Página en construcción

Jesús E.
díaz
verdejo
Jesús E. Díaz Verdejo es actualmente Catedrático de Ingeniería Telemática en el Departamento de Teoría de la Señal, Telemática y Comunicaciones de la Universidad de Granada.
Su labor investigadora y docente se centra en el campo de las redes y las comunicaciones, especialmente en el ámbito de la seguridad de redes y sistemas, sin excluir otros aspectos como el e-learning, la ingeniería de tráfico y las aplicaciones telemáticas. Su principal línea de investigación se orienta al análisis y modelización de actividades y eventos para la detección de incidentes de seguridad y la respuesta a los mismos, tanto mediante la detección de anomalías como mediante el uso de técnicas híbridas. Asimismo, con una orientación a la seguridad de las comunicaciones y redes, ha desarrollado trabajos en el campo de la identificación del tráfico de red y la correlación de alertas. En todos estos campos ha aplicado conocimientos y técnicas relacionadas con el machine learning y la minería de datos, el modelado de procesos mediante modelos de Markov y el análisis y modelado de protocolos de comunicación. Anteriormente, desarrolló su investigación en procesamiento y reconocimiento del habla, en la que también ha realizado importantes contribuciones.
Su actividad investigadora es extensa y de impacto internacional, como se puede juzgar por el completo currículum. Así, en su currículum se recogen veinte libros y capítulos de libros, alrededor de medio centenar de publicaciones en prestigiosas revistas internacionales y alrededor de 70 contribuciones en congresos nacionales e internacionales. Ha dirigido 6 tesis doctorales, 4 de ellas en el ámbito de la seguridad de redes.
Ha participado como investigador en 34 proyectos: 15 del Plan Nacional y Regional de Investigación y Desarrollo, 1 proyecto del 6º programa marco de la UE y 18 contratos de transferencia de investigación. Entre ellos, ha liderado tres proyectos del Plan Nacional de Investigación y Desarrollo y 3 contratos de transferencia tecnológica; correspondiendo la mayoría de las publicaciones científicas mencionadas anteriormente a la publicación de los resultados de estos proyectos.
Es revisor de numerosas revistas y congresos científicos internacionales y nacionales, evaluador de proyectos, organizador de diversas reuniones y actividades técnicas, así como miembro del CITIC-UGR. Desde 2017 está adscrito al grupo de investigación TIC154 de PAIDI, desarrollando una línea de investigación en ciberseguridad.
Ha participado activamente en la implantación del área de Ing. Telemática y de los títulos relacionados con la Ingeniería de Telecomunicación en la Universidad de Granada.
En el contexto de la seguridad de redes, ha desarrollado sistemas de detección de intrusos (IDS), especialmente para sistemas web, para los que existen prototipos que han sido objeto de contratos de transferencia. También ha desarrollado técnicas para la clasificación de flujos y para la correlación de alertas y eventos en entornos de monitorización de redes. En ambos casos, existen prototipos operativos.
Su objetivo a medio/largo plazo es consolidar la línea de investigación en seguridad en el NEUS Cybersecurity Lab (https://dtst.ugr.es/neus-cslab), desarrollando soluciones reales y efectivas que puedan ser transferibles, tanto para la prevención y respuesta a intrusiones como para la monitorización de la seguridad de la red.
ORCID: 0000-0002-8424-9932
Publicaciones
2025
Muñoz-Calle, J.; Díaz-Verdejo, J.; Alonso, R. Estepa; Alonso, A. Estepa
Análisis comparativo de las capacidades de SIDS Proceedings Article
En: Actas de las X Jornadas Nacionales de Investigación en Ciberseguridad, pp. 169-176, 2025, ISBN: 78-84-10169-61-6.
@inproceedings{2025-jnic-smart,
title = {Análisis comparativo de las capacidades de SIDS},
author = { J. {Muñoz-Calle} and J. {Díaz-Verdejo} and R. {Estepa Alonso} and A. {Estepa Alonso} },
isbn = {78-84-10169-61-6},
year = {2025},
date = {2025-06-06},
booktitle = {Actas de las X Jornadas Nacionales de Investigación en Ciberseguridad},
pages = {169-176},
abstract = {Cada vez son más los dispositivos desplegados en entornos SmartHome residenciales para conseguir funcionalidades de control relativamente simples. Su bajo coste y facilidad de uso propician una fuerte expansión, lo que a su vez representa un desafío desde el punto de vista de la ciberseguridad, aumentando
significativamente la exposición de las redes residenciales. La utilización de sistemas de detección de intrusiones adaptados al contexto podría mejorar la seguridad. Este trabajo estudia la idoneidad de los IDS para la detección de ciberataques en un escenario tipo SmartHome real, utilizando tanto detectores
de dominio público como comerciales. Para ello se analizan trazas reales disponibles con 3 IDS ampliamente utilizados: Snort, Palo Alto NGFW y FortiGate. Los resultados obtenidos ilustran la imposibilidad de su despliegue en su configuración por defecto, planteando algunas cuestiones relativas al rendimiento
y la dificultad de comparar sus rendimientos debido al punto de operación elegido en los equipos comerciales frente a Snort.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
significativamente la exposición de las redes residenciales. La utilización de sistemas de detección de intrusiones adaptados al contexto podría mejorar la seguridad. Este trabajo estudia la idoneidad de los IDS para la detección de ciberataques en un escenario tipo SmartHome real, utilizando tanto detectores
de dominio público como comerciales. Para ello se analizan trazas reales disponibles con 3 IDS ampliamente utilizados: Snort, Palo Alto NGFW y FortiGate. Los resultados obtenidos ilustran la imposibilidad de su despliegue en su configuración por defecto, planteando algunas cuestiones relativas al rendimiento
y la dificultad de comparar sus rendimientos debido al punto de operación elegido en los equipos comerciales frente a Snort.
Díaz-Verdejo, Jesús E.; Estepa Alonso, Rafael; Estepa Alonso, Antonio; Muñoz-Calle, F. J.; Madinabeitia, German
Building a large, realistic and labeled HTTP URI dataset for anomaly-based intrusion detection systems: Biblio-US17 Artículo de revista
En: Cybersecurity, vol. 8, no 35, 2025, ISSN: 2523-3246.
@article{Biblio24,
title = {Building a large, realistic and labeled HTTP URI dataset for anomaly-based intrusion detection systems: Biblio-US17 },
author = {Jesús E. {Díaz-Verdejo} and {Estepa Alonso}, Rafael and {Estepa Alonso}, Antonio and F. J. {Muñoz-Calle} and German {Madinabeitia}},
doi = {https://doi.org/10.1186/s42400‑024‑00336‑3},
issn = {2523-3246},
year = {2025},
date = {2025-06-05},
urldate = {2025-06-05},
journal = {Cybersecurity},
volume = {8},
number = {35},
abstract = {This paper introduces Biblio-US17, a labeled dataset collected over 6 months from the log files of a popular public website at the University of Seville. It contains 47 million records, each including the method, uniform resource identifier (URI) and associated response code and size of every request received by the web server. Records have been classified as either normal or attack using a comprehensive semi-automated process, which involved signature-based detection, assisted inspection of URIs vocabulary, and substantial expert manual supervision. Unlike comparable datasets, this one offers a genuine real-world perspective on the normal operation of an active website, along with an unbiased proportion of actual attacks (i.e., non-synthetic). This makes it ideal for evaluating and comparing anomalybased approaches in a realistic environment. Its extensive size and duration also make it valuable for addressing challenges like data shift and insufficient training. This paper describes the collection and labeling processes, dataset structure, and most relevant properties. We also include an example of an application for assessing the performance of a simple anomaly detector. Biblio-US17, now available to the scientific community, can also be used to model the URIs used by current web servers.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
2024
Lara, Agustín; Estepa, Antonio; Estepa, Rafael; Díaz-Verdejo, Jesús E.; Mayor, Vicente
Anomaly-based Intrusion Detection System for smart lighting Artículo de revista
En: Internet of Things, vol. 28, pp. 101427, 2024, ISSN: 2542-6605.
@article{LARA2024101427,
title = {Anomaly-based Intrusion Detection System for smart lighting},
author = {Agustín Lara and Antonio Estepa and Rafael Estepa and Jesús E. Díaz-Verdejo and Vicente Mayor},
url = {https://www.sciencedirect.com/science/article/pii/S2542660524003688},
doi = {https://doi.org/10.1016/j.iot.2024.101427},
issn = {2542-6605},
year = {2024},
date = {2024-01-01},
urldate = {2024-01-01},
journal = {Internet of Things},
volume = {28},
pages = {101427},
abstract = {Smart Lighting Systems (SLS) are essential to smart cities, offering enhanced energy efficiency and public safety. However, they are susceptible to security threats, potentially leading to safety risks and service disruptions, making the protection of this infrastructure critical. This paper presents an anomaly-based Intrusion Detection System (IDS) designed for a real-world operational SLS. As commercial deployments vary in components, protocols, and functionalities, IDSs must be tailored to the specific characteristics of each deployment to perform effectively. Our anomaly-based IDS has been defined based on the properties of the available data and the types of attacks we aim to detect, offering both explainability and low complexity. The proposed system identifies anomalies in seven features of network traffic and in the telemetry data received at the central control (O&M) server. For the latter, we designed three customized detectors to identify abnormal data points, persistent deviations in street lamp power consumption, and abnormal power value based on the time of day. Validation with real-world data and simulated attacks demonstrates the effectiveness of our approach. Network attacks (e.g., DoS, scanning) were detected by at least one of the seven flow-related anomaly detectors, while simulated data poisoning attacks and operational technology (OT) issues were detected with nearly 90% accuracy. The datasets used in this work are publicly available and may serve as reference for the design of future IDSs. While our detectors were designed specifically for our dataset, the variables examined and vulnerabilities addressed are common in most commercial SLSs.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Muñoz-Calle, Javier; Alonso, Rafael Estepa; Alonso, Antonio Estepa; Díaz-Verdejo, Jesús E.; Fernández, Elvira Castillo; Madinabeitia, Germán
A Flexible Multilevel System for Mitre ATT&CK Model-driven Alerts and Events Correlation in Cyberattacks Detection Artículo de revista
En: JUCS – Journal of Universal Computer Science, vol. 30, no 9, pp. 1184-1204, 2024, ISSN: 0948-695X.
@article{10.3897/jucs.131686,
title = {A Flexible Multilevel System for Mitre ATT&CK Model-driven Alerts and Events Correlation in Cyberattacks Detection},
author = {Javier Muñoz-Calle and Rafael Estepa Alonso and Antonio Estepa Alonso and Jesús E. Díaz-Verdejo and Elvira Castillo Fernández and Germán Madinabeitia},
url = {https://doi.org/10.3897/jucs.131686},
doi = {10.3897/jucs.131686},
issn = {0948-695X},
year = {2024},
date = {2024-01-01},
urldate = {2024-01-01},
journal = {JUCS - Journal of Universal Computer Science},
volume = {30},
number = {9},
pages = {1184-1204},
publisher = {Journal of Universal Computer Science},
abstract = {Network monitoring systems can struggle to detect the full sequence of actions in a multi-step cyber attack, frequently resulting in multiple alerts (some of which are false positive (FP)) and missed actions. The challenge of easing the job of security analysts by triggering a single and accurate alert per attack requires developing and evaluating advanced event correlation techniques and models that have the potential to devise relationships between the different observed events/alerts.This work introduces a flexible architecture designed for hierarchical and iterative correlation of alerts and events. Its key feature is the sequential correlation of operations targeting specific attack episodes or aspects. This architecture utilizes IDS alerts or similar cybersecurity sensors, storing events and alerts in a non-relational database. Modules designed for knowledge creation then query these stored items to generate meta-alerts, also stored in the database. This approach facilitates creating a more refined knowledge that can be built on top of existing one by creating specialized modules. For illustrative purposes, we make a case study where we use this architectural approach to explore the feasibility of monitoring the progress of attacks of increased complexity by increasing the levels of the hyperalerts defined, including a case of a multi-step attack that adheres to the ATT&CK model. Although the mapping between the observations and the model components (i.e., techniques and tactics) is challenging, we could fully monitor the progress of two attacks and up to 5 out of 6 steps of the most complex attack by building up to three specialized modules. Despite some limitations due to the sensors and attack scenarios tested, the results indicate the architecture’s potential for enhancing the detection of complex cyber attacks, offering a promising direction for future cybersecurity research.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Díaz-Verdejo, Jesús E.; Estepa Alonso, Rafael; Estepa Alonso, Antonio; Muñoz-Calle, Javier; Madinabeitia, Germán
Biblio-US17: A labeled real URL dataset for anomaly-based intrusion detection systems development Proceedings Article
En: European Interdisciplinary Cybersecurity Conference (EICC 2024), pp. 217–218, 2024, ISBN: 9798400716515.
@inproceedings{Diaz-Verdejo2024b,
title = {Biblio-US17: A labeled real URL dataset for anomaly-based intrusion detection systems development},
author = {Jesús E. Díaz-Verdejo and {Estepa Alonso}, Rafael and {Estepa Alonso}, Antonio and Javier Muñoz-Calle and Germán Madinabeitia},
doi = {10.1145/3655693.3661319},
isbn = {9798400716515},
year = {2024},
date = {2024-01-01},
urldate = {2024-01-01},
booktitle = {European Interdisciplinary Cybersecurity Conference (EICC 2024)},
pages = {217–218},
abstract = {The development of anomaly-based intrusion detection systems is hindered by the scarcity of adequate datasets. An ideal dataset should contain real traffic, genuine attacks and cover a large time period that may demonstrate time shift. To be useful, the dataset must be labeled to provide accurate ground-truth, This paper presents a dataset of URLs that possesses these qualities. It can therefore be used to effectively train, test, and validate URL-based anomaly detection systems. The dataset is publicly available and contains 47M registers, including 320k attacks, and spans for 6.5 months. It is partitioned acording to two schemes to allow for time dependent and time independent experiments.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Díaz-Verdejo, J.; Alonso, R. Estepa; Alonso, A. Estepa; Muñoz-Calle, F. J.
Impacto de la evolución temporal de datasets reales en el rendimiento de un IDS basados en anomalías: estudio experimental sobre HTTP Proceedings Article
En: XI Jornadas Nacionales de Investigación en Ciberseguridad, pp. 302–309, 2024.
@inproceedings{DiazVerdejo2024,
title = {Impacto de la evolución temporal de datasets reales en el rendimiento de un IDS basados en anomalías: estudio experimental sobre HTTP},
author = {J. Díaz-Verdejo and R. Estepa Alonso and A. Estepa Alonso and F. J. Muñoz-Calle},
year = {2024},
date = {2024-01-01},
urldate = {2024-01-01},
booktitle = {XI Jornadas Nacionales de Investigación en Ciberseguridad},
pages = {302–309},
abstract = {El desarrollo y evaluación de sistemas de detección de intrusiones basados en anomalías es de vital importancia en el contexto de la ciberseguridad, especialmente en relación a los ataques de día cero. La naturaleza altamente diamica tanto de los sistemas a proteger como de los ataques hace que la detección de anomalías resulte una tarea compleja, ya que esta evolución temporal puede afectar a las capacidades de los modelos estimados en un escenario y periodo determinados. A pesar de su importancia, este efecto ha sido explorado de forma limitada en la literatura, especialmente por la prática inexistencia de datos reales convenientemente etiquetados con la suficiente extensión temporal. En el presente trabajo evaluamos experimentalmente el impacto de la evolución temporal en un sistema para la detección de ataques basados en URL utilizando datos reales capturados en un escenario real durante un periodo de tiempo relativamente extenso. Nuestros análisis demuestran una degradación de creciente con la distancia temporal entre el entrenamiento y la evaluación. Esta degradación es debida a la combinación de la pérdida de calidad del modelo con el tiempo así como a la propia variación del comportamiento del servicio y/o ataques a lo largo del tiempo.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Díaz-Verdejo, J.; Muñoz-Calle, J.; Alonso, R. Estepa; Alonso, A. Estepa
InspectorLog : A New Tool for Offline Attack Detection over Web Log Proceedings Article
En: Proceedings of the 21st International Conference on Security and Cryptography (SECRYPT 2024), pp. 692–697, 2024, ISBN: 9789897587092.
@inproceedings{Diaz-Verdejo2024a,
title = {InspectorLog : A New Tool for Offline Attack Detection over Web Log},
author = {J. Díaz-Verdejo and J. Muñoz-Calle and R. Estepa Alonso and A. Estepa Alonso},
doi = {10.5220/0012764000003767},
isbn = {9789897587092},
year = {2024},
date = {2024-01-01},
urldate = {2024-01-01},
booktitle = {Proceedings of the 21st International Conference on Security and Cryptography (SECRYPT 2024)},
number = {Secrypt},
pages = {692–697},
abstract = {InspectorLog is a novel tool for offline analysis of HTTP logs. The tool processes web server logs to identify attacks using diverse rule sets, focusing primarily on the URI field. It is compatible with standard rule formats from systems such as Snort, Nemesida, and ModSecurity. This paper describes InspectorLog functionalities, architecture and applications to the scientific community. We also experimentally validate InspectorLog by comparing its detection power with that of the IDS from which rules are taken. Inspector log fills a gap in available tools in cybersecurity practices in forensic analysis, dataset sanitization, and signature tuning. Future enhancements are planned to support additionalWeb Application Firewalls (WAFs), new rule types, and HTTP protocol methods, aiming to broaden its scope and utility in the ever-evolving domain of network security.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Díaz-Verdejo, Jesús; Alonso, Rafael Estepa; Alonso, Antonio Estepa; Muñoz-Calle, Javier
Insights into anomaly-based intrusion detection systems usability. A case study using real http requests Proceedings Article
En: Proc. European Interdisciplinary Cybersecurity Conference (EICC 2024), pp. 82–89, 2024, ISBN: 9798400716515.
@inproceedings{Diaz-Verdejo2024,
title = {Insights into anomaly-based intrusion detection systems usability. A case study using real http requests},
author = {Jesús Díaz-Verdejo and Rafael Estepa Alonso and Antonio Estepa Alonso and Javier Muñoz-Calle},
doi = {10.1145/3655693.3655745},
isbn = {9798400716515},
year = {2024},
date = {2024-01-01},
urldate = {2024-01-01},
booktitle = {Proc. European Interdisciplinary Cybersecurity Conference (EICC 2024)},
pages = {82–89},
abstract = {Intrusion detection systems based on anomalies (A-IDS) are crucial for detecting cyberattacks, especially zero-day attacks. Numerous A-IDS proposals in the literature report excellent performance according to established metrics and settings in a laboratory. However, finding systems implementing these proposals in real-world scenarios is challenging. This work explores, through a case study, the suitability of performance metrics commonly used in the scientific literature to real-world scenarios. Our case study will consider a Web attack detector based on URIs and a real, large-scale dataset. Our results show significant limitations in the performance metrics commonly used to select the system's operating point and its practical use in real-world scenarios.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
2023
Walabonso Lara, Agustín; Mayor, Vicente; Estepa Alonso, Rafael; Estepa Alonso, Antonio; Díaz-Verdejo, Jesús E.
Smart home anomaly-based IDS: Architecture proposal and case study Artículo de revista
En: Internet of Things, vol. 22, pp. 100773, 2023, ISSN: 2542-6605.
@article{Lara2023,
title = {Smart home anomaly-based IDS: Architecture proposal and case study},
author = { {Walabonso Lara}, Agustín and Vicente Mayor and {Estepa Alonso}, Rafael and {Estepa Alonso} , Antonio and Jesús E. {Díaz-Verdejo}},
url = {https://linkinghub.elsevier.com/retrieve/pii/S2542660523000963},
doi = {10.1016/J.IOT.2023.100773},
issn = {2542-6605},
year = {2023},
date = {2023-07-01},
urldate = {2023-07-01},
journal = {Internet of Things},
volume = {22},
pages = {100773},
publisher = {Elsevier},
abstract = {The complexity and diversity of the technologies involved in the Internet of Things (IoT) challenge the generalization of security solutions based on anomaly detection, which should fit the particularities of each context and deployment and allow for performance comparison. In this work, we provide a flexible architecture based on building blocks suited for detecting anomalies in the network traffic and the application-layer data exchanged by IoT devices in the context of Smart Home. Following this architecture, we have defined a particular Intrusion Detector System (IDS) for a case study that uses a public dataset with the electrical consumption of 21 home devices over one year. In particular, we have defined ten Indicators of Compromise (IoC) to detect network attacks and two anomaly detectors to detect false command or data injection attacks. We have also included a signature-based IDS (Snort) to extend the detection range to known attacks. We have reproduced eight network attacks (e.g., DoS, scanning) and four False Command or Data Injection attacks to test our IDS performance. The results show that all attacks were successfully detected by our IoCs and anomaly detectors with a false positive rate lower than 0.3%. Signature detection was able to detect only 4 out of 12 attacks. Our architecture and the IDS developed can be a reference for developing future IDS suited to different contexts or use cases. Given that we use a public dataset, our contribution can also serve as a baseline for comparison with new techniques that improve detection performance.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Castillo-Fernández, Elvira; Muñoz, Escolástico; Diaz-Verdejo, J.; Estepa Alonso, R; Estepa Alonso, A.
Diseño y despliegue de un laboratorio para formación e investigación en ciberseguridad Proceedings Article
En: Actas de las VIII Jornadas Nacionales de Investigación en Ciberseguridad (JNIC23) , pp. 445-452, 2023, ISBN: 978-84-8158-970-2.
@inproceedings{jnic23-cslab,
title = {Diseño y despliegue de un laboratorio para formación e investigación en ciberseguridad},
author = {Elvira Castillo-Fernández and Escolástico Muñoz and J. Diaz-Verdejo and {Estepa Alonso}, R and {Estepa Alonso}, A.},
isbn = {978-84-8158-970-2},
year = {2023},
date = {2023-06-21},
urldate = {2023-06-21},
booktitle = {Actas de las VIII Jornadas Nacionales de Investigación en Ciberseguridad (JNIC23) },
journal = {Actas de las VIII Jornadas Nacionales de Investigación en Ciberseguridad (JNIC23) - En revisión},
pages = {445-452},
abstract = {La realización de simulacros y/o experimentos para actividades de formación e investigación en ciberseguridad plantea serias dificultades prácticas por la ejecución de ataques a los sistemas que conforman la propia infraestructura. Se presentan múltiples requisitos, en ocasiones, incompatibles entre sí, como la necesidad de preservar la seguridad de los sistemas externos y de monitorización sin perder la conectividad hacia Internet, la capacidad de monitorización y adquisición de trazas de una forma segura, la flexibilidad que permita múltiples escenarios lo más realistas posible y una fácil reusabilidad del laboratorio. En el presente trabajo se propone e implementa una arquitectura para un laboratorio de ciberseguridad que presenta un equilibrio entre flexibilidad, funcionalidad, usabilidad y seguridad de las operaciones. La propuesta se basa en la división en una red de supervisión y una red de laboratorio sobre la que, mediante virtualización de bajo nivel, se pueden desarrollar los diferentes experimentos y ataques con riesgo mínimo de impacto sobre la red de supervisión. Para ello se establecen diferentes barreras, tanto físicas como lógicas, que permiten filtrar el tráfico entre ambas y la conectividad hacia Internet. Para mostrar la operación y capacidades de la arquitectura propuesta se presenta un caso de uso con un ataque multietapa que involucra diversos sistemas operativos y equipos.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Castillo-Fernández, E.; Diaz-Verdejo, J.; Estepa Alonso, R.; Estepa Alonso, A.
Riesgos en la Smart Home: estudio experimental Proceedings Article
En: Actas de las VIII Jornadas Nacionales de Investigación en Ciberseguridad (JNIC23), pp. 375-382, 2023, ISBN: 978-84-8158-970-2.
@inproceedings{jnic23-iot,
title = {Riesgos en la Smart Home: estudio experimental},
author = {E. Castillo-Fernández and J. Diaz-Verdejo and {Estepa Alonso}, R. and {Estepa Alonso}, A.},
isbn = {978-84-8158-970-2},
year = {2023},
date = {2023-06-21},
urldate = {2023-06-21},
booktitle = {Actas de las VIII Jornadas Nacionales de Investigación en Ciberseguridad (JNIC23)},
pages = {375-382},
abstract = {En este trabajo realizamos una evaluación preliminar de los riesgos de ciberseguridad en un escenario de aplicación típico de SmartHome: una vivienda unifamiliar. Para ello se han desplegado varias tecnologías comúnmente utilizadas en este contexto y se ha monitorizado el tráfico asociado a los dispositivos y servidores SmartHome. A partir del análisis realizado se ha constatado la existencia de ataques, patrones de comunicación anómalos entre dispositivos y con servidores externos, así como vulnerabilidades asociadas a debilidades en las configuraciones de los dispositivos y los protocolos desplegados, algunos de ellos propietarios. Adicionalmente, para algunos dispositivos se ha constatado una gran dependencia de la nube, lo que facilita la indisponibilidad de algunos servicios en caso de fallos en la conexión con nube. El resultado evidencia un pobre tratamiento de la ciberseguridad por la mayoría de los operadores del sector y un riesgo en este tipo de instalaciones que puede pasar inadvertido al usuario.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Lara, Agustín W.; Ternero, J. A.; Estepa Alonso, Rafael; Estepa Alonso, Antonio; Ruiz-Robles, Fernando; Díaz-Verdejo, Jesús E.
HTTP Cyberattacks Detection through Automatic Signature Generation in multi-site IoT Deployments Proceedings Article
En: Proc. European Interdisciplinary Cybersecurity Conference (EICC 2023) , pp. 6, 2023.
@inproceedings{eicc2-firmas,
title = {HTTP Cyberattacks Detection through Automatic Signature Generation in multi-site IoT Deployments},
author = {Agustín W. Lara and J.A. Ternero and {Estepa Alonso}, Rafael and {Estepa Alonso}, Antonio and Fernando Ruiz-Robles and Jesús E. Díaz-Verdejo
},
doi = {10.1145/3590777.3590788},
year = {2023},
date = {2023-06-14},
urldate = {2023-06-14},
booktitle = {Proc. European Interdisciplinary Cybersecurity Conference (EICC 2023)
},
pages = {6},
abstract = { IoT deployments often include a web-interface server for managerial purposes. Signature-based Intrusion Detection Systems are commonly used to detect HTTP attacks on these web servers. The standard signature repositories used by these defensive systems can be enhanced with new signatures generated automatically from attacks detected with anomaly detection techniques.
This work presents a scheme for generating such anomaly-based signatures from HTTP attacks in a way that avoids excessive false positives. The signatures generated are distributed to peer sites in a multi-site environment. We also present a case study based on an IoT real-life dataset collected at four different SmartLight deployments from the same organization. Our results show a notable performance improvement (from $24.1%$ to $66.7%$) when anomaly-based signatures are added to the standard default Snort ruleset and distributed to the other three sites.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
This work presents a scheme for generating such anomaly-based signatures from HTTP attacks in a way that avoids excessive false positives. The signatures generated are distributed to peer sites in a multi-site environment. We also present a case study based on an IoT real-life dataset collected at four different SmartLight deployments from the same organization. Our results show a notable performance improvement (from $24.1%$ to $66.7%$) when anomaly-based signatures are added to the standard default Snort ruleset and distributed to the other three sites.
Fernández, Elvira Castillo; Díaz-Verdejo, Jesús E.; Estepa Alonso, Rafael; Estepa Alonso, Antonio; Muñoz-Calle, Javier; Madinabeitia, Germán
Multistep Cyberattacks Detection using a Flexible Multilevel System for Alerts and Events Correlation Proceedings Article
En: Proc. European Interdisciplinary Cybersecurity Conference (EICC 2023), pp. 6, 2023.
@inproceedings{eicc23-attacks,
title = {Multistep Cyberattacks Detection using a Flexible Multilevel System for Alerts and Events Correlation},
author = {Elvira {Castillo Fernández} and Jesús E. {Díaz-Verdejo} and {Estepa Alonso}, Rafael and {Estepa Alonso}, Antonio and Javier {Muñoz-Calle} and Germán Madinabeitia},
doi = {10.1145/3590777.3590778},
year = {2023},
date = {2023-06-14},
urldate = {2023-06-14},
booktitle = {Proc. European Interdisciplinary Cybersecurity Conference (EICC 2023)},
pages = {6},
abstract = {Current network monitoring systems tend to generate several alerts per attack, especially in multistep attacks. However, Cybersecurity Officers (CSO) would rather receive a single alert summarizing the entire incident. Triggering a single alert per attack is a challenge that requires developing and evaluating advanced event correlation techniques and models to determine the relationships between the different observed events/alerts.
In this work, we propose a flexible architecture oriented toward the correlation and aggregation of events and alerts in a multilevel iterative approach.
In our scheme, sensors generate events and alerts that are stored in a non-relational database queried by modules that create knowledge structured as meta-alerts that are also stored in the database. These meta-alerts (also called hyperalerts) are, in turn, used iteratively to create new knowledge. This iterative approach can be used to aggregate information at multiple levels or steps in complex attack models.
Our architecture also allows the incorporation of additional sensors and the evaluation of various correlation techniques and multistage attack models. The capabilities of the system are assessed through three case studies.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
In this work, we propose a flexible architecture oriented toward the correlation and aggregation of events and alerts in a multilevel iterative approach.
In our scheme, sensors generate events and alerts that are stored in a non-relational database queried by modules that create knowledge structured as meta-alerts that are also stored in the database. These meta-alerts (also called hyperalerts) are, in turn, used iteratively to create new knowledge. This iterative approach can be used to aggregate information at multiple levels or steps in complex attack models.
Our architecture also allows the incorporation of additional sensors and the evaluation of various correlation techniques and multistage attack models. The capabilities of the system are assessed through three case studies.
Díaz-Verdejo, Jesús E.; Estepa Alonso, Rafael; Estepa Alonso, Antonio; Madinabeitia, German
A critical review of the techniques used for anomaly detection of HTTP-based attacks: taxonomy, limitations and open challenges Artículo de revista
En: Computers and Security, vol. 124, pp. 102997, 2023, ISSN: 01674048.
@article{Diaz-Verdejo2023,
title = {A critical review of the techniques used for anomaly detection of HTTP-based attacks: taxonomy, limitations and open challenges},
author = {Jesús E. Díaz-Verdejo and {Estepa Alonso}, Rafael and {Estepa Alonso}, Antonio and German Madinabeitia},
doi = {10.1016/j.cose.2022.102997},
issn = {01674048},
year = {2023},
date = {2023-01-01},
urldate = {2023-01-01},
journal = {Computers and Security},
volume = {124},
pages = {102997},
abstract = {Intrusion Detection Systems (IDSs) and Web Application Firewalls (WAFs) offer a crucial layer of defense that allows organizations to detect cyberattacks on their web servers. Academic research overwhelmingly suggests using anomaly detection techniques to improve the performance of these defensive systems. However, analyzing and comparing the wide range of solutions in the scientific literature is challenging since they are typically presented as isolated (unrelated) contributions, and their results cannot be generalized. We believe that this impairs the industry's adoption of academic results and the advancement of research in this field. This paper aims to shed light on the literature on anomaly-based detection of attacks that use HTTP request messages. We define a novel framework for anomaly detection based on six data processing steps grouped into two sequential phases: preprocessing and classification. Based on this framework, we provide a taxonomy and critical review of the techniques surveyed, emphasizing their limitations and applicability. Future approaches should take advantage of the syntax and semantics of the Uniform Resource Locator (URL), be scalable, and address their obsolescence. These aspects are frequently overlooked in the literature and pose a significant challenge in the current era of web services. For better comparability, authors should use adequate public datasets, follow a thorough methodology, and use appropriate metrics that fully show the pros and cons of the approach.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Muñoz-calle, Javier; Fructuoso, Javier; Estepa, Rafael; Estepa, Antonio
Evaluación experimental de las capacidades de detección de ciberataques basados en técnicas del modelo ATT & CK mediante Snort Proceedings Article
En: Actas de las XVI Jornadas de Ingeniería Telemática – JITEL 2023, pp. 5–8, 2023.
@inproceedings{Munoz-calle2023,
title = {Evaluación experimental de las capacidades de detección de ciberataques basados en técnicas del modelo ATT & CK mediante Snort},
author = {Javier Muñoz-calle and Javier Fructuoso and Rafael Estepa and Antonio Estepa},
year = {2023},
date = {2023-01-01},
urldate = {2023-01-01},
booktitle = {Actas de las XVI Jornadas de Ingeniería Telemática - JITEL 2023},
pages = {5–8},
abstract = {ATT&CK establece un modelo donde se especifican las fases secuenciales de un ciberataque, as´ı como las t´ecnicas que suelen ser usadas en cada paso del ataque. Ser´ıa interesante incorporar este modelo en el proceso de detecci´on de los ciberataques ya que facilitar´ıa la correlaci´on de las numerosas alertas generadas por los sistemas de monitorizaci´on de red. Sin embargo, la aplicaci´on del modelo en los procesos de correlaci´on de eventos no es inmediata, ya que no est´a formulado en t´erminos de eventos observables y/o detecciones sino de acciones a realizar. En el presente trabajo exploramos y evaluamos los elementos necesarios para incorporar el modelo ATT&CK en el procesamiento de la informaci´on generada por los sistemas de monitorizaci´on de la seguridad en la red.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Castillo-Fernández, Elvira; Díaz-Verdejo, Jesús Esteban; Alonso, Rafael María Estepa; Alonso, Antonio Estepa; Muñoz-Calle, Fco Javier
Uso practico del modelo ATT&CK para la detección de ciberataques Proceedings Article
En: Actas de las XVI Jornadas de Ingeniería Telemática – JITEL 2023, pp. 1–4, 2023, ISBN: 9783131450715.
@inproceedings{Castillo-Fernandez2023,
title = {Uso practico del modelo ATT&CK para la detección de ciberataques},
author = {Elvira Castillo-Fernández and Jesús Esteban Díaz-Verdejo and Rafael María Estepa Alonso and Antonio Estepa Alonso and Fco Javier Muñoz-Calle},
isbn = {9783131450715},
year = {2023},
date = {2023-01-01},
urldate = {2023-01-01},
booktitle = {Actas de las XVI Jornadas de Ingeniería Telemática - JITEL 2023},
pages = {1–4},
abstract = {ATT&CK establece un modelo donde se especifican las fases secuenciales de un ciberataque, así como las técnicas que suelen ser usadas en cada paso del ataque. Sería interesante incorporar este modelo en el proceso de detección de los ciberataques ya que facilitaría la correlación de las numerosas alertas generadas por los sistemas de monitorización de red. Sin embargo, la aplicación del modelo en los procesos de correlación de eventos no es inmediata, ya que no está formulado en términos de eventos observables y/o detecciones sino de acciones a realizar. En el presente trabajo exploramos y evaluamos los elementos necesarios para incorporar el modelo ATT&CK en el procesamiento de la información generada por los sistemas de monitorización de la seguridad en la red.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
2022
Alonso, Antonio Estepa; Alonso, Rafael Estepa; Wideberg, Johan; Díaz-Verdejo, Jesús; Marquez, Adolfo Crespo
Smart Detection of Cyberattacks in IoT servers: Application to smart lighting and other smart city applications Proceedings Article
En: Leva, Maria Chiara; Petelli, Edoardo; Podofillini, Luca; Wilson, Simon (Ed.): European Conference on Safety and Reliability (ESREL 2022), pp. 3-4, 2022.
@inproceedings{esrel22,
title = {Smart Detection of Cyberattacks in IoT servers: Application to smart lighting and other smart city applications},
author = {Antonio {Estepa Alonso} and Rafael {Estepa Alonso} and Johan Wideberg and Jesús {Díaz-Verdejo} and Adolfo {Crespo Marquez}},
editor = {Maria {Chiara Leva} and Edoardo Petelli and Luca Podofillini and Simon Wilson},
year = {2022},
date = {2022-08-31},
urldate = {2022-08-31},
booktitle = {European Conference on Safety and Reliability (ESREL 2022)},
journal = {European Conference on Safety and Reliability (ESREL 2022)},
pages = {3-4},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Díaz-Verdejo, J. E.; Muñoz-Calle, F. J.; Estepa Alonso, A.; Estepa Alonso, R.; Madinabeitia, G.
On the Detection Capabilities of Signature-Based Intrusion Detection Systems in the Context of Web Attacks Artículo de revista
En: Applied Sciences, vol. 12, no 2, pp. 852, 2022, ISSN: 20763417.
@article{Diaz-Verdejo2022,
title = {On the Detection Capabilities of Signature-Based Intrusion Detection Systems in the Context of Web Attacks},
author = {J. E. Díaz-Verdejo and F. J. Muñoz-Calle and {Estepa Alonso}, A. and {Estepa Alonso}, R. and G. Madinabeitia},
url = {https://www.mdpi.com/2076-3417/12/2/852/htm https://www.mdpi.com/2076-3417/12/2/852},
doi = {10.3390/app12020852},
issn = {20763417},
year = {2022},
date = {2022-01-01},
urldate = {2022-01-01},
journal = {Applied Sciences},
volume = {12},
number = {2},
pages = {852},
publisher = {Multidisciplinary Digital Publishing Institute},
abstract = {Signature-based Intrusion Detection Systems (SIDS) play a crucial role within the arsenal of security components of most organizations. They can find traces of known attacks in the network traffic or host events for which patterns or signatures have been pre-established. SIDS include standard packages of detection rulesets, but only those rules suited to the operational environment should be activated for optimal performance. However, some organizations might skip this tuning process and instead activate default off-the-shelf rulesets without understanding its implications and trade-offs. In this work, we help gain insight into the consequences of using predefined rulesets in the performance of SIDS. We experimentally explore the performance of three SIDS in the context of web attacks. In particular, we gauge the detection rate obtained with predefined subsets of rules for Snort, ModSecurity and Nemesida using seven attack datasets. We also determine the precision and rate of alert generated by each detector in a real-life case using a large trace from a public webserver. Results show that the maximum detection rate achieved by the SIDS under test is insufficient to protect systems effectively and is lower than expected for known attacks. Our results also indicate that the choice of predefined settings activated on each detector strongly influences its detection capability and false alarm rate. Snort and ModSecurity scored either a very poor detection rate (activating the less-sensitive predefined ruleset) or a very poor precision (activating the full ruleset). We also found that using various SIDS for a cooperative decision can improve the precision or the detection rate, but not both. Consequently, it is necessary to reflect upon the role of these open-source SIDS with default configurations as core elements for protection in the context of web attacks. Finally, we provide an efficient method for systematically determining which rules deactivate from a ruleset to significantly reduce the false alarm rate for a target operational environment. We tested our approach using Snort’s ruleset in our real-life trace, increasing the precision from 0.015 to 1 in less than 16 h of work.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Muñoz, Javier; Bueno, Felipe; Estepa, Rafael; Estepa, Antonio; Díaz-Verdejo, Jesús E.
Ataques a servidores web: estudio experimental de la capacidad de detección de algunos SIDS gratuitos Proceedings Article
En: Actas de las VII Jornadas Nacionales de Investigación en Ciberseguridad (JNIC'22), pp. 22–25, 2022, ISBN: 9878488734136.
@inproceedings{Munoz-jnic22,
title = {Ataques a servidores web: estudio experimental de la capacidad de detección de algunos SIDS gratuitos},
author = {Javier Muñoz and Felipe Bueno and Rafael Estepa and Antonio Estepa and Jesús E. Díaz-Verdejo},
isbn = {9878488734136},
year = {2022},
date = {2022-01-01},
urldate = {2022-01-01},
booktitle = {Actas de las VII Jornadas Nacionales de Investigación en Ciberseguridad (JNIC'22)},
pages = {22--25},
abstract = {Este trabajo cuantifica de forma experimental la capacidad de detección de ataques a servidores web ofrecida por algunos de los detectores de intrusiones basados en firmas (SIDS) disponibles de forma gratuita. Para ello, se ha realizado una búsqueda y selección de 28 herramientas actuales para la generación de ataques y análisis de seguridad del servicio web. Con ellas, se han realizado casi 150 ataques a dos escenarios de uso de un servidor web (una web estática y una dinámica). Las peticiones HTTP registradas durante los ataques han sido utilizadas para crear un dataset de ataques que será utilizado como entrada a tres SIDS gratuitos seleccionados por su amplio uso, de forma que se podrá determinar la capacidad de detección de los mismos frente a los ataques generados. Este trabajo se encuentra aún en desarrollo, por lo que en esta contribución se muestran los primeros resultados relativos a la recolección y selección de herramientas para la generación de los ataques, la generación del dataset de ataques de forma que sea representativo de los ataques actuales y la evaluación preliminar de las capacidades de detección.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
2021
Alonso, R. Estepa; Diaz-Verdejo, J.; Alonso, A. Estepa; Madinabeitia, G.; Muñoz, F. J.
Generación automática de firmas para detección de ciberataques basados en URI Actas de congresos
2021.
@proceedings{jitel-firmas,
title = {Generación automática de firmas para detección de ciberataques basados en URI},
author = {R. {Estepa Alonso} and J. {Diaz-Verdejo} and A. {Estepa Alonso} and G. {Madinabeitia} and F. J. {Muñoz} },
year = {2021},
date = {2021-10-30},
urldate = {2021-10-30},
booktitle = {Actas de las XV Jornadas de Ingeniería Telemática (JITEL 2021)},
journal = {Actas de las XV Jornadas de Ingeniería Telemática (JITEL 2021)},
pages = {22-25},
abstract = {La mayor parte de los sistemas de detección de intrusiones (IDS) operativos se basan en el uso de firmas que permiten identificar ataques conocidos. La dependencia de estos IDS con la actualización de
las bases de datos de firmas constituye una de sus mayores limitaciones, siendo de interés el desarrollo de sistemas que posibiliten la generación automática o supervisada de firmas.
En el presente trabajo se evalúa experimentalmente un sistema para la generación de firmas a partir de un IDS basado en anomal´ıas propuesto en un trabajo previo. También se desarrolla y evalúa un
sistema automatizado para la selección del punto de operación óptimo del generador de firmas. Los resultados preliminares de este trabajo en curso muestran que se pueden generar firmas nuevas que aumenten la capacidad de detección del IDS basados en firmas o patrones conocidos (SIDS) controlando el número de falsos positivos introducidos.},
keywords = {},
pubstate = {published},
tppubtype = {proceedings}
}
las bases de datos de firmas constituye una de sus mayores limitaciones, siendo de interés el desarrollo de sistemas que posibiliten la generación automática o supervisada de firmas.
En el presente trabajo se evalúa experimentalmente un sistema para la generación de firmas a partir de un IDS basado en anomal´ıas propuesto en un trabajo previo. También se desarrolla y evalúa un
sistema automatizado para la selección del punto de operación óptimo del generador de firmas. Los resultados preliminares de este trabajo en curso muestran que se pueden generar firmas nuevas que aumenten la capacidad de detección del IDS basados en firmas o patrones conocidos (SIDS) controlando el número de falsos positivos introducidos.
Diaz-Verdejo, J.; Muñoz, F. J.; Alonso, R. Estepa; Alonso, A. Estepa; Madinabeitia, G.
Sobre las capacidades de detección de los IDS basados en firmas Proceedings Article
En: Serrano, Manuel A.; Fernández-Medina, Eduardo; Alcaraz, Cristina; Castro, Noemí; Calvo, Guillermo (Ed.): Actas de las VI Jornadas Nacionales de Investigación en Ciberseguridad, pp. 55–64, Ediciones de la Universidad de Castilla-La Mancha, 2021, ISBN: 9788490444634.
@inproceedings{diaz-verdejo-jnic21,
title = {Sobre las capacidades de detección de los IDS basados en firmas},
author = {J. Diaz-Verdejo and F. J. Muñoz and R. Estepa Alonso and A. Estepa Alonso and G. Madinabeitia},
editor = {Manuel A. Serrano and Eduardo Fernández-Medina and Cristina Alcaraz and Noemí Castro and Guillermo Calvo},
url = {https://ruidera.uclm.es/xmlui/handle/10578/28597},
doi = {10.18239/jornadas_2021.34.00},
isbn = {9788490444634},
year = {2021},
date = {2021-01-01},
urldate = {2021-01-01},
booktitle = {Actas de las VI Jornadas Nacionales de Investigación en Ciberseguridad},
pages = {55--64},
publisher = {Ediciones de la Universidad de Castilla-La Mancha},
series = {Colección Jornadas y Congresos},
abstract = {Los sistemas de detección de intrusiones (IDS) pueden detectar actividades maliciosas y generar alertas a supervisar, por lo que constituyen el n´ ucleo de los sistemas de monitorización de la seguridad de las redes. Tradicionalmente, se ha asumido que los IDS basados en firmas (SIDS) ofrecen una capacidad de detección y tasa de falsos positivos adecuadas, presentando limitaciones sólo en la detección de ataques 0-day. Sin embargo, estas capacidades están inequívocamente asociadas a la calidad de las firmas disponibles, que varían no sólo en el tiempo sino con la herramienta concreta utilizada. En este trabajo se exploran las capacidades de diversos sistemas SIDS ampliamente utilizados en un escenario real en el contexto de servicios web. Asimismo, se analiza la evolución de sus prestaciones a lo largo del tiempo considerando la actualización de las firmas. Los resultados de nuestras pruebas evidencian una gran variabilidad en las prestaciones en función de la herramienta seleccionada, así como una deficiente cobertura de ataques conocidos, incluso cuando se optimizan las reglas para ajustarse al sistema a proteger. Consecuentemente, es necesario revisar el papel de los SIDS como elementos de protección, ya que pueden proporcionar una falsa sensación de seguridad.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Román, Isabel; Madinabeitia, Germán; Estepa, Rafael; Díaz-Verdejo, Jesús; Estepa, Antonio; González-Sánchez, José Luis; Prieto, Felipe Lemuz
Aplicación de control de acceso y técnicas de Blockchain para el control de datos genéticos Proceedings Article
En: Actas de las VI Jornadas Nacionales de Investigación en Ciberseguridad, pp. 293–299, 2021, ISBN: 9788490444634.
@inproceedings{Roman2021,
title = {Aplicación de control de acceso y técnicas de Blockchain para el control de datos genéticos},
author = {Isabel Román and Germán Madinabeitia and Rafael Estepa and Jesús Díaz-Verdejo and Antonio Estepa and José Luis González-Sánchez and Felipe Lemuz Prieto},
url = {https://ruidera.uclm.es/xmlui/handle/10578/28677},
doi = {10.18239/jornadas_2021.34.67},
isbn = {9788490444634},
year = {2021},
date = {2021-01-01},
booktitle = {Actas de las VI Jornadas Nacionales de Investigación en Ciberseguridad},
pages = {293--299},
abstract = {Este trabajo presenta una solución al reto de mejorar la trazabilidad del acceso a información genética almacenada en una aplicación propietaria a trav´es del uso de blockchain. Para ello se realizan tres acciones: (a) se normaliza la estructura y acceso a los datos conforme al estándar sanitario FHIR; (b) se dise ña una arquitectura normalizada de control de acceso a los datos en la que el paciente puede administrar las políticas de acceso a sus datos clínicos compatible con el RGDP; (c) se securiza mediante blockchain la trazabilidad del acceso a los datos. Los resultados de las tres acciones anteriores se integran en un demostrador o una aplicación piloto que tiene las siguientes características: (a) arquitectura SOA con interfaces normalizados de acceso que siguen el estándar FHIR; (b) cuenta con sistema distribuido de control de acceso de grano fino que sigue el estándard XACML/SAML; (c) utiliza blockchain de forma que se garantice la trazabilidad y la integridad de los registros de acceso al sistema.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Estepa, Rafael; Estepa, Antonio; Díaz-Verdejo, Jesús; Lara, Agustín W; Madinabeitia, Germán; Sánchez, José A. Morales
Diseño de un IDS basado en anomalías para IoT: caso de estudio en SmartCities Proceedings Article
En: Actas de las VI Jornadas Nacionales de Investigación en Ciberseguridad, pp. 135–138, 2021.
@inproceedings{Estepa-jnic2021,
title = {Diseño de un IDS basado en anomalías para IoT: caso de estudio en SmartCities},
author = {Rafael Estepa and Antonio Estepa and Jesús Díaz-Verdejo and Agustín W Lara and Germán Madinabeitia and José A. Morales Sánchez},
url = {https://ruidera.uclm.es/xmlui/handle/10578/28638},
doi = {10.18239/jornadas_2021.34.30},
year = {2021},
date = {2021-01-01},
urldate = {2021-01-01},
booktitle = {Actas de las VI Jornadas Nacionales de Investigación en Ciberseguridad},
pages = {135--138},
abstract = {Los sistemas de Smart-City constituyen un campo específico en el IoT. Las soluciones de ciberseguridad IT tradicionales son excesivamente genéricas y poco eficientes para este tipo de instalaciones con escasos recursos computacionales y de coste limitado. Por ello, en conjunción con una empresa del sector, se está desarrollando un proyecto para la detección de incidentes de seguridad de un sistema de Iluminación Inteligente. En este artículo se describen los resultados iniciales del proyecto.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
2020
Díaz-Verdejo, Jesús E.; Estepa, Antonio; Estepa, Rafael; Madinabeitia, German; Muñoz-Calle, Fco Javier
A methodology for conducting efficient sanitization of HTTP training datasets Artículo de revista
En: Future Generation Computer Systems, vol. 109, pp. 67–82, 2020, ISSN: 0167739X.
@article{Diaz-Verdejo2020,
title = {A methodology for conducting efficient sanitization of HTTP training datasets},
author = {Jesús E. Díaz-Verdejo and Antonio Estepa and Rafael Estepa and German Madinabeitia and Fco Javier Muñoz-Calle},
url = {https://linkinghub.elsevier.com/retrieve/pii/S0167739X19322629},
doi = {10.1016/j.future.2020.03.033},
issn = {0167739X},
year = {2020},
date = {2020-08-01},
urldate = {2020-08-01},
journal = {Future Generation Computer Systems},
volume = {109},
pages = {67--82},
publisher = {Elsevier B.V.},
abstract = {The performance of anomaly-based intrusion detection systems depends on the quality of the datasets used to form normal activity profiles. Suitable datasets should include high volumes of real-life data free from attack instances. On account of this requirement, obtaining quality datasets from collected data requires a process of data sanitization that may be prohibitive if done manually, or uncertain if fully automated. In this work, we propose a sanitization approach for obtaining datasets from HTTP traces suited for training, testing, or validating anomaly-based attack detectors. Our methodology has two sequential phases. In the first phase, we clean known attacks from data using a pattern-based approach that relies on tools that detect URI-based known attacks. In the second phase, we complement the result of the first phase by conducting assisted manual labeling systematically and efficiently, setting the focus of expert examination not on the raw data (which would be millions of URIs), but on the set of words that compose the URIs. This dramatically downsizes the volume of data that requires expert discernment, making manual sanitization of large datasets feasible. We have applied our method to sanitize a trace that includes 45 million requests received by the library web server of the University of Seville. We were able to generate clean datasets in less than 84 h with only 33 h of manual supervision. We have also applied our method to some public benchmark datasets, confirming that attacks unnoticed by signature-based detectors can be discovered in a reduced time span.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Estepa, R.; Díaz-Verdejo, J. E.; Estepa, A.; Madinabeitia, G.
How Much Training Data is Enough? A Case Study for HTTP Anomaly-Based Intrusion Detection Artículo de revista
En: IEEE Access, vol. 8, pp. 44410-44425, 2020, ISSN: 2169-3536.
@article{2020-howmuch,
title = {How Much Training Data is Enough? A Case Study for HTTP Anomaly-Based Intrusion Detection},
author = {R. Estepa and J. E. Díaz-Verdejo and A. Estepa and G. Madinabeitia},
doi = {10.1109/ACCESS.2020.2977591},
issn = {2169-3536},
year = {2020},
date = {2020-03-02},
journal = {IEEE Access},
volume = {8},
pages = {44410-44425},
abstract = {Most anomaly-based intrusion detectors rely on models that learn from training datasets whose quality is crucial in their performance. Albeit the properties of suitable datasets have been formulated, the influence of the dataset size on the performance of the anomaly-based detector has received scarce attention so far. In this work, we investigate the optimal size of a training dataset. This size should be large enough so that training data is representative of normal behavior, but after that point, collecting more data may result in unnecessary waste of time and computational resources, not to mention an increased risk of overtraining. In this spirit, we provide a method to find out when the amount of data collected at the production environment is representative of normal behavior in the context of a detector of HTTP URI attacks based on 1-grammar. Our approach is founded on a set of indicators related to the statistical properties of the data. These indicators are periodically calculated during data collection, producing time series that stabilize when more training data is not expected to translate to better system performance, which indicates that data collection can be stopped. We present a case study with real-life datasets collected at the University of Seville (Spain) and a public dataset from the University of Saskatchewan. The application of our method to these datasets showed that more than 42% of one trace, and almost 20% of another were unnecessarily collected, thereby showing that our proposed method can be an efficient approach for collecting training data at the production environment.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
2019
Salah, S.; Maciá-Fernández, G.; Díaz-Verdejo, J. E.
Fusing information from tickets and alerts to improve the incident resolution process Artículo de revista
En: Information Fusion, vol. 45, 2019, ISSN: 15662535.
@article{Salah2019,
title = {Fusing information from tickets and alerts to improve the incident resolution process},
author = {S. Salah and G. Maciá-Fernández and J. E. Díaz-Verdejo},
doi = {10.1016/j.inffus.2018.01.011},
issn = {15662535},
year = {2019},
date = {2019-01-01},
journal = {Information Fusion},
volume = {45},
abstract = {textcopyright 2018 Elsevier B.V. In the context of network incident monitoring, alerts are useful notifications that provide IT management staff with information about incidents. They are usually triggered in an automatic manner by network equipment and monitoring systems, thus containing only technical information available to the systems that are generating them. On the other hand, ticketing systems play a different role in this context. Tickets represent the business point of view of incidents. They are usually generated by human intervention and contain enriched semantic information about ongoing and past incidents. In this article, our main hypothesis is that incorporating tickets information into the alert correlation process will be beneficial to the incident resolution life-cycle in terms of accuracy, timing, and overall incident's description. We propose a methodology to validate this hypothesis and suggest a solution to the main challenges that appear. The proposed correlation approach is based on the time alignment of the events (alerts and tickets) that affect common elements in the network. For this we use real alert and ticket datasets obtained from a large telecommunications network. The results have shown that using ticket information enhances the incident resolution process, mainly by reducing and aggregating a higher percentage of alerts compared with standard alert correlation systems that only use alerts as the main source of information. Finally, we also show the applicability and usability of this model by applying it to a case study where we analyze the performance of the management staff.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Díaz-Verdejo, Jesús; Alonso, Rafael Estepa; Alonso, Antonio Estepa; Madinabeitia, Germán
Metodología supervisada para la obtención de trazas limpias del servicio HTTP Proceedings Article
En: Actas de las V Jornadas Nacionales de Investigación en Ciberseguridad, pp. 78–85, 2019.
@inproceedings{Diaz-verdejo2019,
title = {Metodología supervisada para la obtención de trazas limpias del servicio HTTP},
author = {Jesús Díaz-Verdejo and Rafael Estepa Alonso and Antonio Estepa Alonso and Germán Madinabeitia},
year = {2019},
date = {2019-01-01},
booktitle = {Actas de las V Jornadas Nacionales de Investigación en Ciberseguridad},
pages = {78--85},
abstract = {Disponer de datos adecuados para el entrenamiento, evaluación y validación de sistemas de detección de intrusos basados en anomalías representa un problema de índole práctica relevante. Las características requeridas para los datos plantean una serie de retos contrapuestos entre los que destaca la necesidad de disponer de un volumen significativo de datos reales que no contenga instancias de ataques. Esto implica un proceso de limpieza y supervisión que puede resultar muy costoso si se realiza manualmente. En este trabajo planteamos una metodología para automatizar en lo posible la adquisición y acondicionamiento de trazas del servicio HTTP para la detección de ataques basada en URI. Esta metodología se aplica con buenos resultados sobre una traza real como caso de estudio.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Alonso, Antonio J. Estepa; Díaz-Verdejo, Jesús E.; Ramírez, Estefanía Osma; Alonso, Rafael M. Estepa; Luque, Germán Madinabeitia; Romero, Agustín W. Lara
Ciberseguridad en entornos de generación eléctrica en parques renovables. Resumen extendido Proceedings Article
En: Actas de las V Jornadas Nacionales de Investigación en Ciberseguridad, pp. 334–335, 2019, ISBN: 978-84-09-12121-2.
@inproceedings{Alonso2019,
title = {Ciberseguridad en entornos de generación eléctrica en parques renovables. Resumen extendido},
author = {Antonio J. Estepa Alonso and Jesús E. Díaz-Verdejo and Estefanía Osma Ramírez and Rafael M. Estepa Alonso and Germán Madinabeitia Luque and Agustín W. Lara Romero},
isbn = {978-84-09-12121-2},
year = {2019},
date = {2019-01-01},
booktitle = {Actas de las V Jornadas Nacionales de Investigación en Ciberseguridad},
pages = {334--335},
abstract = {Este documento presenta un proyecto en curso en el marco de ciberseguridad en entornos industriales de generación eléctrica. Por limitaciones de espacio y por motivos de confidencialidad, tan sólo se describirá el contexto de este proyecto, el alcance esperado y los requisitos que debe cumplir la solución de ciberseguridad. Por último se realiza una breve introducción al diseño inicial de la solución propuesta siguiendo la aproximación de Mínimo Producto Viable. Dicha solución se basa en la definición de Indicadores de Compromiso IoC para la detección anomalías y vulnerabilidades en la planta.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
2018
Díaz-Verdejo, J.; Estepa, R.; Estepa, A.; Madinabeitia, G.; Rodríguez, D.
Metodología para la generacion de conjuntos de datos de ataques basados en URI de HTTP Proceedings Article
En: Actas de las V Jornadas Nacionales de Investigación en Ciberseguridad, pp. 119–126, 2018, ISBN: 978-84-09-02697-5.
@inproceedings{diaz-verdejo-jnic2018,
title = {Metodología para la generacion de conjuntos de datos de ataques basados en URI de HTTP},
author = {J. Díaz-Verdejo and R. Estepa and A. Estepa and G. Madinabeitia and D. Rodríguez},
isbn = {978-84-09-02697-5},
year = {2018},
date = {2018-01-01},
booktitle = {Actas de las V Jornadas Nacionales de Investigación en Ciberseguridad},
pages = {119--126},
abstract = {El desarrollo de sistemas de detección de intrusiones basadas en web, o de firewalls de aplicación web, requiere el uso de conjuntos de datos (datasets) apropiados para el entrenamiento y evaluación. Una elección inadecuada de los mismos resultará en sesgos e imprecisiones que pueden invalidar la experimentación y, consecuentemente, la evaluación de las capacidades de detección de la/s técnica/s analizada/s. El problema es especialmente relevante en el caso de los sistemas basados en anomalías, ya que se requiere disponer de ataques adecuados al entorno de experimentación. En el presente trabajo se propone una metodología para la generación de datasets adaptados a las necesidades de la experimentación y del escenario de uso, mediante el uso de la combinación y parametrización de diferentes fuentes de ataques. Además, se ha implementado una herramienta que sigue la metodología propuesta, generando dos datasets con 800 y 1.100 instancias de ataque respectivamente, que responden a las necesidades de la experimentación particular de un sistema de detección de anomalías en peticiones HTTP. No obstante, la metodología desarrollada es suficientemente genérica para permitir la generación de datasets adecuados al desarrollo de otros sistemas en función de las necesidades del usuario.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
2017
Estepa, R.; Estepa, A.; Díaz-Verdejo, J.; Campos, I.; Madinabeitia, G.; Peña, I.; Castaño, M.; Estrada, C.
Caso de estudio: sistema automatizado de evaluación del riesgo TIC Proceedings Article
En: Actas de las III Jornadas Nacionales de Investigación en Ciberseguridad, pp. 188–189, 2017, ISBN: 9788460846598.
@inproceedings{R.EstepaA.EstepaJ.DiazVerdejoI.CamposG.MadinabeitiaI.PenaM.Castano2017,
title = {Caso de estudio: sistema automatizado de evaluación del riesgo TIC},
author = {R. Estepa and A. Estepa and J. Díaz-Verdejo and I. Campos and G. Madinabeitia and I. Peña and M. Castaño and C. Estrada},
isbn = {9788460846598},
year = {2017},
date = {2017-01-01},
urldate = {2017-01-01},
booktitle = {Actas de las III Jornadas Nacionales de Investigación en Ciberseguridad},
pages = {188--189},
abstract = {Es importante que las organizaciones dispongan de productos o servicios que ayuden a identificar los riesgos tecnológicos. Este artículo presenta nuestra experiencia con el diseño y evaluación de un sistema automatizado de auditorías de seguridad. El sistema ha sido diseñado para realizar de forma autónoma las tareas de inventariado, búsqueda de vulnerabilidades y detección de ataques a través de la red a los sistemas auditados. El sistema sólo utiliza componentes de software libre y combina el resultado de herramientas activas y pasivas mediante dos etapas de correlación. El objetivo final es ofrecer una estimación del nivel de riesgo de cada uno de los activos de la organización.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Khalife, Jawad; Hajjar, Amjad; Díaz-Verdejo, Jesús
A sampling methodology for DPI classifiers Artículo de revista
En: Journal of Internet Technology, vol. 18, no 4, pp. 787–800, 2017, ISSN: 20794029.
@article{Khalife2017,
title = {A sampling methodology for DPI classifiers},
author = {Jawad Khalife and Amjad Hajjar and Jesús Díaz-Verdejo},
doi = {10.6138/JIT.2017.18.4.20130525},
issn = {20794029},
year = {2017},
date = {2017-01-01},
journal = {Journal of Internet Technology},
volume = {18},
number = {4},
pages = {787--800},
abstract = {In this paper we provide a general methodology for customizing sampling schemes used with DPI (Deep Packet inspection) based traffic classifiers. Sampling is supposed to optimize DPI classification by reducing the disclosed payload size for inspection and the associated computational overhead while providing better protection of the users' privacy. As a real case scenario, we choose a real traffic dataset captured on a campus network link on which we conduct a series of classification experiments joint with sampling using OpenDPI, as the DPI tool of choice. First, we attempt to statistically localize payload sections within a flow stream where application signatures are mostly matched by OpenDPI. Then, we specify the minimum required payload to be disclosed for inspection, on a per protocol basis. Finally, we recommend a methodology for generalizing one DPI sampling scheme.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
2016
Salah, Saeed; Maciá-Fernández, Gabriel; Díaz-Verdejo, Jesús E.; Sánchez-Casado, Leovigildo
A Model for Incident Tickets Correlation in Network Management Artículo de revista
En: Journal of Network and Systems Management, vol. 24, no 1, pp. 57–91, 2016, ISSN: 10647570.
@article{Salah2016,
title = {A Model for Incident Tickets Correlation in Network Management},
author = {Saeed Salah and Gabriel Maciá-Fernández and Jesús E. Díaz-Verdejo and Leovigildo Sánchez-Casado},
doi = {10.1007/s10922-014-9340-6},
issn = {10647570},
year = {2016},
date = {2016-01-01},
journal = {Journal of Network and Systems Management},
volume = {24},
number = {1},
pages = {57--91},
abstract = {textcopyright 2015, Springer Science+Business Media New York. In Information Technology Service Management (ITSM), network management teams typically use an Incident Ticket System (ITS) as a tool to track, troubleshoot, and coordinate the resolution of network incidents that occur during the daily operation of the network. A well organized ITS may positively impact on the efficiency of the incident management process. Nevertheless, in many cases the handling of tickets by the management team is not completely systematic and may be incoherent and inefficient. This way, irrelevant or redundant tickets for the same incident may be issued, thus creating a redundancy in the system that leads to inefficiencies. In this paper, we suggest a model aimed to correlate redundant tickets in order to reduce the information to a single ticket per incident. We validate the proposed correlation model by evaluating it with two datasets taken from a real ticketing system of a telecommunications network company. Using this model as a basis, we also develop and evaluate a methodology that assesses the efficiency of the management team during the process of tickets creation and management. Based on it, we also get some insights on the performance of the different management groups involved in the ticket creation process. These analyses can be leveraged for improving both the management groups functioning and the policies for the tickets' creation.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
2015
Hajjar, Amjad; Khalife, Jawad; Díaz-Verdejo, Jesús
Network traffic application identification based on message size analysis Artículo de revista
En: Journal of Network and Computer Applications, vol. 58, no 2010, pp. 130–143, 2015, ISSN: 1084-8045.
@article{Hajjar2015,
title = {Network traffic application identification based on message size analysis},
author = {Amjad Hajjar and Jawad Khalife and Jesús Díaz-Verdejo},
doi = {10.1016/J.JNCA.2015.10.003},
issn = {1084-8045},
year = {2015},
date = {2015-12-01},
journal = {Journal of Network and Computer Applications},
volume = {58},
number = {2010},
pages = {130--143},
publisher = {Academic Press},
abstract = {Identifying network applications is centric to many network management and security tasks. A large number of approaches exist in the literature, most of which are based on statistical and machine learning techniques. For protecting the user privacy, the majority of the existing methods rely on discriminative traffic attributes at the network and transport layers, such as interaction schemes, packet sizes and inter-arrival times. In this work, we propose a novel blind, quintuple centric approach by exploring traffic attributes at the application level without inspecting the payloads. The identification model is based on the analysis of the first application-layer messages in a flow (quintuple), based on their sizes, directions and positions in the flow. The underlying idea is that the first messages of a flow usually carry some application level signaling and data transfer units (command, request, response, etc.) that can be discriminative through their patterns of size and direction. A Gaussian mixture model is proposed to characterize the applications, based on a study of the common characteristics of application-level protocols. The blind classifier is based on Markov models with low complexity and reasonable computational requirements, where the training procedure consists of profiling the target applications separately. Promising results were obtained for some popular protocols including many peer-to-peer applications.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Garcia-Teodoro, P.; Diaz-Verdejo, J. E.; Tapiador, J. E.; Salazar-Hernandez, R.
Automatic generation of HTTP intrusion signatures by selective identification of anomalies Artículo de revista
En: Computers and Security, vol. 55, pp. 159–174, 2015, ISSN: 01674048.
@article{Garcia-Teodoro2015,
title = {Automatic generation of HTTP intrusion signatures by selective identification of anomalies},
author = {P. Garcia-Teodoro and J. E. Diaz-Verdejo and J. E. Tapiador and R. Salazar-Hernandez},
doi = {10.1016/j.cose.2015.09.007},
issn = {01674048},
year = {2015},
date = {2015-01-01},
journal = {Computers and Security},
volume = {55},
pages = {159--174},
abstract = {In this paper, we introduce a novel methodology to automatically generate HTTP intrusion signatures for Network Intrusion Detection Systems (NIDS). Our approach relies on the use of a service-specific, semantic-aware anomaly detection scheme that combines stochastic learning with a model structure based on the protocol specification. Each incoming payload for the target service is tagged with an anomaly score obtained from probabilistically matching it against the corresponding learned model of normal usage. For those payloads whose anomaly score exceeds a given threshold, a more detailed analysis is performed to extract the portions that contribute the most to the anomaly score. Such portions are then used to build up candidate intrusion signatures, using a merging process that combines them with already existing patterns in order to keep the signature database as simple as possible by avoiding redundancies. We report results obtained with a specific implementation of our proposal for web traffic. During our evaluation, we used a well-known signature-based NIDS that sits behind the anomaly detection system and is fed with the signatures automatically generated by the latter. Our results indicate that functioning in such a way translates into an improvement of the often tedious signature generation process. Furthermore, a visual inspection of the signatures reveals that the generation procedure is quite reliable, mimicking (and, in some cases, even improving) attack patterns manually generated by security analysts. This results in an increase of the overall detection performance of the composite signature- plus anomaly-based system.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
2014
Camacho, Jose; Macia-Fernandez, Gabriel; Diaz-Verdejo, Jesus; Garcia-Teodoro, Pedro
Tackling the Big Data 4 vs for anomaly detection Proceedings Article
En: 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 500–505, IEEE, 2014, ISSN: 0743166X.
@inproceedings{Camacho2014,
title = {Tackling the Big Data 4 vs for anomaly detection},
author = {Jose Camacho and Gabriel Macia-Fernandez and Jesus Diaz-Verdejo and Pedro Garcia-Teodoro},
url = {http://ieeexplore.ieee.org/document/6849282/},
doi = {10.1109/INFCOMW.2014.6849282},
issn = {0743166X},
year = {2014},
date = {2014-04-01},
booktitle = {2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)},
pages = {500--505},
publisher = {IEEE},
abstract = {In this paper, a framework for anomaly detection and forensics in Big Data is introduced. The framework tackles the Big Data 4 Vs: Variety, Veracity, Volume and Velocity. The varied nature of the data sources is treated by transforming the typically unstructured data into a highly dimensional and structured data set. To overcome both the uncertainty (low veracity) and high dimension introduced, a latent variable method, in particular Principal Component Analysis (PCA), is applied. PCA is well known to present outstanding capabilities to extract information from highly dimensional data sets. However, PCA is limited to low size, thought highly multivariate, data sets. To handle this limitation, a kernel computation of PCA is employed. This avoids computational problems due to the size (number of observations) in the data sets and allows parallelism. Also, hierarchical models are proposed if dimensionality is extreme. Finally, to handle high velocity in analyzing time series data flows, the Exponentially Weighted Moving Average (EWMA) approach is employed. All these steps are discussed in the paper, and the VAST 2012 mini challenge 2 is used for illustration. ?? 2014 IEEE.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Teodoro, Pedro García; Verdejo, Jesús Esteban Díaz; Soler, Juan Manuel López
Transmisión de datos y redes de computadores (2ed.) Libro
Pearson Educación, 2014, ISBN: 978-84-9035-461-2.
@book{teodoro2014transmision,
title = {Transmisión de datos y redes de computadores (2ed.)},
author = {Pedro García Teodoro and Jesús Esteban Díaz Verdejo and Juan Manuel López Soler},
isbn = {978-84-9035-461-2},
year = {2014},
date = {2014-01-01},
pages = {506},
publisher = {Pearson Educación},
keywords = {},
pubstate = {published},
tppubtype = {book}
}
Khalife, Jawad; Hajjar, Amjad; Diaz-Verdejo, Jesus
A multilevel taxonomy and requirements for an optimal traffic- classification model Artículo de revista
En: International Journal of Network Management, vol. 24, no 2, pp. 101–120, 2014, ISSN: 10991190.
@article{Khalife2014,
title = {A multilevel taxonomy and requirements for an optimal traffic- classification model},
author = {Jawad Khalife and Amjad Hajjar and Jesus Diaz-Verdejo},
doi = {10.1002/nem.1855},
issn = {10991190},
year = {2014},
date = {2014-01-01},
journal = {International Journal of Network Management},
volume = {24},
number = {2},
pages = {101--120},
abstract = {Identifying Internet traffic applications is essential for network security and management. The steady emergence of new Internet applications, together with the use of encryption and obfuscation techniques, ensures that traffic classification remains a hot research topic. Much research has been devoted to this topic by the research community in the last decade. However, an optimal traffic classification model has yet to be defined. Many techniques and formats have been described, with the current literature therefore lacking appropriate benchmarks expressed in a consistent terminology. Moreover, existing surveys are outdated and do not include many recent advances in the field. In this article, we present a systematic multilevel taxonomy that covers a broad range of existing and recently proposed methods, together with examples of vendor classification techniques. Our taxonomy assists in defining a consistent terminology. It could be useful in future benchmarking contexts by characterizing and comparing methods at three different levels. From this perspective, we describe key features and provide design hints for future classification models, while emphasizing the main requirements for promoting future research efforts. To motivate researchers and other interested parties, we collect and share data captured from real traffic, using two models to protect data privacy. Copyright textcopyright 2014 John Wiley & Sons, Ltd. With the huge amount of recently emergent papers in traffic classification, existing surveys cannot reflect current advances and trends in the field. In this article, we propose a multilevel taxonomy categorising and characterizing most existing methods at three different levels, which is vital for future benchmarks. We show comparisons, highlight on current research trends and describe the optimal future classifier's features. From the perspective of our taxonomy, we illuminate on research requirements both on the policy and technical levels. Copyright textcopyright 2014 John Wiley & Sons, Ltd.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Camacho, J.; Maciá-Fernández, G.; Díaz-Verdejo, J.; García-Teodoro, P.
Monitorización y selección de incidentes en seguridad de redes mediante EDA Proceedings Article
En: Actas de las XIII Reunión Española sobre Criptología y Seguridad de la Información, pp. 309–314, 2014, ISBN: 9788497173230.
@inproceedings{Camacho-recsi2014,
title = {Monitorización y selección de incidentes en seguridad de redes mediante EDA},
author = {J. Camacho and G. Maciá-Fernández and J. Díaz-Verdejo and P. García-Teodoro},
isbn = {9788497173230},
year = {2014},
date = {2014-01-01},
booktitle = {Actas de las XIII Reunión Española sobre Criptología y Seguridad de la Información},
pages = {309--314},
abstract = {Uno de los mayores retos a los que se enfrentan los sistemas de monitorización de seguridad en redes es el gran volumen de datos de diversa naturaleza y relevancia que deben procesar para su presentación adecuada al equipo administrador del sistema, tratando de incorporar la información semántica más relevante. En este artículo se propone la aplicación de herramientas derivadas de técnicas de análisis exploratorio de datos para la selección de los eventos críticos en los que el administrador debe focalizar su atención. Adicionalmente, estas herramientas son capaces de proporcionar información semántica en relación a los elementos involucrados y su grado de implicaci´on en los eventos seleccionados. La propuesta se presenta y evalúa utilizando el desafío VAST 2012 como caso de estudio, obteniéndose resultados altamente satisfactorios.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Sánchez-Casado, Leovigildo; Magán-Carrión, Roberto; García-Teodoro, Pedro; Díaz-Verdejo, J.
Defenses against Packet-Dropping Attacks in Wireless Multihop Ad Hoc Networks Book Section
En: Security for Multihop Wireless Networks, pp. 377–400, CRC Press, 2014, ISBN: 978-14-665-7803-6.
@incollection{Sanchez-Casado2014,
title = {Defenses against Packet-Dropping Attacks in Wireless Multihop Ad Hoc Networks},
author = {Leovigildo Sánchez-Casado and Roberto Magán-Carrión and Pedro García-Teodoro and J. Díaz-Verdejo},
url = {https://books.google.es/books?hl=es&lr=&id=aRYyAwAAQBAJ&oi=fnd&pg=PA377&dq=Defenses+Against+Packet+Dropping+Attacks+in+Wireless+Multihop+Ad+Hoc+Networks&ots=tVj4pCKXBL&sig=pm0k5bVDwfifhd1fDnLgmYN9ZeA},
doi = {10.1201/b16754-18},
isbn = {978-14-665-7803-6},
year = {2014},
date = {2014-01-01},
booktitle = {Security for Multihop Wireless Networks},
pages = {377--400},
publisher = {CRC Press},
keywords = {},
pubstate = {published},
tppubtype = {incollection}
}
2013
Padilla, P.; Camacho, J.; Maciá-Fernández, G.; Díaz-Verdejo, J. E.; García-Teodoro, P.; Gómez-Calero, C.
En: Wireless Personal Communications, vol. 70, no 1, 2013, ISSN: 09296212.
@article{Padilla2013,
title = {Erratum: On the influence of the propagation channel in the performance of energy-efficient geographic routing algorithms for wireless sensor networks (WSN) (Wireless Personal Communications DOI: 10.1007/s11277-012-0676-5)},
author = {P. Padilla and J. Camacho and G. Maciá-Fernández and J. E. Díaz-Verdejo and P. García-Teodoro and C. Gómez-Calero},
doi = {10.1007/s11277-012-0719-y},
issn = {09296212},
year = {2013},
date = {2013-01-01},
journal = {Wireless Personal Communications},
volume = {70},
number = {1},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Padilla, P.; Camacho, J.; Maciá-Fernández, G.; Díaz-Verdejo, J. E.; García-Teodoro, P.; Gómez-Calero, C.
On the influence of the propagation channel in the performance of energy-efficient geographic routing algorithms for Wireless Sensor Networks (WSN) Artículo de revista
En: Wireless Personal Communications, vol. 70, no 1, 2013, ISSN: 09296212.
@article{Padilla2013a,
title = {On the influence of the propagation channel in the performance of energy-efficient geographic routing algorithms for Wireless Sensor Networks (WSN)},
author = {P. Padilla and J. Camacho and G. Maciá-Fernández and J. E. Díaz-Verdejo and P. García-Teodoro and C. Gómez-Calero},
doi = {10.1007/s11277-012-0676-5},
issn = {09296212},
year = {2013},
date = {2013-01-01},
journal = {Wireless Personal Communications},
volume = {70},
number = {1},
abstract = {In this paper, the influence of the features of the propagation channel in the performance of energy-efficient routing algorithms for wireless sensor networks is studied. Although there are a lot of works regarding energy-efficient routing protocols, almost no reference to realistic propagation channel models and influence is made in the literature. Considering that the propagation channel may affect the efficiency of the different energy-efficient routing algorithms, different propagation scenarios are proposed in this work, from the most simplistic free-space propagation model to more complex ones. The latter includes the effects of multipath propagation, shadowing, fading, etc. In addition, spatial diversity transmission/reception models are considered to mitigate the effects of hard propagation fading. Some results are provided comparing the performance of several energy-efficient routing algorithms in different scenarios. textcopyright 2012 Springer Science+Business Media, LLC.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Díaz-Verdejo, Jesús E.; Ortiz, Jorge Navarro; Muñoz, Juan J. Ramos
Actas de las XI Jornadas de Ingeniería Telemática (JITEL 2013) Libro
2013, ISBN: 9788461655977.
@book{Diaz-verdejo-actasjitel2013,
title = {Actas de las XI Jornadas de Ingeniería Telemática (JITEL 2013)},
author = {Jesús E. Díaz-Verdejo and Jorge Navarro Ortiz and Juan J. Ramos Muñoz},
editor = {Jesús E. Díaz-Verdejo and Jorge Navarro Ortiz and Juan J. Ramos Muñoz},
isbn = {9788461655977},
year = {2013},
date = {2013-01-01},
pages = {600},
abstract = {En esta ocasión, es la ciudad de Granada la encargada de servir de anfitriona a las XI Jornadas de Ingeniería Telemática (JITEL 2013), que se celebrarán del 28 al 30 de octubre de 2013. Las Jornadas de Ingeniería Telemática (JITEL), organizadas por la Asociación de Telemática (ATEL) y el Departamento de Teoría de Señal, Telemática y Comunicaciones de la Universidad de Granada, constituyen un foro propicio de reunión, debate y divulgación para los grupos que imparten docencia e investigan en temas relacionados con las redes y los servicios telemáticos. Con la organización de este evento se pretende fomentar, por un lado el intercambio de experiencias y resultados, además de la comunicación y cooperación entre los grupos de investigación que trabajan en temas relacionados con la Telemática. Asimismo, en el marco de las jornadas, se organizarán dos workshops, como son las Jornadas de Innovación Educativa en Ingeniería Telemática (JIE), que alcanzan ya la tercera edición, siempre de la mano de JITEL, y Seguridad en redes inalámbricas ad- hoc (SERIA), que se estrena en esta edición. Este libro recoge las contribuciones que fueron aceptadas para su presentación en las jornadas. Cada una de las contribuciones fue sometida a un riguroso proceso de revisión, bajo la supervisión del Comité de Programa, en el que cada artículo obtuvo tres revisiones independientes. El programa se ha estructurado, de acuerdo a la temática de las contribuciones, en 18 sesiones técnicas: 13 para JITEL, 3 para JIE y 2 para SERIA. Como punto de encuentro de investigadores y docentes, nos enorgullecemos de contar con la participación y representación de la mayoría de las universidades en las que el área de Ingeniería Telemática tiene presencia a nivel nacional, lo que garantiza el nivel científico-técnico de las jornadas así como la consecución de uno de los objetivos prioritarios: el siempre enriquecedor intercambio de ideas y el establecimiento de colaboraciones entre los participantes.},
keywords = {},
pubstate = {published},
tppubtype = {book}
}
Camacho, J.; Padilla, P.; García-Teodoro, P.; Díaz-Verdejo, J.
A generalizable dynamic flow pairing method for traffic classification Artículo de revista
En: Computer Networks, vol. 57, no 14, 2013, ISSN: 13891286.
@article{Camacho2013,
title = {A generalizable dynamic flow pairing method for traffic classification},
author = {J. Camacho and P. Padilla and P. García-Teodoro and J. Díaz-Verdejo},
doi = {10.1016/j.comnet.2013.06.006},
issn = {13891286},
year = {2013},
date = {2013-01-01},
journal = {Computer Networks},
volume = {57},
number = {14},
abstract = {The goal of network traffic classification is to identify the protocols or types of protocols in the network traffic. In particular, the identification of network traffic with high resource consumption, such as peer-to-peer (P2P) traffic, represents a great concern for Internet Service Providers (ISP) and network managers. Most current flow-based classification approaches report high accuracy without paying attention to the generalization ability of the classifier. However, without this ability, a classifier may not be suitable for on-line classification. In this paper, a number of experiments on real traffic help to elucidate the reason for this lack of generalization. It is also shown that one way to attain the generalization ability is by using dynamic classifiers. From these results, a dynamic classification approach based on the pairing of flows according to a similarity criterion is proposed. The pairing method is not a classifier by itself. Rather, its goal is to determine in a fast way that two given flows are similar enough to conclude they correspond to the same protocol. Combining this method with a classifier, most of the flows do not need to be explicitly evaluated by the later, so that the computational overhead is reduced without a significant reduction in accuracy. In this paper, as a case study, we explore complementing the pairing method with payload inspection. In the experiments performed, the pairing approach generalizes well to traffic obtained in different conditions and scenarios than that used for calibration. Moreover, a high portion of the traffic unclassified by payload inspection is categorized with the pairing method. textcopyright 2013 Elsevier B.V. All rights reserved.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Mañas, Elena Jiménez; Camacho-Páez, José; Díaz-verdejo, Jesús E.
Aplicación de EDA en datos de redes de comunicación Proceedings Article
En: Actas de las XI Jornadas de Ingeniería Telemática (JITEL 2013), pp. 397–404, 2013, ISBN: 9788461655977.
@inproceedings{Manas2013,
title = {Aplicación de EDA en datos de redes de comunicación},
author = {Elena Jiménez Mañas and José Camacho-Páez and Jesús E. Díaz-verdejo},
isbn = {9788461655977},
year = {2013},
date = {2013-01-01},
booktitle = {Actas de las XI Jornadas de Ingeniería Telemática (JITEL 2013)},
pages = {397--404},
abstract = {Las técnicas de análisis exploratorio de datos (EDA) constituyen una potente herramienta para el análisis de las características y propiedades de conjuntos de datos, siendo recomendable su utilización como paso previo en problemas de detección de anomalías, clasificación y optimización, entre otros. En particular, resultan de interés para analizar el tráfico capturado en una red. Para facilitar la aplicación de estas técnicas se ha desarrollado una herramienta software, EDA 2.0, cuya aplicación se describe en el presente artículo. Este software se ha diseñado teniendo como objetivo principal su sencillez de uso, de forma que el usuario solo tendrá que interpretar las gráficas proporcionadas, pudiendo trabajar con una gran variedad de problemas y situaciones de diferente naturaleza. Se ha desarrollado también una interfaz gráfica que facilita aún más su utilización. Las capacidades de la técnica EDA y de la herramienta se muestran en un caso de estudio centrado en el análisis de un conjunto de datos formado por el tráfico generado en una red de comunicaciones.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Salah, S.; Maciá-Fernández, G.; Díaz-Verdejo, J. E.
A model-based survey of alert correlation techniques Artículo de revista
En: Computer Networks, vol. 57, no 5, 2013, ISSN: 13891286.
@article{Salah2013,
title = {A model-based survey of alert correlation techniques},
author = {S. Salah and G. Maciá-Fernández and J. E. Díaz-Verdejo},
doi = {10.1016/j.comnet.2012.10.022},
issn = {13891286},
year = {2013},
date = {2013-01-01},
journal = {Computer Networks},
volume = {57},
number = {5},
abstract = {As telecommunication networks evolve rapidly in terms of scalability, complexity, and heterogeneity, the efficiency of fault localization procedures and the accuracy in the detection of anomalous behaviors are becoming important factors that largely influence the decision making process in large management companies. For this reason, telecommunication companies are doing a big effort investing in new technologies and projects aimed at finding efficient management solutions. One of the challenging issues for network and system management operators is that of dealing with the huge amount of alerts generated by the managed systems and networks. In order to discover anomalous behaviors and speed up fault localization processes, alert correlation is one of the most popular resources. Although many different alert correlation techniques have been investigated, it is still an active research field. In this paper, a survey of the state of the art in alert correlation techniques is presented. Unlike other authors, we consider that the correlation process is a common problem for different fields in the industry. Thus, we focus on showing the broad influence of this problem. Additionally, we suggest an alert correlation architecture capable of modeling current and prospective proposals. Finally, we also review some of the most important commercial products currently available. textcopyright 2012 Elsevier B.V. All rights reserved.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Khalife, Jawad; Hajjar, Amjad; Díaz-Verdejo, Jesús
Performance of OpenDPI in identifying sampled network traffic Artículo de revista
En: Journal of Networks, vol. 8, no 1, pp. 71–81, 2013, ISSN: 17962056.
@article{Khalife2013,
title = {Performance of OpenDPI in identifying sampled network traffic},
author = {Jawad Khalife and Amjad Hajjar and Jesús Díaz-Verdejo},
doi = {10.4304/jnw.8.1.71-81},
issn = {17962056},
year = {2013},
date = {2013-01-01},
journal = {Journal of Networks},
volume = {8},
number = {1},
pages = {71--81},
abstract = {The identification of the nature of the traffic flowing through a TCP/IP network is a relevant target for traffic engineering and security related tasks. Despite the privacy concerns it arises, Deep Packet Inspection (DPI) is one of the most successful current techniques. Nevertheless, the performance of DPI is strongly limited by computational issues related to the huge amount of data it needs to handle, both in terms of number of packets and the length of the packets. One way to reduce the computational overhead with identification techniques is to sample the traffic being monitored. This paper addresses the sensitivity of OpenDPI, one of the most powerful freely available DPI systems, with sampled network traffic. Two sampling techniques are applied and compared: the per-packet payload sampling, and the per-flow packet sampling. Based on the obtained results, some conclusions are drawn to show how far DPI methods could be optimised through traffic sampling. textcopyright2013 ACADEMY PUBLISHER.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
2012
Salcedo-Campos, Francisco; Díaz-Verdejo, Jesús; García-Teodoro, Pedro
Segmental parameterisation and statistical modelling of e-mail headers for spam detection Artículo de revista
En: Information Sciences, vol. 195, pp. 45–61, 2012, ISSN: 0020-0255.
@article{Salcedo-Campos2012,
title = {Segmental parameterisation and statistical modelling of e-mail headers for spam detection},
author = {Francisco Salcedo-Campos and Jesús Díaz-Verdejo and Pedro García-Teodoro},
doi = {10.1016/j.ins.2012.01.022},
issn = {0020-0255},
year = {2012},
date = {2012-07-01},
journal = {Information Sciences},
volume = {195},
pages = {45--61},
publisher = {Elsevier},
abstract = {'Spammers exploit the popularity and low cost of e-mail services to send unsolicited messages (spam), which fill users' accounts and waste valuable resources. To combat this problem, many different spam filtering techniques have been proposed in the literature. Nevertheless, most current anti-spamming filtering schemes are based on detecting relevant terms or tokens in the entire message or in only the body, which implies an invasion of users' privacy. In this paper, a novel spam-filtering technique based solely on the information present in headers is introduced. In this approach, headers are considered as the result of a dynamic process that generates characters. The observed characters are treated as signals and parameterised in accordance with standard signal pre-processing techniques by extracting relevant parameters from the header. From this, Hidden Markov Models (HMMs) are considered for a spam detection system. The performance achieved by our proposal is evaluated and compared with that of other pattern classification paradigms used for spam filtering. The experimental results for SpamAssassin, TREC05 and CEAS 2008 Lab Evaluation improve on those results obtained with other widely used techniques, achieving up to 98.42% of spam detection while keeping the false positive rate below 0.4% and with the added advantages of using only information from the headers and being independent of the language in which the e-mail is written. textcopyright 2012 Elsevier Inc. All rights reserved.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Padilla, Pablo; Camacho, José; Maciá, Gabriel; Díaz-verdejo, Jesús Esteban; García-teodoro, Pedro
Study of the performance of energy-efficient routing algorithms in wireless sensor networks ( WSN ) under different propagation scenarios Proceedings Article
En: XXVII Simposuim Nacional de la Unión Científica Internacional de Radio, pp. 1–4, 2012.
@inproceedings{Padilla2012,
title = {Study of the performance of energy-efficient routing algorithms in wireless sensor networks ( WSN ) under different propagation scenarios},
author = {Pablo Padilla and José Camacho and Gabriel Maciá and Jesús Esteban Díaz-verdejo and Pedro García-teodoro},
year = {2012},
date = {2012-01-01},
booktitle = {XXVII Simposuim Nacional de la Unión Científica Internacional de Radio},
pages = {1--4},
abstract = {This document studies the influence of the features of the propagation scenario in the performance of energy- efficient routing algorithms for wireless sensor networks (WSN). Although there are a lot of works regarding energy- efficient routing protocols, almost no reference to realistic propagation channel models and their influence is made in the literature. Considering that the propagation channel may affect the efficiency of the different energy-efficient routing algorithms, different propagation scenarios are studied in this work, from the most simplistic free-space propagation model to more complex ones. The latter includes the effects of multipath propagation, shadowing, fading, etc. In addition, spatial diversity transmission/reception models are considered to mitigate the effects of hard propagation fading.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
2011
Camacho, José; Padilla, Pablo; Díaz-Verdejo, Jesús; Smith, Keith; Lovett, David
Least-squares approximation of a space distribution for a given covariance and latent sub-space Artículo de revista
En: Chemometrics and Intelligent Laboratory Systems, vol. 105, no 2, pp. 171–180, 2011, ISSN: 0169-7439.
@article{Camacho2011c,
title = {Least-squares approximation of a space distribution for a given covariance and latent sub-space},
author = {José Camacho and Pablo Padilla and Jesús Díaz-Verdejo and Keith Smith and David Lovett},
doi = {10.1016/j.chemolab.2010.12.005},
issn = {0169-7439},
year = {2011},
date = {2011-02-01},
journal = {Chemometrics and Intelligent Laboratory Systems},
volume = {105},
number = {2},
pages = {171--180},
publisher = {Elsevier},
abstract = {In this paper, a new method to approximate a data set by another data set with constrained covariance matrix is proposed. The method is termed Approximation of a DIstribution for a given COVariance (ADICOV). The approximation is solved in any projection subspace, including that of Principal Component Analysis (PCA) and Partial Least Squares (PLS). Given the direct relationship between covariance matrices and projection models, ADICOV is useful to test whether a data set satisfies the covariance structure in a projection model. This idea is broadly applicable in chemometrics. Also, ADICOV can be used to simulate data with a specific covariance structure and data distribution. Some applications are illustrated in an industrial case of study. textcopyright 2010 Elsevier B.V.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Salcedo-Campos, F. J.; Díaz-Verdejo, J. E.; García-Teodoro, P.
Multiple vector classification for P2P traffic identification Proceedings Article
En: DCNET 2011 OPTICS 2011 – Proceedings of the International Conference on Data Communication Networking and International Conference on Optical Communication System, pp. 5–13, 2011, ISBN: 9789898425690.
@inproceedings{Salcedo-Campos2011,
title = {Multiple vector classification for P2P traffic identification},
author = {F. J. Salcedo-Campos and J. E. Díaz-Verdejo and P. García-Teodoro},
doi = {10.5220/0003457800050013},
isbn = {9789898425690},
year = {2011},
date = {2011-01-01},
booktitle = {DCNET 2011 OPTICS 2011 - Proceedings of the International Conference on Data Communication Networking and International Conference on Optical Communication System},
pages = {5--13},
abstract = {The identification of P2P traffic has become a principal concern for the research community in the last years. Although several P2P traffic identification proposals can be found in the specialized literature, the problem still persists mainly due to obfuscation and privacy matters. This paper presents a flow-based P2P traffic identification scheme which is based on a multiple classification procedure. First, every traffic flow monitored is parameterized by using three different groups of features: time related features, data transfer features and signalling features. After that, a flow identification process is performed for each group of features. Finally, a global identification procedure is carried out by combining the three individual classifications. Promising experimental results have been obtained by using a basic KNN scheme as the classifier. These results provide some insights on the relevance of the group of features considered and demonstrate the validity of our approach to identify P2P traffic in a reliable way, while content inspection is avoided.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}