Periodo

1-SEPT-2021 a 31-AGO-2024

Progreso
100%

Detección de ciberataques en “industria conectada” e IoT mediante integración y correlación de alertas multifuente (COINCYDE)

Referencia

PID2020-115199RB-I00

Organismos / empresas

Ministerio de Ciencia e Innovación

Investigadores

Equipo de trabajo

Este proyecto está financiado por MCIN/ AEI/10.13039/501100011033/

Resumen

Los sistemas de monitorización de la seguridad en red (NSM) se encuentran hoy en día entre los componentes más relevantes para la detección y respuesta a los ciberataques. Sin embargo, sus capacidades de detección se limitan en su mayoría a ataques conocidos y tienden a generar una gran cantidad de alertas, muchas de las cuales son falsos positivos. Así, los operadores de ciberseguridad (CSO) deben supervisar una gran cantidad de alertas para determinar la ocurrencia real de incidentes, mientras que algunos de ellos permanecen sin ser detectados. Este proyecto tiene como objetivo desarrollar nuevas técnicas para mejorar las capacidades de detección mediante la adición de nuevos métodos basados en anomalías combinados con la correlación y priorización de alertas incorporando información contextual de la red. Esto mejorará la calidad de las alertas y reducirá la tasa de falsos positivos.

En esta propuesta se plantea el desarrollo de un NSM específico para plantas industriales con elementos del Internet of Things (IoT) y, más concretamente en uno de sus usos verticales: las SmartCity. Las instalaciones que pueden beneficiarse de la solución objeto de este proyecto son aquellas que permiten el control y monitorización de parques de dispositivos inteligentes (IoT, SmartCity), desde una aplicación o servicio web que se utiliza como interfaz de usuario para la gestión de servicios inteligentes. La elección del escenario tiene una triple motivación. Primero, por la gran relevancia y expansión de este tipo de redes en la actualidad. Segundo, el escenario plantea una serie dificultades y requisitos específicos que no han sido convenientemente abordados en los SIEM actuales. Y tercero, la selección del escenario permite acotar el contexto, lo que posibilita un abordaje adecuado de la incorporación de información contextual.

El sistema a desarrollar incorporará múltiples detectores, incluyendo los usados habitualmente, considerando nuevos detectores específicos para el escenario que están orientados a las diversas amenazas existentes. Así, se desarrollarán detectores basados en anomalías a nivel del tráfico observado (flujos), a nivel de aplicación (sensorización) y a nivel de los servicios web usados para la operación remota. Adicionalmente, se hará uso de técnicas de inteligencia artificial para la correlación y priorización de las alertas incorporando información relativa al estado e historia previa de la red. Esto permitirá identificar falsos positivos, reducir el número de alertas finalmente enviadas al CSO y mejorar la información en las mismas.

Un elemento relevante y novedoso es el uso de una matriz de tráfico generada a partir de flujos en diferentes escalas de tiempo. Esta matriz contiene información sobre las conexiones de red que pueden explotarse para múltiples usos. Así, se pueden establecer algunos indicadores de compromiso para identificar ataques. También se puede utilizar para aplicar varios tipos de análisis de minería de datos, como la búsqueda de patrones comunes entre flujos, realizar perfiles de tráfico de servicios, evaluar la importancia y encontrar relaciones entre activos. La información extraída de esta matriz se utilizará como información contextual en la correlación y priorización de alertas.

Finalmente, la arquitectura propuesta incluye realimentación a partir de las acciones del CSO, lo que permite evaluar la calidad de detección y priorización y ajustar el rendimiento del sistema.

 

Antecedentes

Network infrastructure has become a critical asset in nowadays organizations as it enables information exchange between user terminals and corporate servers (either locally hosted or in the Internet). Network downtimes can have a tremendous impact in productivity and reputation. Cyberattacks are increasingly frequent and with more relevant effects, as shown in the famous case of “Wannacry” ransomware attack with more than 300 000 devices affected in 166 different countries. New cases are yet to come with unprecedented impact, potentially affecting critical infrastructure such as hospitals, facilities, industry, etc.

The evolution towards the Internet of Things (IoT) and the incorporation of new network-based control and monitoring systems in the so-called Connected Industry, put the focus on the need to protect these systems from cyberattacks.

Organizations address cybersecurity with a combination of tools, procedures and practices. Most organizations deploy monitoring systems —typically called Network Security Monitoring (NSM), or Security Information and Event Management (SIEM) [1] — to detect and react against attacks. These systems process heterogeneous information from multiple sources such as traffic flows seen by network elements, alerts generated by Intrusion Detection Systems (IDS) [2] or event logs from services. The large amount of information to be processed has become one of the main challenges to properly prioritize and classify alerts in real time.

Although many, even commercial, NSMs exist, they still lack of many desirable properties regarding the detection capabilities and the quality and the volume of alerts they generate, requiring the supervision from a human expert (the Cybersecurity Officer, CSO). Thus, a key issue regarding NSMs is to improve its performance in terms of the attacks they are able to discover and the reduction of the number of non-relevant alerts (false positives).

The motivation above justifies the development of new techniques allowing to improve alert generation and prioritization in a timely manner, integrating and correlating the information from the multiple available sensors and detectors. This is especially relevant in the IoT and connected industries scenarios, as the number of field elements can be really high and the impact of an attack or malfunction can be enormous, especially in the case of critical infrastructures as a power plant. Furthermore, industrial and IoT scenarios poses specific characteristics (see later in this section) that makes the detection even more defying, while no specific NSM is available.

Thus, the context of this project includes a scenario with multiple data sources, which generate a high volume of information potentially relevant to the modeling and prioritization of security incidents. This is the right context for the application of data mining techniques that enable the generation of knowledge. The application of such techniques could produce a novel and significant advance in the field of NMS because it would improve detection capabilities and the understanding of incidents by establishing new relations among information coming from different data sources. On the other hand, these techniques can improve the characterization of events that can be associated with attacks and/or can provide context information that enhances detection.

In sum, this project aims to improve the state of art in the context of IoT and Industrial plants in the following cybersecurity challenges identified in [3]:

    • Reducing response time during incidents through the improvement of detection capabilities and the reduction of false positives. We propose methods to improve the detection of cyberattacks thanks to the correlation of the information from different sources and detectors.
    • Identification and characterization of context-related events that, although unrelated to attacks, produce information that can be relevant to improve the detection and modeling of some cybersecurity incidents.
Fig. 1: Schematics of a typical Smart City scenario for lightning control

More precisely, this project aims at the development of a specific cybersecurity solution for industrial plants (Industrial Control Systems or ICS) with elements of the IoT and, more specifically, in one of its vertical uses: the SmartCity. The target is to develop a NSM able to provide significant information about on-going incidents by applying different intrusion detection approaches, including novel ones, to generate alerts that will be analyzed and correlated using IA-based techniques incorporating context information obtained from different sources and sensors across the installation. The facilities that can benefit from the solution object of this project are those that allow the control and monitoring of smart device parks (IoT, SmartCity), from an application or Web service that is used as a user interface for the management of intelligent services. To illustrate it, Fig. 1 shows the schematic of a typical Smart City installation for the intelligent control of lighting in multiple cities. This deployment will be used as the example scenario for the current project.

The IoT sensor plant in Fig. 1 is composed of 2 plants or field networks with sensors (called S in the figure) that correspond to intelligent lighting points remotely controlled from a management system (IoT Server in the figure) that is accessed through a Web application that allows remote management and operation of one or more plants. The Control Center, often located in the cloud, consists of several nodes and databases (DDBB in the figure) that store all the information of the system. The IoT Server is in turn responsible for the communication with the IoT nodes using the usual application protocols in IoT (e.g. MQTT or CoAP). The operation of the system is carried out from the Internet by the managing entity of the plants and includes the management of the IoT nodes (e.g., provision of procedures or operating points), and is carried out through a Web browser that uses a secure protocol (https with TLS 1.2 or higher). The access networks used by the IoT nodes can be private (e.g. Lora, Sigfox, NBWLAN networks with an Internet gateway / operator) or subcontracted to a network operator (e.g. GPRS or 3G), and communicate with the Control Center through a virtual private network (VPN) usually offered by the network operator.

It is worth mentioning the significant specificities of this scenario regarding the deployment of a “conventional” NSM system:

    • Low throughput on the access data link to the IoT nodes: 2.5G coverage in many cases, and even lower data throughputs (e.g. SigFox, Lora).
    • Remote operation of the installation: the Control Center is protected with a VPN provided by the network operator, but access to the IoT server is usually offered through the Internet with a username and password (so as not to be inconvenient for the operator or manager of the plants) against an https application.
    • Use of IoT applications and protocols that are usually implemented with a low level of security (i.e. without communication encryption).
    • The possibility of obtaining the same behavior pattern between 2 similar and geographically close intelligent lighting plants is peculiar, some application variables (e.g., instantaneous power consumed) should have a synchronous behavior.

Connected Industry (<i «>Industry 4.0), in addition to the usual cyberthreats of an IT network (e.g., physical access control, user/permission control, authentication policies -passwords-, etc.), we can highlight the following cyber threats particular to the scenario shown in the figure:

    • Impersonation of the web session or identity of the plant operator
    • Attack on the management application web server / application or the VPN server to operate the IoT infrastructure.</li
    • Attacks that are difficult to detect by conventional intrusion detection equipment (IDS, Intrusion Detection Systems – it could be an application-level firewall). This type of attack would be known as: 0-day and APT (Advanced Persistent Threat) for the control of systems and theft of sensitive information.
    • Attacks on IoT devices and infrastructure in the field network.

Due to the mentioned peculiarities, the possible commercial solutions for the early detection of cyberattacks in remotely managed industrial plants / IoT have differential characteristics compared to conventional cybersecurity systems (oriented to IT –Information Technology-) and should meet the following requirements:

    • REQ1: Do not affect the normal operation of the equipment installed in the plant. This implies: using only passive security tools (that do not inject traffic) and a minimum consumption of the network bandwidth available at the installation.
    • REQ2: Not significantly affect the cost of the installation. For this, in addition to the price associated with the acquisition and deployment of the cybersecurity system, the solution must have a low consumption of computational, storage, and network resources, ideally being able to be integrated into existing plant equipment as a virtual machine.
    • REQ3: Wide detection capacity. The solution must cover the detection of significant security events linked to the threats described above, both existing and 0-day, as well as allow compliance with the applicable regulations and policies in each case.
References
[1] Sanders, C.; Smith, J.; Applied Network Security Monitoring”, Syngress, (2014). ISBN: 978-0-12-417208-1.
[2] García-Teodoro, P.; Díaz-Verdejo, J.E.; y otros; “Anomaly-based Network Intrusion Detection: Techniques, Systems and Challenges”, Computers & Security, 28:18-28 (2009).
[3]  Zuech, R.; Khoshgoftaar, T.; Wald, R.; “Intrusion detection and big heterogeneous data: a survey”, Journal of Big Data, 2:3 (2015).
[4] M. Kaouk, et.al.; «A Review of Intrusion Detection Systems for Industrial Control Systems», In Proc. 6th Int. Conf. on Control, Decision and Inf. Technologies, 1699-1704.
[5] Lu, Yang, and Li Da Xu; «Internet of things (IOT) cybersecurity research: A review of current research topics», IEEE Internet of Things Journal 6.2: 2103-2115 (2018).
[6]  Sridhar, et.al.; “Model-based attack detection and mitigation for automatic generation control”, IEEE Transactions on Smart Grid, 5(2)580–591 (2014).
[7] Zhu, B., Joseph, A., & Sastry, S.;  “A taxonomy of cyber attacks on SCADA systems”, In Proc. IEEE Int. Conf. on Internet of Things and Cyber, Physical and Social Computing. (2011).
[8]  Kallitsis, M. G., Michailidis, G., & Tout, S.; “Correlative monitoring for detection of false data injection attacks in smart grids”, In proc. 2015 IEEE Int. Conf. on Smart Grid Communications, 386–391 (2016).

Objetivos

The main objective of the project is the design and implementation of an innovative system for the early detection of cyber attacks specific for remotely managed industrial IoT environments. Thus the objective is to develop an IoT and connected industries oriented NSM able to provide significant information about on-going incidents by correlating the alerts from different existing and novel intrusion detection approaches using context information from different sources and sensors through the incorporation of data mining techniques in order to improve the quality of the detection in attack scenarios or failures (incidents).

The implementation includes a test pilot that allows to validate or readjust the design in a real plant, based on a final battery of tests on which to measure the performance and consumption of resources of the provided solution. To be suitable for commercial exploitation, this security solution must meet the following partial objectives/capabilities:

O1. Passiveness: The NSM must be passive so as not to affect existing systems.

O2. Detection capabilities: The NSM must offer a broad capacity to detect threats of various types, e.g. it must incorporate existing knowledge of defined known attacks, and must also incorporate the ability to detect 0-day attacks and APTs through the analysis of anomalies both at the traffic level and at the IoT application level.

O3. Multi-plant correlation: In the case of multi-plant installations, the system will apply spatio-temporal correlation techniques among similar plants to identify anomalous behaviors.

O4. Identity compromise detection: To detect spoofing attacks or the theft of credentials, anomalies will also be sought in the pattern of actions carried out by the users in the operation of the IoT plant.

O5. Integration: The NSM must be integrated into the operations console of an event management system in the operations center, offering information on cyberattacks to the operators of the IoT system. They will be able to take corrective actions and provide feedback to the detection system in order to minimize the false positive rate and bring the system to an optimal point of operation.

O6. Contextual information: The system must apply data mining and IA-based methods to correlate the alerts from the existing detectors, logs and sensors using contextual information in order to reduce the number of alerts sent to the administration console (by grouping the information related to the same incident) and to improve the detection and false positives rates.

The purpose of this proposal is twice. First, it pretends to advance in the scientific knowledge by the development of a novel integrated system suit for the considered scenario. This system will combine the adaptation of existing techniques, especially signature based ones, and the development and tuning of new ones. In particular, the proposal will integrate the concepts of context-aware detection, per-user behavior analysis and spatio-temporal correlation of alerts from similar plants into the anomaly detection process in an approach to identify specific threats for this kind of scenarios and to improve the detection capabilities. Second, it pretends to develop and evaluate a near-to-market prototype system that could be of interest for its incorporation into a catalogue of IoT cybersecurity solutions. This system will fill a gap that is currently available on the market.

To this end, a TRL6 demonstrator pilot of a cyberattack detection system in connected industry plants in multi-plant IoT environments will be developed.

 

Propuesta

Proposed solution overview and elements

Although the design of the solution is part of the project, it is possible to start from a simple block diagram that serves as a starting point and helps to structure and plan the proposal. The preliminary proposed solution (Fig. 2) integrates techniques to improve the detection capacity and performance in cybersecurity systems in the considered scenario. It aims to detect, classify and prioritize the incidents by considering different target oriented detectors and the holistic analysis of all the security related events through a context-aware analysis. It is composed of six main modules:

Fig. 2: Cybersecurity solution architecture (proposed).

– Module 1: Flow-based Preprocessing. The target of this module is to generate the “traffic matrix” including information from all the observed flows after applying deep packet inspection techniques for its characterization.

– Module 2: Application-based Preprocessing. This module considers the communication from the field plants to the IoT server and extract the times series for the different monitored parameters and variables.

– Module 3: Web Attacks Detection. This module generates alerts related to the existing web-servers. It must include both signature-based methods and anomaly-based analysis in order to detect previously known attacks, 0-day and APT.

– Module 4: Traffic Anomaly Detection. Its target is to generate alerts from the analysis of the traffic matrix by using anomaly-based detection methods, i.e., it is oriented to the detection of anomalies in the traffic at flows level.

– Module 5: Application Anomaly Detection. This module looks for anomalies in the behavior of the elements in the field plant at the application level, i.e., it considers the evolution of the values of the monitored variables and parameters.

– Module 6: SIEM Core. It will process all the alerts from the different modules in order to correlate them and include contextual information in the analysis. This module will generate the per-incident alerts that will be presented to the CSO after filtering out those finally classified as false positives.

 

Modules 1 and 2 are preprocessing modules that extract the information needed by other modules. Modules 3, 4 and 5 are detector modules that generate raw alerts, each of them focused in a different feature/analysis. Finally, module 6 is the core of the system, as it will combine the information from the raw alerts and it will analyze them considering contextual information gathered by different techniques.

Thus, the overall operation of the system is as follows (Fig. 2). The solution must monitor the traffic flow seen by the IoT Server, as well as the most significant events from the application server —e.g., a log with user control actions, alarms, connections made, etc.— and the HTTP traffic to the web server. This information is fed into 3 different modules targeted at different kinds of analysis. The first two modules (modules 1 and 2) are preprocessing modules that extract and enrich the information associated to the observed flows and the payloads related to the IoT application. Thus, module 1 generates a traffic matrix after processing enriched flows through deep packet inspection techniques. Module 2 generates time series of IoT application events. The outputs from these modules together with the http payloads will fed, respectively, three different detectors (modules 3, 4 and 5) that will generate alerts associated to each of the different dimensions considered in the system. Finally, those alerts are feed to the SIEM core (module 6) for its further processing and the generation of the alerts that will be sent to the dashboard. The target of the SIEM core module is to enhance the detection capabilities by applying different sources of knowledge whose final objective is to improve CSO situational awareness. For this, the alerts will be correlated and prioritized having into account the information about the overall state of the system (context-aware analysis), the behavior of the operators and the relationships among the different generated alerts.

A feedback procedure is also considered. The CSO can apply a fine tuning of the system in order to reduce false positives or irrelevant alerts. For this, some parameters related to the global operation (i.e. equipment to filter out, thresholds for anomaly-based detectors, alarm filtering) will be considered.

From a threat point of view, the output of Module 1 makes it possible to find anomalies at the level of network traffic (Module 4), which makes it possible to easily detect scanning attacks, DDoS, etc. The output of Module 2 will allow to detect anomalies (Module 5) at application or plant level by looking for behavioral anomalies that could correspond to errors or operational problems or cyberattacks. Said anomalies can come both from the comparison of the time series with a self-learned normality pattern, as well as from the spatio-temporal correlation of this series with other series that could be correlated (e.g., light level detected with time of day, or light level detected by the IoT node with the light level detected by another IoT node in nearby location). This second correlation is especially interesting in the case of multi-site IoT systems. Finally, threats to the web server, i.e. web-based attacks, are handled by Module 3, that combines state of the art detectors with different capabilities. On top of these, SIEM core will provide an additional layer able to discriminate false positives and true positives by analyzing the relationships among events and the state of the overall system. As a simplistic example, an anomaly detected at the time series analysis —i.e. lights turned on at daylight— can derive from a legitimate order sent from the console —i.e. due to maintenance activities— and as such, should be labeled as a false positive.

From a research point of view, as previously mentioned, the proposed architecture try to merge well-known techniques and methods with novel proposals in order to provide an effective and practical NSM for the considered scenario. Some of the existing techniques should be adapted and optimized while others are to be explored in this context which will unquestionably represent contributions in the field. On the other hand, the correlation of security events and the reduction of the false positives rate constitutes a relevant challenge that has not yet been satisfactorily solved and that is the focus of current research. In this regard, major contributions are expected from the anomaly-based detection techniques as well as from the application of IA-related methods for the post-processing of the alerts.

Thus, the objective of the SIEM core module is the extraction of intelligence to determine the existence of certain relevant events from the point of view of security and the relationship among various data for its use in alerts analysis. Therefore, the objective is to develop methods that allow the extraction of intelligence for their use in the SIEM and to determine the parameters or significant data for the characterization of security related events. For this, at least the following methods will be considered:

Frequent patterns extraction: Its objective is to determine the possible relationships between the data of the different sensors/elements. As an example, and in relation to the traffic matrix, it intends to establish the patterns of frequent interconnections (flows) among the assets.

User/service profiles: Its objective is to establish profiles associated with the different types of users (e.g. plant operator, end user, administrative) and services. The output of this module is especially relevant for the evaluation of the impact of the incidents.

Prediction of links/flows: This module will provide indicators regarding the probabilities of establishing new relationships (prediction) from a given state of the network. These probabilities are of interest both for the modelling of the attacks and for the prediction of risks.

Outliers detection and clustering: Various methods will be applied for the detection of outliers in the state/characterization of the network, that is, for assessing the normality of an observed context. Similarly, clustering-based techniques will be applied both to stablish the context and to correlate observed alerts.

Case-based reasoning: Case-based reasoning techniques will be applied, together with Mitre ATT&CK model for ICS environments, in order to correlate alerts and predict the risk of an on-going incident.


The information from these analyses will be considered for the context-aware classification of alerts.


Resultados

Publicaciones

Díaz-Verdejo, Jesús E.; Estepa Alonso, Rafael; Estepa Alonso, Antonio; Muñoz-Calle, F. J.; Madinabeitia, German

Building a large, realistic and labeled HTTP URI dataset for anomaly-based intrusion detection systems: Biblio-US17 Artículo de revista En preparación

En: Cybersecurity, En preparación, ISSN: 2523-3246.

Resumen | Enlaces | BibTeX

Lara, Agustín; Estepa, Antonio; Estepa, Rafael; Díaz-Verdejo, Jesús E.; Mayor, Vicente

Anomaly-based Intrusion Detection System for smart lighting Artículo de revista

En: Internet of Things, vol. 28, pp. 101427, 2024, ISSN: 2542-6605.

Resumen | Enlaces | BibTeX

Muñoz-Calle, Javier; Alonso, Rafael Estepa; Alonso, Antonio Estepa; Díaz-Verdejo, Jesús E.; Fernández, Elvira Castillo; Madinabeitia, Germán

A Flexible Multilevel System for Mitre ATT&CK Model-driven Alerts and Events Correlation in Cyberattacks Detection Artículo de revista

En: JUCS – Journal of Universal Computer Science, vol. 30, no 9, pp. 1184-1204, 2024, ISSN: 0948-695X.

Resumen | Enlaces | BibTeX

Díaz-Verdejo, Jesús E.; Estepa Alonso, Rafael; Estepa Alonso, Antonio; Muñoz-Calle, Javier; Madinabeitia, Germán

Biblio-US17: A labeled real URL dataset for anomaly-based intrusion detection systems development Proceedings Article

En: European Interdisciplinary Cybersecurity Conference (EICC 2024), pp. 217–218, 2024, ISBN: 9798400716515.

Resumen | Enlaces | BibTeX

Díaz-Verdejo, J.; Alonso, R. Estepa; Alonso, A. Estepa; Muñoz-Calle, F. J.

Impacto de la evolución temporal de datasets reales en el rendimiento de un IDS basados en anomalías: estudio experimental sobre HTTP Proceedings Article

En: XI Jornadas Nacionales de Investigación en Ciberseguridad, pp. 302–309, 2024.

Resumen | BibTeX

Díaz-Verdejo, J.; Muñoz-Calle, J.; Alonso, R. Estepa; Alonso, A. Estepa

InspectorLog : A New Tool for Offline Attack Detection over Web Log Proceedings Article

En: Proceedings of the 21st International Conference on Security and Cryptography (SECRYPT 2024), pp. 692–697, 2024, ISBN: 9789897587092.

Resumen | Enlaces | BibTeX

Díaz-Verdejo, Jesús; Alonso, Rafael Estepa; Alonso, Antonio Estepa; Muñoz-Calle, Javier

Insights into anomaly-based intrusion detection systems usability. A case study using real http requests Proceedings Article

En: Proc. European Interdisciplinary Cybersecurity Conference (EICC 2024), pp. 82–89, 2024, ISBN: 9798400716515.

Resumen | Enlaces | BibTeX

Walabonso Lara, Agustín; Mayor, Vicente; Estepa Alonso, Rafael; Estepa Alonso, Antonio; Díaz-Verdejo, Jesús E.

Smart home anomaly-based IDS: Architecture proposal and case study Artículo de revista

En: Internet of Things, vol. 22, pp. 100773, 2023, ISSN: 2542-6605.

Resumen | Enlaces | BibTeX

Castillo-Fernández, Elvira; Muñoz, Escolástico; Diaz-Verdejo, J.; Estepa Alonso, R; Estepa Alonso, A.

Diseño y despliegue de un laboratorio para formación e investigación en ciberseguridad Proceedings Article

En: Actas de las VIII Jornadas Nacionales de Investigación en Ciberseguridad (JNIC23) , pp. 445-452, 2023, ISBN: 978-84-8158-970-2.

Resumen | BibTeX

Castillo-Fernández, E.; Diaz-Verdejo, J.; Estepa Alonso, R.; Estepa Alonso, A.

Riesgos en la Smart Home: estudio experimental Proceedings Article

En: Actas de las VIII Jornadas Nacionales de Investigación en Ciberseguridad (JNIC23), pp. 375-382, 2023, ISBN: 978-84-8158-970-2.

Resumen | BibTeX

Lara, Agustín W.; Ternero, J. A.; Estepa Alonso, Rafael; Estepa Alonso, Antonio; Ruiz-Robles, Fernando; Díaz-Verdejo, Jesús E.

HTTP Cyberattacks Detection through Automatic Signature Generation in multi-site IoT Deployments Proceedings Article

En: Proc. European Interdisciplinary Cybersecurity Conference (EICC 2023) , pp. 6, 2023.

Resumen | Enlaces | BibTeX

Fernández, Elvira Castillo; Díaz-Verdejo, Jesús E.; Estepa Alonso, Rafael; Estepa Alonso, Antonio; Muñoz-Calle, Javier; Madinabeitia, Germán

Multistep Cyberattacks Detection using a Flexible Multilevel System for Alerts and Events Correlation Proceedings Article

En: Proc. European Interdisciplinary Cybersecurity Conference (EICC 2023), pp. 6, 2023.

Resumen | Enlaces | BibTeX

Castillo-Fernández, Elvira; Díaz-Verdejo, Jesús Esteban; Alonso, Rafael María Estepa; Alonso, Antonio Estepa; Muñoz-Calle, Fco Javier

Uso practico del modelo ATT&CK para la detección de ciberataques Proceedings Article

En: Actas de las XVI Jornadas de Ingeniería Telemática – JITEL 2023, pp. 1–4, 2023, ISBN: 9783131450715.

Resumen | BibTeX

Muñoz-calle, Javier; Fructuoso, Javier; Estepa, Rafael; Estepa, Antonio

Evaluación experimental de las capacidades de detección de ciberataques basados en técnicas del modelo ATT & CK mediante Snort Proceedings Article

En: Actas de las XVI Jornadas de Ingeniería Telemática – JITEL 2023, pp. 5–8, 2023.

Resumen | BibTeX

Díaz-Verdejo, Jesús E.; Estepa Alonso, Rafael; Estepa Alonso, Antonio; Madinabeitia, German

A critical review of the techniques used for anomaly detection of HTTP-based attacks: taxonomy, limitations and open challenges Artículo de revista

En: Computers and Security, vol. 124, pp. 102997, 2023, ISSN: 01674048.

Resumen | Enlaces | BibTeX

Muñoz, Javier; Bueno, Felipe; Estepa, Rafael; Estepa, Antonio; Díaz-Verdejo, Jesús E.

Ataques a servidores web: estudio experimental de la capacidad de detección de algunos SIDS gratuitos Proceedings Article

En: Actas de las VII Jornadas Nacionales de Investigación en Ciberseguridad (JNIC'22), pp. 22–25, 2022, ISBN: 9878488734136.

Resumen | BibTeX

Díaz-Verdejo, J. E.; Muñoz-Calle, F. J.; Estepa Alonso, A.; Estepa Alonso, R.; Madinabeitia, G.

On the Detection Capabilities of Signature-Based Intrusion Detection Systems in the Context of Web Attacks Artículo de revista

En: Applied Sciences, vol. 12, no 2, pp. 852, 2022, ISSN: 20763417.

Resumen | Enlaces | BibTeX

 

Datos

  • Biblio-US17 – Base de datos de peticiones HTTP reales etiquetada (42 M de registros) Más información
  • IoT SmartHome – Dataset real de tráfico en Smart HomeMás información
  • IoT SmartLighting – Dataset real de tráfico en despliegue Smart Lighting Más información

Software / sistemas

  • Monitorización red Smart Home – Red para la monitorización y captura de tráfico real en Smart Home   Más información
  • Inspectorlog – Herramienta de análisis de trazas HTTP basada en firmas Más información
  • NE-SIEM – Prototipo de sistema integral de detección con capacidad multifuente y multiplanta
  • Laboratorio  ciberseguridad – Laboratorio híbrido orientado a la experimentación y docencia en ciberseguridad   Más información