, Bernabé, Ruiz, Patricia, Torre, ., Carlos, J. et al (editors), Optimization and Learning, pages 195-205. Cham : Springer International Publishing. [More]
-
Magán-Carrión, R., Urda, D., Díaz-Cano, I. & Dorronsoro, B. (2020). Towards a Reliable Comparison and Evaluation of Network Intrusion Detection Systems Based on Machine Learning Approaches. Applied Sciences, 10(5). [More]
-
Goméz Hernández, J. A., Camacho, J., García-Teodoro, P., Maciá-Fernández, G., Robles Carrillo, M., Ropa, A. M. et al (2019). Visualización y Análisis de Tráfico Móvil para la Securización de Redes y Sistemas. In V Jornadas Nacionales de Ciberseguridad. Cáceres. [More]
-
Magán-Carrión, R. & Dorronsoro, B (2018). On the Way of Protecting MANETs Against Security Threats: A Proactive Approach. In Advances in Practical Applications of Agents, Multi-Agent Systems, and Complexity: The PAAMS Collection. [More]
-
Barragán-Gil, R., Hernández-Ardieta, J. L. & García-Teodoro, P (2018). Mapeo de Dependencias para el Impacto de Ciberataques en Misiones: Una Visión Global. In XV Reunión Nacional sobre Criptología y Seguridad de la Información, pages 201-205. [More]
-
García-Teodoro, P., Fuentes-García, N. M. & Barragán-Gil, R. (2018). Actas de la XV Reunión Española sobre Criptología y Seguridad de la Información. [More]
-
García-Giménez, J. M., Pérez-Villegas, A. & Camacho, J (2018). Extracción de Características en Big Data para la Detección de Anomalías en Ciberseguridad. In IV Jornadas Nacionales de Investigación en Ciberseguridad, JNIC 2018, pages 31-38. [More]
-
Maciá-Fernández, G., Camacho, J., Magán-Carrión, R., Fuentes-García, N. M., García-Teodoro, P. & Therón Sánchez, R. (2018). Un resumen de: UGR’16: Un nuevo conjunto de datos para la evaluación de IDS de red basados en cicloestacionariedad, IV Jornadas Nacionales de Investigación en Ciberseguridad, JNIC 2018. [More]
-
García-Teodoro, P., Camacho, J., Maciá-Fernández, G., Goméz Hernández, J. A., Robles Carrillo, M., Terriza, J. A. et al. (2018). Gestión Dinámica de Seguridad en Dispositivos Móviles. IV Jornadas Nacionales de Investigación en Ciberseguridad, JNIC 2018, , 71-72. [More]
-
Fuentes-García, N. M., Maciá-Fernández, G. & Camacho, J. (2018). Evaluation of diagnosis methods in PCA-based Multivariate Statistical Process Control. Chemometrics and Intelligent Laboratory Systems, 172, 194-210. [More]
-
Suárez-Tangil, G., Dash, S. K., García-Teodoro, P., Camacho, J. & Cavallo, L. (2018). Anomaly-based Exploratory Analysis and Detection of Exploits in Android Mediaserver. IET Information Security, 12(5), 404-413. [More]
-
Maciá-Fernández, G., Camacho, J., Magán-Carrión, R., García-Teodoro, P. & Therón Sánchez, R. (2018). Ugr'16: a new dataset for the evaluation of cyclostationarity-based network IDSs. Computer & Security, 73, 411-424. [More]
-
Goméz Hernández, J. A., Álvarez-González, L. & García-Teodoro, P. (2017). R-Locker: thwarting ransomware action through a honeyfile-based approach. Computer & Security, 73, 389-398. [More]
-
Therón Sánchez, R., Magán-Carrión, R., Camacho, J. & Maciá-Fernández, G. (2017). Network-wide intrusion detection supported by multivariate analysis and interactive visualization, Phoenix, AZ, USA, IEEE, VizSec 2017. [More]
-
Magán-Carrión, R., Camacho, J., García-Teodoro, P., Flushing, E. F. & Caro, G. A. (2017). A Dynamical Relay node placement solution for MANETs. Computer Communications, 114, 36-50. [More]
-
Magán-Carrión, R., Camacho, J., Maciá-Fernández, G. & Fuentes-García, N. M (2017). Esquema Jerárquico de Monitorización y Detección de Anomalías en Red: Aplicación Práctica. In III Jornadas Nacionales de Investigación en Ciberseguridad (JNIC). [More]
-
Maciá-Fernández, G., Camacho, J., García-Teodoro, P. & Rodríguez-Gómez, R. A (2017). A review of: Hierarchical PCA-Based Multivariate Statistical Network Monitoring for Anomaly Detection. In. [More]
-
Ruiz-Heras, A., García-Teodoro, P. & Sánchez-Casado, L (2017). A review of: ADroid: Anomaly-based detection of malicious events in Android platforms. In III Jornadas Nacionales de Investigación en Ciberseguridad (JNIC). [More]
-
Fuentes-García, N. M., Camacho, J. & Maciá-Fernández, G (2017). Defending the network. Detection and Diagnosis of Anomalies. In. [More]
-
Fuentes-García, N. M., Maciá-Fernández, G. & Camacho, J (2017). A UNIVARIATE APPROACH FOR DIAGNOSIS IN PCA-MSPC. In Scandinavian Symposium on Chemometrics (SSC15). [More]
-
Camacho, J., García-Teodoro, P. & Maciá-Fernández, G. (2017). Traffic Monitoring and Diagnosis with Multivariate Statistical Network Monitoring: A Case Study. IEEE Security & Privacy International Workshop on Traffic Measurements for Cybersecurity (WTMC 2017), . [More]
-
Maciá-Fernández, G., Camacho, J., García-Teodoro, P. & Rodríguez-Gómez, R. A (2016). Hierarchical PCA-Based Multivariate Statistical Network Monitoring for Anomaly Detection. In 8th IEEE International Workshop on Information Forensics and Security (WIFS), Abu Dhabi (UAE). [More]
-
García-Teodoro, P. & Camacho, J (2016). Detección Colaborativa Multi-nivel de Anomalías en Entornos Móviles. In Reunión Española sobre Criptología y Seguridad de la Información (RECSI 2016). [More]
-
Iturbe, M., Camacho, J., Garitano, I., Zurutuza, U. & Uribeetxeberria, R (2016). Distinguiendo entre perturbaciones de proceso e intrusiones en sistemas de control: caso de estudio con el proceso Tennessee-Eastman. In Reunión Española sobre Criptología y Seguridad de la Información (RECSI 2016). [More]
-
Magán-Carrión, R., García-Teodoro, P. & Camacho, J. (2016). Supervivencia en redes ad hoc. Mecanismos de tolerancia y reacción frente amenazas de seguridad.. Phd Thesis, Calle Periodista Rafael Gómez Montero, número 2 · E-18071 GRANADA (Spain). [More]
-
Camacho, J., Magán-Carrión, R., García-Teodoro, P. & Treinen, J. J. (2016). Networkmetrics: Multivariate Big Data Analysis in the Context of the Internet. Submitted to Journal of Chemometrics (Wiley), , 45. [More]
-
Magán-Carrión, R., Camacho, J. & García-Teodoro, P (2016). Multivariate Statistical Approach for Anomaly Detection and Lost Data Recovery in Wireless Sensor Networks. In (Extended summary) Submitted to II Jornadas Nacionales de Investigación en Ciberseguridad (JNIC2016), pages 2. [More]
-
Magán-Carrión, R., Camacho, J., García-Teodoro, P., Feo Flushing, E. & Di Caro, G. A (2016). DRNS: Dynamical Relay Node placement Solution.. In Accepted in 14th International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS). [More]
-
Magán-Carrión, R., Rodríguez-Gómez, R. A., Camacho, J. & García-Teodoro, P. (2016). Optimal Relay Placement in Multi-Hop Wireless Networks. Ad Hoc Networks (Elsevier), 46, 23-36. [More]
-
Molina, J. M. (2015). Integración de soluciones de seguridad en redes MANET con NETA. Master Thesis. [More]
-
Casado, L. S., Maciá-Fernández, G., García-Teodoro, P. & Magán-Carrión, R. (2015). A Model of Data Forwarding in MANETs for Lightweight Detection of Malicious Packet Dropping. Computer Networks (Elsevier), 87, 44-58. [More]
-
Magán-Carrión, R., Camacho, J. & García-Teodoro, P. (2015). Multivariate Statistical Approach for Anomaly Detection and Lost Data Recovery in Wireless Sensor Networks. International Journal of Distributed Sensor Networks, 2015, 1-20. [More]
-
Magán-Carrión, R., Camacho, J. & García-Teodoro, P (2014). A Multiagent Self-healing System against Security Incidents in MANETs. In Workshop on Active Security through Multi-Agent Systems (WASMAS), 12th International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS 2014), pages 321-332. Springer International Publishing. [More]
-
Casado, L. S., Magán-Carrión, R., García-Teodoro, P. & Verdejo, J. E (2014). Defenses Against Packet Dropping Attacks in Wireless Multihop Ad Hoc Networks, pages 377-400. CRC press. [More]
-
Casado, L. S., Rodríguez-Gómez, R. A., Magán-Carrión, R. & Maciá-Fernández, G (2013). NETA: un Framework para Simular y Evaluar Ataques en Redes Heterogéneas. MANETs como Caso de Estudio. In XI Jornadas de Ingeniería Telemática (JITEL 2013), pages 487-492. [More]
-
Casado, L. S., Rodríguez-Gómez, R. A., Magán-Carrión, R. & Maciá-Fernández, G (2013). NETA: Evaluating the effects of NETwork Attacks. MANETs as a case study. In Advances in Security of Information and Communication Networks, (SecNet 2013), pages 1-10. Springer Berlin Heidelberg. [More]
-
Magán-Carrión, R., Camacho, J. & García-Teodoro, P (2013). A Security Response Approach Based on the Deployment of Mobile Agents: Limitations and Improvements. In XI Jornadas de Ingeniería Telemática (JITEL 2013), pages 445-452. [More]
-
Magán-Carrión, R., Camacho, J. & García-Teodoro, P (2013). A Security Response Approach based on the Deployment of Mobile Agents: A Practical Vision. In 11th International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS 2013), pages 308-311. Springer Berlin Heidelberg. [More]
-
Magán-Carrión, R., Camacho, J. & García-Teodoro, P (2013). A Security Response Approach based on the Deployment of Mobile Agents. In 11th International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS 2013), pages 182-191. Springer Berlin Heidelberg. [More]
-
Magán-Carrión, R., Pulido, F. P., Camacho, J. & García-Teodoro, P. (2013). Tampered Data Recovery in WSNs through Dynamic PCA and Variable Routing Strategies. ICCNS - Journal of Communications, 8(11), 738-750. [More]
-
Magán-Carrión, R., García-Teodoro, P. & Camacho, J (2012). Supervivencia en redes de sensores mediante técnicas multivariantes. In 12th Reunión Española sobre Criptología y Seguridad de la Información (RECSI 2012), pages 315-320. [More]
Projects