Mostrar el registro sencillo del ítem
Diseño de red bayesiana para la predicción de ataques informáticos de tipo Ransomware. Caso de estudio PYMES prestadoras de servicios
dc.contributor.advisor | Ortiz Cuadros, José David | spa |
dc.contributor.author | Gómez Bautista, Fabián Andrés | spa |
dc.contributor.author | Rey Sepúlveda, Yeison Alexander | spa |
dc.coverage.spatial | Colombia | spa |
dc.date.accessioned | 2020-10-22T20:30:45Z | |
dc.date.available | 2020-10-22T20:30:45Z | |
dc.date.issued | 2019-05-17 | |
dc.identifier.uri | http://hdl.handle.net/20.500.12749/7312 | |
dc.description.abstract | Los ataques de Ransowmare los cuales tuvieron un auge de uso en nuestro Siglo XXI, es método perfecto para secuestrar equipos y generar caos en una organización, en la vida de las personas o en instituciones pública/privadas, debido a la alta letalidad de estos ataques de inhabilitar el acceso a los archivos debido a métodos de encriptación modernas que dejan inutilizable y contagiada una computadora, permitiendo que una red tanto privada como pública se ven comprometidas a grandes daños tanto económicos, como financieros y sociales. Una de las maneras que se encontraron para combatir en empresas prestadoras de servicios educativos para concienciar a todo el cuerpo de trabajadores que tengan y requieran del acceso a equipos digitales para la realización de sus tareas habituales; es la de una Red Bayesiana para predecir este tipo de ataques basado en la Infraestructura TIC planteada por gartner. Los resultados arrojados por la investigación fueron interesantes, debido a que la Red Bayesiana de hecho nos entregó una visión holística de la seguridad de la empresa tanto a nivel físico como a nivel digital, debido a que la Red Bayesiana nos permitió simular todas dimensiones que intervienen en una infraestructura TIC, arrojando interesantes resultados sobre la situación actual de la empresa en seguridad, medir si sus empleados manejan son conscientes de los riesgos informáticos que puedan llegar a poner en riesgo a la institución educativa, la cual fue el campo de estudio para esta investigación. Estos resultados arrojados por la Red Bayesiana fueron entregados a la institución educativa, esta recibió una explicación por parte de los investigadores sobre lo que significaban los porcentajes arrojados por la red e hizo entrega a la institución del documento para que se puedan contextualizar con la investigación y la razón por la cual esta investigación se realizó. La conclusión de esta investigación es que la red bayesiana es una herramienta muy poderosa para el campo de la ciber seguridad, permitiendo hacer un excelente contraste entre lo que la empresa tiene escrito sobre los procesos de seguridad con sus datos y el nivel de coherencia entre sus políticas y su aplicación en su día a día. Y un contaste importante entre lo que es la Seguridad Física de la empresa y la seguridad digital de esta, revelando, que lo más importante a la hora de poder tener una empresa segura, es concientizar a todo su personal y sobre todo a sus estudiantes sobre los latentes peligros que existen en la red y cómo evitarlos. Y esto también sirve como una ayuda para la empresa para observar su situación tecnológica analizando los componentes de su infraestructura TIC y permitiendo dar a la institución un abre bocas sobre la importancia de la industria 4.0 en las instituciones educativas y su mejoramiento en el moldeamiento de los estudiantes para una generación llena de cambios tecnológicos y avances sin precedentes. | spa |
dc.description.tableofcontents | 1. INTRODUCCIÓN................................................................................................. 6 2. PLANTEAMIENTO DEL PROBLEMA ................................................................. 9 3. OBJETIVOS ...................................................................................................... 18 3.1 OBJETIVO GENERAL ..................................................................................... 18 3.2 OBJETIVOS ESPECÍFICOS ........................................................................... 18 4. MARCO REFERENCIAL ................................................................................... 19 4.1 MARCO CONCEPTUAL .................................................................................. 19 4.2 MARCO TEÓRICO .......................................................................................... 20 4.3 ESTADO DEL ARTE ....................................................................................... 25 4.4 ESTADO LEGAL ............................................................................................. 28 4.4.1. NORMATIVA NACIONAL ............................................................................ 28 4.4.2 NORMATIVA INTERNACIONAL .................................................................. 31 5. METODOLOGIA ................................................................................................ 33 5.1 ETAPA 1 .......................................................................................................... 33 5.2 ETAPA 2 .......................................................................................................... 33 5.3 ETAPA 3 .......................................................................................................... 33 6. RESULTADOS OBTENIDOS ............................................................................ 35 6.1 CAPÍTULO 1 ................................................................................................... 35 6.2 CAPÍTULO 2 ................................................................................................... 42 6.3 CAPÍTULO 3 ................................................................................................... 48 7. Título nuevo ....................................................................................................... 49 REFERENCIAS ..................................................................................................... 5 | spa |
dc.format.mimetype | application/pdf | spa |
dc.language.iso | spa | spa |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/2.5/co/ | * |
dc.title | Diseño de red bayesiana para la predicción de ataques informáticos de tipo Ransomware. Caso de estudio PYMES prestadoras de servicios | spa |
dc.title.translated | Bayesian network design for predicting ransomware-type computer attacks. PYMES case study service providers | spa |
dc.degree.name | Ingeniero de Sistemas | spa |
dc.publisher.grantor | Universidad Autónoma de Bucaramanga UNAB | spa |
dc.rights.local | Abierto (Texto Completo) | spa |
dc.publisher.faculty | Facultad Ingeniería | spa |
dc.publisher.program | Pregrado Ingeniería de Sistemas | spa |
dc.description.degreelevel | Pregrado | spa |
dc.type.driver | info:eu-repo/semantics/bachelorThesis | |
dc.type.local | Trabajo de Grado | spa |
dc.type.coar | http://purl.org/coar/resource_type/c_7a1f | |
dc.subject.keywords | Systems engineer | eng |
dc.subject.keywords | Technological innovations | eng |
dc.subject.keywords | Ransowmare attacks | eng |
dc.subject.keywords | Encryption methods | eng |
dc.subject.keywords | Data encryption | eng |
dc.subject.keywords | Probabilities | eng |
dc.identifier.instname | instname:Universidad Autónoma de Bucaramanga - UNAB | spa |
dc.identifier.reponame | reponame:Repositorio Institucional UNAB | spa |
dc.type.hasversion | info:eu-repo/semantics/acceptedVersion | |
dc.rights.accessrights | info:eu-repo/semantics/openAccess | spa |
dc.rights.accessrights | http://purl.org/coar/access_right/c_abf2 | spa |
dc.relation.references | CCN-CERT. (2018). Medidas de seguridad contra Ransomware. Retrieved from https://www.ccn-cert.cni.es/informes/informes-ccn-cert-publicos/2877-ccn-certia-11-18-medidas-de-seguridad-contra-Ransomware/file.htm | spa |
dc.relation.references | Chockalingam, S., Pieters, W., Teixeira, A., & van Gelder, P. (2017). Bayesian Network Models in Cyber Security: A Systematic Review (pp. 105–122). https://doi.org/10.1007/978-3-319-70290-2_7 | spa |
dc.relation.references | Clark, D. D., Pogran, K. T., & Reed, D. P. (1978). An introduction to local area networks. Proceedings of the IEEE, 66(11), 1497–1517. https://doi.org/10.1109/PROC.1978.11152 | spa |
dc.relation.references | CONPES 3854. (2016). Política Nacional de Seguridad Digital. | spa |
dc.relation.references | DNP. (2015). La clasificación por tamaño empresarial en Colombia: Historia y limitaciones para una propuesta. Retrieved from https://colaboracion.dnp.gov.co/CDT/Estudios Econmicos/434.pdf | spa |
dc.relation.references | ESET. (2017a). RoT: el Ransomware de las cosas, en detalle. We Live Security. Retrieved from https://www.welivesecurity.com/laes/2017/02/03/Ransomware-de-las-cosas/ | spa |
dc.relation.references | ESET. (2017b). Security Report Latinoamérica 2017 | spa |
dc.relation.references | ESET. (2018a). ESET Security Report Latinoamérica 2018 (Vol. 1). Argentina. Retrieved from https://www.welivesecurity.com/la-es/2018/06/19/eset-securityreport-2018-el-estado-de-la-seguridad-de-la-informacion-en-las-empresas-dela-region/ | spa |
dc.relation.references | ESET. (2018b). Lejos de desaparecer, el Ransomware se reinventa. Argentina. Retrieved from https://register.gotowebinar.com/recording/3775545201697720066 | spa |
dc.relation.references | Garcia, P., & Santos, I. (2010). Bayesian Networks for Network Intrusion Detection. In Bayesian Network. Sciyo. https://doi.org/10.5772/10069 | spa |
dc.relation.references | Heikkila, M., Rattya, A., Pieska, S., & Jamsa, J. (2016). Security challenges in small- and medium-sized manufacturing enterprises. In 2016 International Symposium on Small-scale Intelligent Manufacturing Systems (SIMS) (pp. 25– 30). IEEE. https://doi.org/10.1109/SIMS.2016.7802895 | spa |
dc.relation.references | Hsiao, S.-C., & Kao, D.-Y. (2018). The static analysis of WannaCry Ransomware. In 2018 20th International Conference on Advanced Communication Technology (ICACT). IEEE. https://doi.org/10.23919/ICACT.2018.8323679 | spa |
dc.relation.references | IEEE Computer Society. (1998). 802.3-1985 - IEEE Standards for Local Area Networks: Carrier Sense Multiple Access with Collision Detection (CSMA/CD) Access Method and Physical Layer Specifications. https://doi.org/10.1109/IEEESTD.1984.7508550 | spa |
dc.relation.references | IEEE Computer Society. (2017). 802.3-2015/Cor 1-2017 - IEEE Standard for Ethernet - Corrigendum 1: Multi-lane Timestamping. https://doi.org/10.1109/IEEESTD.2017.7907155 | spa |
dc.relation.references | ITU. (2011). Ciberseguridad. Actualidades de La UIT, 9, 20–22. Retrieved from https://www.itu.int/net/itunews/issues/2011/05/38-es.aspx | spa |
dc.relation.references | Jabbar, M. A., Aluvalu, R., & Satyanarayana Reddy, S. S. (2017). Intrusion Detection System Using Bayesian Network and Feature Subset Selection. In 2017 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC) (pp. 1–5). IEEE. https://doi.org/10.1109/ICCIC.2017.8524381 | spa |
dc.relation.references | Kao, D.-Y., & Hsiao, S.-C. (2018). The dynamic analysis of WannaCry Ransomware. In 2018 20th International Conference on Advanced Communication Technology (ICACT). IEEE. https://doi.org/10.23919/ICACT.2018.8323681 | spa |
dc.relation.references | Ministerio de Tecnologías de la Información y las Comunicaciones. (2017). Impacto de los incidentes de seguridad digital en Colombia 2017 . https://doi.org/10.18235/000084 | spa |
dc.relation.references | Okutan, A., Yang, S. J., & McConky, K. (2017). Predicting cyber attacks with bayesian networks using unconventional signals. In Proceedings of the 12th Annual Conference on Cyber and Information Security Research - CISRC ’17 (pp. 1–4). New York, New York, USA: ACM Press. https://doi.org/10.1145/3064814.3064823 | spa |
dc.relation.references | Peñuela Vasquez, Y. D. (2018). Análisis e identificación del estado actual de la seguridad informática dirigido a las organizaciones en Colombia, que brinde 67 un diagnóstico general sobre la importancia y medidas necesarias para proteger el activo de la información. Retrieved from https://repository.unad.edu.co/bitstream/10596/17260/1/35254395.pdf | spa |
dc.relation.references | Roohparvar, R. (2018). 3 Reasons why cybersecurity is more important that ever. Retrieved from http://www.infoguardsecurity.com/3-reasons-whycybersecurity-is-more-important-than-ever/ | spa |
dc.relation.references | SecuriTIC. (2016). Seguridad Reactiva o Proactiva, ¿qué necesitan las empresas para estar mejor protegidas? Retrieved from http://www.securitic.com.mx/reportaje-especial/2162-seguridad-reactiva-oproactiva-que-necesitan-las-empresas-para-estar-mejor-protegidas | spa |
dc.relation.references | Song, J., Takakura, H., Okabe, Y., Eto, M., Inoue, D., & Nakao, K. (2011). Statistical analysis of honeypot data and building of Kyoto 2006+ dataset for NIDS evaluation. In Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security - BADGERS ’11 (pp. 29–36). New York, New York, USA: ACM Press. https://doi.org/10.1145/1978672.1978676 | spa |
dc.relation.references | Sucar, L. E. (2006). Redes Bayesianas. Retrieved from https://ccc.inaoep.mx/~esucar/Clases-mgp/caprb. | spa |
dc.relation.references | Tanasache, F. D., Sorella, M., Bonomi, S., Rapone, R., & Meacci, D. (2019). Building an emulation environment for cyber security analyses of complex networked systems. In Proceedings of the 20th International Conference on Distributed Computing and Networking - ICDCN ’19. New York, New York, USA: ACM Press. https://doi.org/10.1145/3288599.3288618 | spa |
dc.relation.references | Thomas Bayes. (1763). Bayes Theorem. In An essay towards solving a problem in the doctrine of chances, Philosophical (pp. 370–418). | spa |
dc.relation.references | Xie, P., Ou, X., Levy, R., Li, J. H., & Liu, P. (2010). Using Bayesian Networks for Cyber Security Analysis. https://doi.org/https://doi.org/10.1109/DSN.2010.5544924 | spa |
dc.relation.references | Zimba, A., Wang, Z., & Chen, H. (2017). Reasoning crypto Ransomware infection vectors with Bayesian networks. In 2017 IEEE International Conference on Intelligence and Security Informatics (ISI) (pp. 149–151). IEEE. https://doi.org/10.1109/ISI.2017.8004894 | spa |
dc.relation.references | Zuech, R., Khoshgoftaar, T. M., Seliya, N., Najafabadi, M. M., & Kemp, C. (2015). A New Intrusion Detection Benchmarking System. Retrieved from https://www.aaai.org/ocs/index.php/FLAIRS/FLAIRS15/paper/viewFile/10368/1 03 | spa |
dc.relation.references | A., B. M., K., A. B., F., T. A., & Otasowie, I. (2014). A Bayesian Network Model for Risk Management in Cyber Situation. Retrieved from http://www.iaeng.org/publication/WCECS2014/WCECS2014_pp434-441.pdf | spa |
dc.relation.references | Bobek, S., Baran, M., Kluza, K., & Nalepa, G. J. (2015). Application of Bayesian Networks to Recommendations in Business Process Modeling? Retrieved from http://ceur-ws.org/Vol-1101/paper5.pdf | spa |
dc.relation.references | Chockalingam, S., Pieters, W., Teixeira, A., & van Gelder, P. (2017). Bayesian Network Models in Cyber Security: A Systematic Review. https://doi.org/10.1007/978-3-319-70290-2_7 | spa |
dc.relation.references | CONPES 3854. (2016). Política Nacional de Seguridad Digital | spa |
dc.relation.references | Gartner. (n.d.). IT Infrastructure. Retrieved from https://www.gartner.com/en/information-technology/glossary/it-infrastructure | spa |
dc.relation.references | Hsiao, S.-C., & Kao, D.-Y. (2018). The static analysis of WannaCry ransomware. 2018 20th International Conference on Advanced Communication Technology (ICACT). https://doi.org/10.23919/ICACT.2018.8323679 | spa |
dc.relation.references | Kao, D.-Y., & Hsiao, S.-C. (2018). The dynamic analysis of WannaCry ransomware. 2018 20th International Conference on Advanced Communication Technology (ICACT). https://doi.org/10.23919/ICACT.2018.8323681 | spa |
dc.relation.references | Ministerio de Tecnologías de la Información y las Comunicaciones. (2017). Impacto de los incidentes de seguridad digital en Colombia 2017 . https://doi.org/10.18235/0000843 | spa |
dc.relation.references | Ministerio de Tecnologías de la Información y las Comunicaciones. (2018). Estudio de Caracterización de las Mipyme y su relacionamiento con las TIC. Retrieved from https://www.mintic.gov.co/portal/604/w3-article-77440.html?_noredirect=1 | spa |
dc.relation.references | Miyamoto, M., & Ando, M. (2010). Predicting Credit Risk for Japanese SMEs with A Neural Network Model. Retrieved from http://www.jfssa.jp/taikai/2018/table/program_detail/pdf/351-/J10351.pdf | spa |
dc.relation.references | National Security Agency. (2019). GHidra. Retrieved from https://www.nsa.gov/resources/everyone/ghidra | spa |
dc.relation.references | Ojha, Y. (2019). Reverse Engineering WannaCry Ransomware using Ghidra — Finding the KillSwitch. Retrieved from https://medium.com/@yogeshojha/reverse-engineering-wannacryransomware-using-ghidra-finding-the-killswitch-a212807e9354 | spa |
dc.relation.references | Priya, P. M., & Kodieswari, A. (2016). BAYESIAN NETWORK METHODOLOGY FOR CYBER SECURITY. International Journal of Current Research and Modern Education (IJCRME). Retrieved from http://ijcrme.rdmodernresearch.com/wp-content/uploads/2015/06/CP-029.pd | spa |
dc.relation.references | Sentinel One. (2018). SentinelOne Reveals That Almost Half Of Global Businesses Suffered a Ransomware Attack In Last Year – Global Study. Retrieved from https://www.sentinelone.com/press/sentinelone-reveals-almost-half-globalbusinesses-suffered-ransomware-attack-last-year-global | spa |
dc.relation.references | Sgandurr, D., Muñoz-González, L., Mohsen, R., & Lupu, E. C. (2016). Automated Dynamic Analysis of Ransomware: Benefits, Limitations and use for Detection. Retrieved from https://arxiv.org/pdf/1609.03020.pdf | spa |
dc.relation.references | Universidad Interamericana Para El Desarrollo. (2015). Infraestructura Tecnológica. Retrieved from https://moodle2.unid.edu.mx/dts_cursos_mdl/lic/TIC/IT/S01/IT01_Lectura.pdf | spa |
dc.relation.references | Venkatasubramanian Ramakrishnan, CISM, CRISC, C. (2016). Cyberrisk Assessment Using Bayesian Networks. ISACA Journal, 6. Retrieved from https://www.isaca.org/Journal/archives/2016/volume-6/Pages/cyberriskassessment-using-bayesian-networks.aspx?utm_referrer= | spa |
dc.relation.references | Wilde, L. De. (2016). A Bayesian Network Model for Predicting Data Breaches. https://doi.org/http://doi.org/10.4121/uuid: c637245d-93fb-4cee-8f4a9b5fa14d5513 | spa |
dc.relation.references | Wright, E., Kerr, R., & Johnson, R. (2016). Target Beliefs for SME-oriented, Bayesian Network-based Modeling. Retrieved from http://haystax.com/wpcontent/uploads/2016/04/Bayesian-Modeling-02.pdf | spa |
dc.contributor.cvlac | https://scienti.minciencias.gov.co/cvlac/visualizador/generarCurriculoCv.do?cod_rh=0000062739 | * |
dc.contributor.orcid | https://orcid.org/0000-0002-2347-6584 | * |
dc.subject.lemb | Ingeniería de sistemas | spa |
dc.subject.lemb | Innovaciones tecnológicas | spa |
dc.subject.lemb | Redes de información | spa |
dc.subject.lemb | Cifrado de datos | spa |
dc.subject.lemb | Probabilidades | spa |
dc.identifier.repourl | repourl:https://repository.unab.edu.co | spa |
dc.description.abstractenglish | The Ransowmare attacks, which had a boom in use in our 21st century, is the perfect method to hijack equipment and generate chaos in an organization, in people's lives or in public / private institutions, due to the high lethality of these attacks of disabling access to files due to modern encryption methods that leave a computer unusable and infected, allowing both a private and public network to be compromised to great economic, financial and social damage. One of the ways that were found to fight in companies that provide educational services to raise awareness among the entire body of workers who have and require access to digital equipment to carry out their usual tasks; It is that of a Bayesian Network to predict this type of attacks based on the ICT Infrastructure proposed by gartner. The results obtained by the research were interesting, because the Bayesian Network in fact gave us a holistic vision of the security of the company both physically and digitally, because the Bayesian Network lost us simulating all the dimensions that intervene in an ICT infrastructure, yielding interesting results on the current situation of the company in security, measuring whether its employees are aware of the computer risks that can put the educational institution at risk, which was the field of study for this investigation. These results produced by the Bayesian Network were delivered to the educational institution, which received an explanation from the researchers about what the percentages produced by the network meant and delivered the document to the institution so that it could be contextualized with the research and the reason why this research was done. The conclusion of this research is that the Bayesian network is a very powerful tool for the field of cyber security, allowing an excellent contrast to be made between what the company has written about the security processes with its data and the level of coherence between its policies and their application in their day to day. And an important contrast between what the Physical Security of the company is and its digital security, revealing that the most important thing when it comes to having a secure company, is to make all its staff and especially its students aware of the latent dangers that exist in the network and how to avoid them. And this also serves as an aid for the company to observe its technological situation by analyzing the components of its ICT infrastructure and allowing the institution to give an opening mouth about the importance of Industry 4.0 in educational institutions and its improvement in the shaping of the students for a generation full of technological change and unprecedented advancement. | eng |
dc.subject.proposal | Ataques de Ransowmare | spa |
dc.subject.proposal | Métodos de encriptación | spa |
dc.type.redcol | http://purl.org/redcol/resource_type/TP | |
dc.rights.creativecommons | Atribución-NoComercial-SinDerivadas 2.5 Colombia | * |
dc.contributor.researchgroup | Grupo de Investigación Tecnologías de Información - GTI | spa |
dc.contributor.researchgroup | Grupo de Investigaciones Clínicas | spa |
dc.coverage.campus | UNAB Campus Bucaramanga | spa |
dc.description.learningmodality | Modalidad Presencial | spa |