Mostrar el registro sencillo del ítem

dc.contributor.advisorOrtiz Cuadros, José Davidspa
dc.contributor.authorGómez Bautista, Fabián Andrésspa
dc.contributor.authorRey Sepúlveda, Yeison Alexanderspa
dc.coverage.spatialColombiaspa
dc.date.accessioned2020-10-22T20:30:45Z
dc.date.available2020-10-22T20:30:45Z
dc.date.issued2019-05-17
dc.identifier.urihttp://hdl.handle.net/20.500.12749/7312
dc.description.abstractLos ataques de Ransowmare los cuales tuvieron un auge de uso en nuestro Siglo XXI, es método perfecto para secuestrar equipos y generar caos en una organización, en la vida de las personas o en instituciones pública/privadas, debido a la alta letalidad de estos ataques de inhabilitar el acceso a los archivos debido a métodos de encriptación modernas que dejan inutilizable y contagiada una computadora, permitiendo que una red tanto privada como pública se ven comprometidas a grandes daños tanto económicos, como financieros y sociales. Una de las maneras que se encontraron para combatir en empresas prestadoras de servicios educativos para concienciar a todo el cuerpo de trabajadores que tengan y requieran del acceso a equipos digitales para la realización de sus tareas habituales; es la de una Red Bayesiana para predecir este tipo de ataques basado en la Infraestructura TIC planteada por gartner. Los resultados arrojados por la investigación fueron interesantes, debido a que la Red Bayesiana de hecho nos entregó una visión holística de la seguridad de la empresa tanto a nivel físico como a nivel digital, debido a que la Red Bayesiana nos permitió simular todas dimensiones que intervienen en una infraestructura TIC, arrojando interesantes resultados sobre la situación actual de la empresa en seguridad, medir si sus empleados manejan son conscientes de los riesgos informáticos que puedan llegar a poner en riesgo a la institución educativa, la cual fue el campo de estudio para esta investigación. Estos resultados arrojados por la Red Bayesiana fueron entregados a la institución educativa, esta recibió una explicación por parte de los investigadores sobre lo que significaban los porcentajes arrojados por la red e hizo entrega a la institución del documento para que se puedan contextualizar con la investigación y la razón por la cual esta investigación se realizó. La conclusión de esta investigación es que la red bayesiana es una herramienta muy poderosa para el campo de la ciber seguridad, permitiendo hacer un excelente contraste entre lo que la empresa tiene escrito sobre los procesos de seguridad con sus datos y el nivel de coherencia entre sus políticas y su aplicación en su día a día. Y un contaste importante entre lo que es la Seguridad Física de la empresa y la seguridad digital de esta, revelando, que lo más importante a la hora de poder tener una empresa segura, es concientizar a todo su personal y sobre todo a sus estudiantes sobre los latentes peligros que existen en la red y cómo evitarlos. Y esto también sirve como una ayuda para la empresa para observar su situación tecnológica analizando los componentes de su infraestructura TIC y permitiendo dar a la institución un abre bocas sobre la importancia de la industria 4.0 en las instituciones educativas y su mejoramiento en el moldeamiento de los estudiantes para una generación llena de cambios tecnológicos y avances sin precedentes.spa
dc.description.tableofcontents1. INTRODUCCIÓN................................................................................................. 6 2. PLANTEAMIENTO DEL PROBLEMA ................................................................. 9 3. OBJETIVOS ...................................................................................................... 18 3.1 OBJETIVO GENERAL ..................................................................................... 18 3.2 OBJETIVOS ESPECÍFICOS ........................................................................... 18 4. MARCO REFERENCIAL ................................................................................... 19 4.1 MARCO CONCEPTUAL .................................................................................. 19 4.2 MARCO TEÓRICO .......................................................................................... 20 4.3 ESTADO DEL ARTE ....................................................................................... 25 4.4 ESTADO LEGAL ............................................................................................. 28 4.4.1. NORMATIVA NACIONAL ............................................................................ 28 4.4.2 NORMATIVA INTERNACIONAL .................................................................. 31 5. METODOLOGIA ................................................................................................ 33 5.1 ETAPA 1 .......................................................................................................... 33 5.2 ETAPA 2 .......................................................................................................... 33 5.3 ETAPA 3 .......................................................................................................... 33 6. RESULTADOS OBTENIDOS ............................................................................ 35 6.1 CAPÍTULO 1 ................................................................................................... 35 6.2 CAPÍTULO 2 ................................................................................................... 42 6.3 CAPÍTULO 3 ................................................................................................... 48 7. Título nuevo ....................................................................................................... 49 REFERENCIAS ..................................................................................................... 5spa
dc.format.mimetypeapplication/pdfspa
dc.language.isospaspa
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/2.5/co/*
dc.titleDiseño de red bayesiana para la predicción de ataques informáticos de tipo Ransomware. Caso de estudio PYMES prestadoras de serviciosspa
dc.title.translatedBayesian network design for predicting ransomware-type computer attacks. PYMES case study service providersspa
dc.degree.nameIngeniero de Sistemasspa
dc.publisher.grantorUniversidad Autónoma de Bucaramanga UNABspa
dc.rights.localAbierto (Texto Completo)spa
dc.publisher.facultyFacultad Ingenieríaspa
dc.publisher.programPregrado Ingeniería de Sistemasspa
dc.description.degreelevelPregradospa
dc.type.driverinfo:eu-repo/semantics/bachelorThesis
dc.type.localTrabajo de Gradospa
dc.type.coarhttp://purl.org/coar/resource_type/c_7a1f
dc.subject.keywordsSystems engineereng
dc.subject.keywordsTechnological innovationseng
dc.subject.keywordsRansowmare attackseng
dc.subject.keywordsEncryption methodseng
dc.subject.keywordsData encryptioneng
dc.subject.keywordsProbabilitieseng
dc.identifier.instnameinstname:Universidad Autónoma de Bucaramanga - UNABspa
dc.identifier.reponamereponame:Repositorio Institucional UNABspa
dc.type.hasversioninfo:eu-repo/semantics/acceptedVersion
dc.rights.accessrightsinfo:eu-repo/semantics/openAccessspa
dc.rights.accessrightshttp://purl.org/coar/access_right/c_abf2spa
dc.relation.referencesCCN-CERT. (2018). Medidas de seguridad contra Ransomware. Retrieved from https://www.ccn-cert.cni.es/informes/informes-ccn-cert-publicos/2877-ccn-certia-11-18-medidas-de-seguridad-contra-Ransomware/file.htmspa
dc.relation.referencesChockalingam, S., Pieters, W., Teixeira, A., & van Gelder, P. (2017). Bayesian Network Models in Cyber Security: A Systematic Review (pp. 105–122). https://doi.org/10.1007/978-3-319-70290-2_7spa
dc.relation.referencesClark, D. D., Pogran, K. T., & Reed, D. P. (1978). An introduction to local area networks. Proceedings of the IEEE, 66(11), 1497–1517. https://doi.org/10.1109/PROC.1978.11152spa
dc.relation.referencesCONPES 3854. (2016). Política Nacional de Seguridad Digital.spa
dc.relation.referencesDNP. (2015). La clasificación por tamaño empresarial en Colombia: Historia y limitaciones para una propuesta. Retrieved from https://colaboracion.dnp.gov.co/CDT/Estudios Econmicos/434.pdfspa
dc.relation.referencesESET. (2017a). RoT: el Ransomware de las cosas, en detalle. We Live Security. Retrieved from https://www.welivesecurity.com/laes/2017/02/03/Ransomware-de-las-cosas/spa
dc.relation.referencesESET. (2017b). Security Report Latinoamérica 2017spa
dc.relation.referencesESET. (2018a). ESET Security Report Latinoamérica 2018 (Vol. 1). Argentina. Retrieved from https://www.welivesecurity.com/la-es/2018/06/19/eset-securityreport-2018-el-estado-de-la-seguridad-de-la-informacion-en-las-empresas-dela-region/spa
dc.relation.referencesESET. (2018b). Lejos de desaparecer, el Ransomware se reinventa. Argentina. Retrieved from https://register.gotowebinar.com/recording/3775545201697720066spa
dc.relation.referencesGarcia, P., & Santos, I. (2010). Bayesian Networks for Network Intrusion Detection. In Bayesian Network. Sciyo. https://doi.org/10.5772/10069spa
dc.relation.referencesHeikkila, M., Rattya, A., Pieska, S., & Jamsa, J. (2016). Security challenges in small- and medium-sized manufacturing enterprises. In 2016 International Symposium on Small-scale Intelligent Manufacturing Systems (SIMS) (pp. 25– 30). IEEE. https://doi.org/10.1109/SIMS.2016.7802895spa
dc.relation.referencesHsiao, S.-C., & Kao, D.-Y. (2018). The static analysis of WannaCry Ransomware. In 2018 20th International Conference on Advanced Communication Technology (ICACT). IEEE. https://doi.org/10.23919/ICACT.2018.8323679spa
dc.relation.referencesIEEE Computer Society. (1998). 802.3-1985 - IEEE Standards for Local Area Networks: Carrier Sense Multiple Access with Collision Detection (CSMA/CD) Access Method and Physical Layer Specifications. https://doi.org/10.1109/IEEESTD.1984.7508550spa
dc.relation.referencesIEEE Computer Society. (2017). 802.3-2015/Cor 1-2017 - IEEE Standard for Ethernet - Corrigendum 1: Multi-lane Timestamping. https://doi.org/10.1109/IEEESTD.2017.7907155spa
dc.relation.referencesITU. (2011). Ciberseguridad. Actualidades de La UIT, 9, 20–22. Retrieved from https://www.itu.int/net/itunews/issues/2011/05/38-es.aspxspa
dc.relation.referencesJabbar, M. A., Aluvalu, R., & Satyanarayana Reddy, S. S. (2017). Intrusion Detection System Using Bayesian Network and Feature Subset Selection. In 2017 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC) (pp. 1–5). IEEE. https://doi.org/10.1109/ICCIC.2017.8524381spa
dc.relation.referencesKao, D.-Y., & Hsiao, S.-C. (2018). The dynamic analysis of WannaCry Ransomware. In 2018 20th International Conference on Advanced Communication Technology (ICACT). IEEE. https://doi.org/10.23919/ICACT.2018.8323681spa
dc.relation.referencesMinisterio de Tecnologías de la Información y las Comunicaciones. (2017). Impacto de los incidentes de seguridad digital en Colombia 2017 . https://doi.org/10.18235/000084spa
dc.relation.referencesOkutan, A., Yang, S. J., & McConky, K. (2017). Predicting cyber attacks with bayesian networks using unconventional signals. In Proceedings of the 12th Annual Conference on Cyber and Information Security Research - CISRC ’17 (pp. 1–4). New York, New York, USA: ACM Press. https://doi.org/10.1145/3064814.3064823spa
dc.relation.referencesPeñuela Vasquez, Y. D. (2018). Análisis e identificación del estado actual de la seguridad informática dirigido a las organizaciones en Colombia, que brinde 67 un diagnóstico general sobre la importancia y medidas necesarias para proteger el activo de la información. Retrieved from https://repository.unad.edu.co/bitstream/10596/17260/1/35254395.pdfspa
dc.relation.referencesRoohparvar, R. (2018). 3 Reasons why cybersecurity is more important that ever. Retrieved from http://www.infoguardsecurity.com/3-reasons-whycybersecurity-is-more-important-than-ever/spa
dc.relation.referencesSecuriTIC. (2016). Seguridad Reactiva o Proactiva, ¿qué necesitan las empresas para estar mejor protegidas? Retrieved from http://www.securitic.com.mx/reportaje-especial/2162-seguridad-reactiva-oproactiva-que-necesitan-las-empresas-para-estar-mejor-protegidasspa
dc.relation.referencesSong, J., Takakura, H., Okabe, Y., Eto, M., Inoue, D., & Nakao, K. (2011). Statistical analysis of honeypot data and building of Kyoto 2006+ dataset for NIDS evaluation. In Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security - BADGERS ’11 (pp. 29–36). New York, New York, USA: ACM Press. https://doi.org/10.1145/1978672.1978676spa
dc.relation.referencesSucar, L. E. (2006). Redes Bayesianas. Retrieved from https://ccc.inaoep.mx/~esucar/Clases-mgp/caprb.spa
dc.relation.referencesTanasache, F. D., Sorella, M., Bonomi, S., Rapone, R., & Meacci, D. (2019). Building an emulation environment for cyber security analyses of complex networked systems. In Proceedings of the 20th International Conference on Distributed Computing and Networking - ICDCN ’19. New York, New York, USA: ACM Press. https://doi.org/10.1145/3288599.3288618spa
dc.relation.referencesThomas Bayes. (1763). Bayes Theorem. In An essay towards solving a problem in the doctrine of chances, Philosophical (pp. 370–418).spa
dc.relation.referencesXie, P., Ou, X., Levy, R., Li, J. H., & Liu, P. (2010). Using Bayesian Networks for Cyber Security Analysis. https://doi.org/https://doi.org/10.1109/DSN.2010.5544924spa
dc.relation.referencesZimba, A., Wang, Z., & Chen, H. (2017). Reasoning crypto Ransomware infection vectors with Bayesian networks. In 2017 IEEE International Conference on Intelligence and Security Informatics (ISI) (pp. 149–151). IEEE. https://doi.org/10.1109/ISI.2017.8004894spa
dc.relation.referencesZuech, R., Khoshgoftaar, T. M., Seliya, N., Najafabadi, M. M., & Kemp, C. (2015). A New Intrusion Detection Benchmarking System. Retrieved from https://www.aaai.org/ocs/index.php/FLAIRS/FLAIRS15/paper/viewFile/10368/1 03spa
dc.relation.referencesA., B. M., K., A. B., F., T. A., & Otasowie, I. (2014). A Bayesian Network Model for Risk Management in Cyber Situation. Retrieved from http://www.iaeng.org/publication/WCECS2014/WCECS2014_pp434-441.pdfspa
dc.relation.referencesBobek, S., Baran, M., Kluza, K., & Nalepa, G. J. (2015). Application of Bayesian Networks to Recommendations in Business Process Modeling? Retrieved from http://ceur-ws.org/Vol-1101/paper5.pdfspa
dc.relation.referencesChockalingam, S., Pieters, W., Teixeira, A., & van Gelder, P. (2017). Bayesian Network Models in Cyber Security: A Systematic Review. https://doi.org/10.1007/978-3-319-70290-2_7spa
dc.relation.referencesCONPES 3854. (2016). Política Nacional de Seguridad Digitalspa
dc.relation.referencesGartner. (n.d.). IT Infrastructure. Retrieved from https://www.gartner.com/en/information-technology/glossary/it-infrastructurespa
dc.relation.referencesHsiao, S.-C., & Kao, D.-Y. (2018). The static analysis of WannaCry ransomware. 2018 20th International Conference on Advanced Communication Technology (ICACT). https://doi.org/10.23919/ICACT.2018.8323679spa
dc.relation.referencesKao, D.-Y., & Hsiao, S.-C. (2018). The dynamic analysis of WannaCry ransomware. 2018 20th International Conference on Advanced Communication Technology (ICACT). https://doi.org/10.23919/ICACT.2018.8323681spa
dc.relation.referencesMinisterio de Tecnologías de la Información y las Comunicaciones. (2017). Impacto de los incidentes de seguridad digital en Colombia 2017 . https://doi.org/10.18235/0000843spa
dc.relation.referencesMinisterio de Tecnologías de la Información y las Comunicaciones. (2018). Estudio de Caracterización de las Mipyme y su relacionamiento con las TIC. Retrieved from https://www.mintic.gov.co/portal/604/w3-article-77440.html?_noredirect=1spa
dc.relation.referencesMiyamoto, M., & Ando, M. (2010). Predicting Credit Risk for Japanese SMEs with A Neural Network Model. Retrieved from http://www.jfssa.jp/taikai/2018/table/program_detail/pdf/351-/J10351.pdfspa
dc.relation.referencesNational Security Agency. (2019). GHidra. Retrieved from https://www.nsa.gov/resources/everyone/ghidraspa
dc.relation.referencesOjha, Y. (2019). Reverse Engineering WannaCry Ransomware using Ghidra — Finding the KillSwitch. Retrieved from https://medium.com/@yogeshojha/reverse-engineering-wannacryransomware-using-ghidra-finding-the-killswitch-a212807e9354spa
dc.relation.referencesPriya, P. M., & Kodieswari, A. (2016). BAYESIAN NETWORK METHODOLOGY FOR CYBER SECURITY. International Journal of Current Research and Modern Education (IJCRME). Retrieved from http://ijcrme.rdmodernresearch.com/wp-content/uploads/2015/06/CP-029.pdspa
dc.relation.referencesSentinel One. (2018). SentinelOne Reveals That Almost Half Of Global Businesses Suffered a Ransomware Attack In Last Year – Global Study. Retrieved from https://www.sentinelone.com/press/sentinelone-reveals-almost-half-globalbusinesses-suffered-ransomware-attack-last-year-globalspa
dc.relation.referencesSgandurr, D., Muñoz-González, L., Mohsen, R., & Lupu, E. C. (2016). Automated Dynamic Analysis of Ransomware: Benefits, Limitations and use for Detection. Retrieved from https://arxiv.org/pdf/1609.03020.pdfspa
dc.relation.referencesUniversidad Interamericana Para El Desarrollo. (2015). Infraestructura Tecnológica. Retrieved from https://moodle2.unid.edu.mx/dts_cursos_mdl/lic/TIC/IT/S01/IT01_Lectura.pdfspa
dc.relation.referencesVenkatasubramanian Ramakrishnan, CISM, CRISC, C. (2016). Cyberrisk Assessment Using Bayesian Networks. ISACA Journal, 6. Retrieved from https://www.isaca.org/Journal/archives/2016/volume-6/Pages/cyberriskassessment-using-bayesian-networks.aspx?utm_referrer=spa
dc.relation.referencesWilde, L. De. (2016). A Bayesian Network Model for Predicting Data Breaches. https://doi.org/http://doi.org/10.4121/uuid: c637245d-93fb-4cee-8f4a9b5fa14d5513spa
dc.relation.referencesWright, E., Kerr, R., & Johnson, R. (2016). Target Beliefs for SME-oriented, Bayesian Network-based Modeling. Retrieved from http://haystax.com/wpcontent/uploads/2016/04/Bayesian-Modeling-02.pdfspa
dc.contributor.cvlachttps://scienti.minciencias.gov.co/cvlac/visualizador/generarCurriculoCv.do?cod_rh=0000062739*
dc.contributor.orcidhttps://orcid.org/0000-0002-2347-6584*
dc.subject.lembIngeniería de sistemasspa
dc.subject.lembInnovaciones tecnológicasspa
dc.subject.lembRedes de informaciónspa
dc.subject.lembCifrado de datosspa
dc.subject.lembProbabilidadesspa
dc.identifier.repourlrepourl:https://repository.unab.edu.cospa
dc.description.abstractenglishThe Ransowmare attacks, which had a boom in use in our 21st century, is the perfect method to hijack equipment and generate chaos in an organization, in people's lives or in public / private institutions, due to the high lethality of these attacks of disabling access to files due to modern encryption methods that leave a computer unusable and infected, allowing both a private and public network to be compromised to great economic, financial and social damage. One of the ways that were found to fight in companies that provide educational services to raise awareness among the entire body of workers who have and require access to digital equipment to carry out their usual tasks; It is that of a Bayesian Network to predict this type of attacks based on the ICT Infrastructure proposed by gartner. The results obtained by the research were interesting, because the Bayesian Network in fact gave us a holistic vision of the security of the company both physically and digitally, because the Bayesian Network lost us simulating all the dimensions that intervene in an ICT infrastructure, yielding interesting results on the current situation of the company in security, measuring whether its employees are aware of the computer risks that can put the educational institution at risk, which was the field of study for this investigation. These results produced by the Bayesian Network were delivered to the educational institution, which received an explanation from the researchers about what the percentages produced by the network meant and delivered the document to the institution so that it could be contextualized with the research and the reason why this research was done. The conclusion of this research is that the Bayesian network is a very powerful tool for the field of cyber security, allowing an excellent contrast to be made between what the company has written about the security processes with its data and the level of coherence between its policies and their application in their day to day. And an important contrast between what the Physical Security of the company is and its digital security, revealing that the most important thing when it comes to having a secure company, is to make all its staff and especially its students aware of the latent dangers that exist in the network and how to avoid them. And this also serves as an aid for the company to observe its technological situation by analyzing the components of its ICT infrastructure and allowing the institution to give an opening mouth about the importance of Industry 4.0 in educational institutions and its improvement in the shaping of the students for a generation full of technological change and unprecedented advancement.eng
dc.subject.proposalAtaques de Ransowmarespa
dc.subject.proposalMétodos de encriptaciónspa
dc.type.redcolhttp://purl.org/redcol/resource_type/TP
dc.rights.creativecommonsAtribución-NoComercial-SinDerivadas 2.5 Colombia*
dc.contributor.researchgroupGrupo de Investigación Tecnologías de Información - GTIspa
dc.contributor.researchgroupGrupo de Investigaciones Clínicasspa
dc.coverage.campusUNAB Campus Bucaramangaspa
dc.description.learningmodalityModalidad Presencialspa


Ficheros en el ítem

Thumbnail
Thumbnail

Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem

Atribución-NoComercial-SinDerivadas 2.5 Colombia
Excepto si se señala otra cosa, la licencia del ítem se describe como Atribución-NoComercial-SinDerivadas 2.5 Colombia