

dirección
Despacho 4
Dpto. Ing. Telemática
ETS de Ingeniería
c/ Camino de los descubrimientos s/n
41092 - Sevilla
Contacto
german @ us.es
GERMÁN MADINABEITIA LUQUE
PUESTOS
Profesor Titular de Ingeniería Telemática
Dpto. Ing. Telemática
Universidad de Sevilla
fORMACIÓN académica
Doctor Ingeniero de Telecomunicación - Universidad de Sevilla
Docencia reglada
líneas de investigación
ORCID
Resumen
Germán Madinabeitia Luque es Ingeniero de Telecomunicación y Doctor Ingeniero de Telecomunicación por la Universidad Politécnica de Madrid, desde 1986 y 2004 respectivamente. Actualmente es profesor colaborador doctor en el departamento de Ingeniería Telemática de la Universidad de Sevilla. Antes de su incorporación a la Universidad de Sevilla, y tras dos años como investigador en el LOCTS de la ETSIT de Madrid, desarrolló su labor como ingeniero durante más de 10 años en distintas empresas del sector de las Telecomunicaciones, como SECOINSA, Fujitsu España, Andersen Consulting o Telefónica Sistemas, en las que intervino en proyectos de distinta índole, como el sistema TESYS de conmutación de paquetes, el desarrollo de un SGBD basado en lenguaje natural, o el despliegue de las telecomunicaciones en el recinto de la Exposición Universal de Sevilla. Sus áreas de interés actuales se centran en Redes de sensores, Internet de las cosas e Ingeniería de tráfico.
Ha participado en varios proyectos de investigación dentro del Plan Nacional de investigación, en temas relacionados con el despliegue de redes de telecomunicación, integración de redes de nueva generación y comunicaciones subacuáticas. En lo referente a contratos de investigación de ámbito privado, ha participado en más de 25 contratos en temas de ciberseguridad, integración multimedia, despliegue avanzado de servicios y sistemas inteligentes para medio ambiente o seguridad vial, siendo el responsable del mismo en 7 de ellos. Ha codirigido una tesis doctoral.
Es coautor de más de 35 publicaciones en revistas o conferencias, 10 de ellas en los últimos cinco años, en campos que incluyen ciberseguridad, despliegue de UAVs o diseño de redes. Según las estadísticas de Google Scholar, sus publicaciones han recibido 30 citas en los últimos cinco años, de un total de casi 100 citas en total, obteniendo un índice h-6 de los últimos 5 años, y un índice h-3 global.
Publicaciones (ciberseguridad)
2025
Díaz-Verdejo, Jesús E.; Estepa Alonso, Rafael; Estepa Alonso, Antonio; Muñoz-Calle, F. J.; Madinabeitia, German
Building a large, realistic and labeled HTTP URI dataset for anomaly-based intrusion detection systems: Biblio-US17 Artículo de revista
En: Cybersecurity, vol. 8, no 35, 2025, ISSN: 2523-3246.
@article{Biblio24,
title = {Building a large, realistic and labeled HTTP URI dataset for anomaly-based intrusion detection systems: Biblio-US17 },
author = {Jesús E. {Díaz-Verdejo} and {Estepa Alonso}, Rafael and {Estepa Alonso}, Antonio and F. J. {Muñoz-Calle} and German {Madinabeitia}},
doi = {https://doi.org/10.1186/s42400‑024‑00336‑3},
issn = {2523-3246},
year = {2025},
date = {2025-06-05},
urldate = {2025-06-05},
journal = {Cybersecurity},
volume = {8},
number = {35},
abstract = {This paper introduces Biblio-US17, a labeled dataset collected over 6 months from the log files of a popular public website at the University of Seville. It contains 47 million records, each including the method, uniform resource identifier (URI) and associated response code and size of every request received by the web server. Records have been classified as either normal or attack using a comprehensive semi-automated process, which involved signature-based detection, assisted inspection of URIs vocabulary, and substantial expert manual supervision. Unlike comparable datasets, this one offers a genuine real-world perspective on the normal operation of an active website, along with an unbiased proportion of actual attacks (i.e., non-synthetic). This makes it ideal for evaluating and comparing anomalybased approaches in a realistic environment. Its extensive size and duration also make it valuable for addressing challenges like data shift and insufficient training. This paper describes the collection and labeling processes, dataset structure, and most relevant properties. We also include an example of an application for assessing the performance of a simple anomaly detector. Biblio-US17, now available to the scientific community, can also be used to model the URIs used by current web servers.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
2024
Muñoz-Calle, Javier; Alonso, Rafael Estepa; Alonso, Antonio Estepa; Díaz-Verdejo, Jesús E.; Fernández, Elvira Castillo; Madinabeitia, Germán
A Flexible Multilevel System for Mitre ATT&CK Model-driven Alerts and Events Correlation in Cyberattacks Detection Artículo de revista
En: JUCS – Journal of Universal Computer Science, vol. 30, no 9, pp. 1184-1204, 2024, ISSN: 0948-695X.
@article{10.3897/jucs.131686,
title = {A Flexible Multilevel System for Mitre ATT&CK Model-driven Alerts and Events Correlation in Cyberattacks Detection},
author = {Javier Muñoz-Calle and Rafael Estepa Alonso and Antonio Estepa Alonso and Jesús E. Díaz-Verdejo and Elvira Castillo Fernández and Germán Madinabeitia},
url = {https://doi.org/10.3897/jucs.131686},
doi = {10.3897/jucs.131686},
issn = {0948-695X},
year = {2024},
date = {2024-01-01},
urldate = {2024-01-01},
journal = {JUCS - Journal of Universal Computer Science},
volume = {30},
number = {9},
pages = {1184-1204},
publisher = {Journal of Universal Computer Science},
abstract = {Network monitoring systems can struggle to detect the full sequence of actions in a multi-step cyber attack, frequently resulting in multiple alerts (some of which are false positive (FP)) and missed actions. The challenge of easing the job of security analysts by triggering a single and accurate alert per attack requires developing and evaluating advanced event correlation techniques and models that have the potential to devise relationships between the different observed events/alerts.This work introduces a flexible architecture designed for hierarchical and iterative correlation of alerts and events. Its key feature is the sequential correlation of operations targeting specific attack episodes or aspects. This architecture utilizes IDS alerts or similar cybersecurity sensors, storing events and alerts in a non-relational database. Modules designed for knowledge creation then query these stored items to generate meta-alerts, also stored in the database. This approach facilitates creating a more refined knowledge that can be built on top of existing one by creating specialized modules. For illustrative purposes, we make a case study where we use this architectural approach to explore the feasibility of monitoring the progress of attacks of increased complexity by increasing the levels of the hyperalerts defined, including a case of a multi-step attack that adheres to the ATT&CK model. Although the mapping between the observations and the model components (i.e., techniques and tactics) is challenging, we could fully monitor the progress of two attacks and up to 5 out of 6 steps of the most complex attack by building up to three specialized modules. Despite some limitations due to the sensors and attack scenarios tested, the results indicate the architecture’s potential for enhancing the detection of complex cyber attacks, offering a promising direction for future cybersecurity research.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
2023
Fernández, Elvira Castillo; Díaz-Verdejo, Jesús E.; Estepa Alonso, Rafael; Estepa Alonso, Antonio; Muñoz-Calle, Javier; Madinabeitia, Germán
Multistep Cyberattacks Detection using a Flexible Multilevel System for Alerts and Events Correlation Proceedings Article
En: Proc. European Interdisciplinary Cybersecurity Conference (EICC 2023), pp. 6, 2023.
@inproceedings{eicc23-attacks,
title = {Multistep Cyberattacks Detection using a Flexible Multilevel System for Alerts and Events Correlation},
author = {Elvira {Castillo Fernández} and Jesús E. {Díaz-Verdejo} and {Estepa Alonso}, Rafael and {Estepa Alonso}, Antonio and Javier {Muñoz-Calle} and Germán Madinabeitia},
doi = {10.1145/3590777.3590778},
year = {2023},
date = {2023-06-14},
urldate = {2023-06-14},
booktitle = {Proc. European Interdisciplinary Cybersecurity Conference (EICC 2023)},
pages = {6},
abstract = {Current network monitoring systems tend to generate several alerts per attack, especially in multistep attacks. However, Cybersecurity Officers (CSO) would rather receive a single alert summarizing the entire incident. Triggering a single alert per attack is a challenge that requires developing and evaluating advanced event correlation techniques and models to determine the relationships between the different observed events/alerts.
In this work, we propose a flexible architecture oriented toward the correlation and aggregation of events and alerts in a multilevel iterative approach.
In our scheme, sensors generate events and alerts that are stored in a non-relational database queried by modules that create knowledge structured as meta-alerts that are also stored in the database. These meta-alerts (also called hyperalerts) are, in turn, used iteratively to create new knowledge. This iterative approach can be used to aggregate information at multiple levels or steps in complex attack models.
Our architecture also allows the incorporation of additional sensors and the evaluation of various correlation techniques and multistage attack models. The capabilities of the system are assessed through three case studies.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
In this work, we propose a flexible architecture oriented toward the correlation and aggregation of events and alerts in a multilevel iterative approach.
In our scheme, sensors generate events and alerts that are stored in a non-relational database queried by modules that create knowledge structured as meta-alerts that are also stored in the database. These meta-alerts (also called hyperalerts) are, in turn, used iteratively to create new knowledge. This iterative approach can be used to aggregate information at multiple levels or steps in complex attack models.
Our architecture also allows the incorporation of additional sensors and the evaluation of various correlation techniques and multistage attack models. The capabilities of the system are assessed through three case studies.
Díaz-Verdejo, Jesús E.; Estepa Alonso, Rafael; Estepa Alonso, Antonio; Madinabeitia, German
A critical review of the techniques used for anomaly detection of HTTP-based attacks: taxonomy, limitations and open challenges Artículo de revista
En: Computers and Security, vol. 124, pp. 102997, 2023, ISSN: 01674048.
@article{Diaz-Verdejo2023,
title = {A critical review of the techniques used for anomaly detection of HTTP-based attacks: taxonomy, limitations and open challenges},
author = {Jesús E. Díaz-Verdejo and {Estepa Alonso}, Rafael and {Estepa Alonso}, Antonio and German Madinabeitia},
doi = {10.1016/j.cose.2022.102997},
issn = {01674048},
year = {2023},
date = {2023-01-01},
urldate = {2023-01-01},
journal = {Computers and Security},
volume = {124},
pages = {102997},
abstract = {Intrusion Detection Systems (IDSs) and Web Application Firewalls (WAFs) offer a crucial layer of defense that allows organizations to detect cyberattacks on their web servers. Academic research overwhelmingly suggests using anomaly detection techniques to improve the performance of these defensive systems. However, analyzing and comparing the wide range of solutions in the scientific literature is challenging since they are typically presented as isolated (unrelated) contributions, and their results cannot be generalized. We believe that this impairs the industry's adoption of academic results and the advancement of research in this field. This paper aims to shed light on the literature on anomaly-based detection of attacks that use HTTP request messages. We define a novel framework for anomaly detection based on six data processing steps grouped into two sequential phases: preprocessing and classification. Based on this framework, we provide a taxonomy and critical review of the techniques surveyed, emphasizing their limitations and applicability. Future approaches should take advantage of the syntax and semantics of the Uniform Resource Locator (URL), be scalable, and address their obsolescence. These aspects are frequently overlooked in the literature and pose a significant challenge in the current era of web services. For better comparability, authors should use adequate public datasets, follow a thorough methodology, and use appropriate metrics that fully show the pros and cons of the approach.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Román-Martínez, Isabel; Calvillo-Arbizu, Jorge; Mayor-Gallego, Vicente J.; Madinabeitia-Luque, Germán; Estepa-Alonso, Antonio J.; Estepa-Alonso, Rafael M.
Blockchain-Based Service-Oriented Architecture for Consent Management, Access Control, and Auditing Artículo de revista
En: IEEE Access, vol. 11, pp. 12727-12741, 2023, ISSN: 2169-3536.
@article{10036374,
title = {Blockchain-Based Service-Oriented Architecture for Consent Management, Access Control, and Auditing},
author = {Isabel Román-Martínez and Jorge Calvillo-Arbizu and Vicente J. Mayor-Gallego and Germán Madinabeitia-Luque and Antonio J. Estepa-Alonso and Rafael M. Estepa-Alonso},
doi = {10.1109/ACCESS.2023.3242605},
issn = {2169-3536},
year = {2023},
date = {2023-01-01},
urldate = {2023-01-01},
journal = {IEEE Access},
volume = {11},
pages = {12727-12741},
abstract = {Continuity of care requires the exchange of health information among organizations and care teams. The EU General Data Protection Regulation (GDPR) establishes that subject of care should give explicit consent to the treatment of her personal data, and organizations must obey the individual’s will. Nevertheless, few solutions focus on guaranteeing the proper execution of consents. We propose a service-oriented architecture, backed by blockchain technology, that enables: (1) tamper-proof and immutable storage of subject of care consents; (2) a fine-grained access control for protecting health data according to consents; and (3) auditing tasks for supervisory authorities (or subjects of care themselves) to assess that healthcare organizations comply with GDPR and granted consents. Standards for health information exchange and access control are adopted to guarantee interoperability. Access control events and the subject of care consents are maintained on a blockchain, providing a trusted collaboration between organizations, supervisory authorities, and individuals. A prototype of the architecture has been implemented as a proof of concept to evaluate the performance of critical components. The application of subject of care consent to control the treatment of personal health data in federated and distributed environments is a pressing concern. The experimental results show that blockchain can effectively support sharing consent and audit events among healthcare organizations, supervisory authorities, and individuals.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
2022
Díaz-Verdejo, J. E.; Muñoz-Calle, F. J.; Estepa Alonso, A.; Estepa Alonso, R.; Madinabeitia, G.
On the Detection Capabilities of Signature-Based Intrusion Detection Systems in the Context of Web Attacks Artículo de revista
En: Applied Sciences, vol. 12, no 2, pp. 852, 2022, ISSN: 20763417.
@article{Diaz-Verdejo2022,
title = {On the Detection Capabilities of Signature-Based Intrusion Detection Systems in the Context of Web Attacks},
author = {J. E. Díaz-Verdejo and F. J. Muñoz-Calle and {Estepa Alonso}, A. and {Estepa Alonso}, R. and G. Madinabeitia},
url = {https://www.mdpi.com/2076-3417/12/2/852/htm https://www.mdpi.com/2076-3417/12/2/852},
doi = {10.3390/app12020852},
issn = {20763417},
year = {2022},
date = {2022-01-01},
urldate = {2022-01-01},
journal = {Applied Sciences},
volume = {12},
number = {2},
pages = {852},
publisher = {Multidisciplinary Digital Publishing Institute},
abstract = {Signature-based Intrusion Detection Systems (SIDS) play a crucial role within the arsenal of security components of most organizations. They can find traces of known attacks in the network traffic or host events for which patterns or signatures have been pre-established. SIDS include standard packages of detection rulesets, but only those rules suited to the operational environment should be activated for optimal performance. However, some organizations might skip this tuning process and instead activate default off-the-shelf rulesets without understanding its implications and trade-offs. In this work, we help gain insight into the consequences of using predefined rulesets in the performance of SIDS. We experimentally explore the performance of three SIDS in the context of web attacks. In particular, we gauge the detection rate obtained with predefined subsets of rules for Snort, ModSecurity and Nemesida using seven attack datasets. We also determine the precision and rate of alert generated by each detector in a real-life case using a large trace from a public webserver. Results show that the maximum detection rate achieved by the SIDS under test is insufficient to protect systems effectively and is lower than expected for known attacks. Our results also indicate that the choice of predefined settings activated on each detector strongly influences its detection capability and false alarm rate. Snort and ModSecurity scored either a very poor detection rate (activating the less-sensitive predefined ruleset) or a very poor precision (activating the full ruleset). We also found that using various SIDS for a cooperative decision can improve the precision or the detection rate, but not both. Consequently, it is necessary to reflect upon the role of these open-source SIDS with default configurations as core elements for protection in the context of web attacks. Finally, we provide an efficient method for systematically determining which rules deactivate from a ruleset to significantly reduce the false alarm rate for a target operational environment. We tested our approach using Snort’s ruleset in our real-life trace, increasing the precision from 0.015 to 1 in less than 16 h of work.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Mayor, V.; Estepa, R.; Estepa, A.; Madinabeitia, G.
Deployment of UAV-mounted Access Points for VoWiFi Service with guaranteed QoS Artículo de revista
En: Computer Communications, vol. 193, pp. 94-108, 2022, ISSN: 01403664, (cited By 0).
@article{Mayor202294,
title = {Deployment of UAV-mounted Access Points for VoWiFi Service with guaranteed QoS},
author = {V. Mayor and R. Estepa and A. Estepa and G. Madinabeitia},
url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85133540825&doi=10.1016%2fj.comcom.2022.06.037&partnerID=40&md5=e2d77e953e2987abaffb06aca60418c5},
doi = {10.1016/j.comcom.2022.06.037},
issn = {01403664},
year = {2022},
date = {2022-01-01},
urldate = {2022-01-01},
journal = {Computer Communications},
volume = {193},
pages = {94-108},
publisher = {Elsevier B.V.},
abstract = {Unmanned Aerial Vehicle (UAV) networks have emerged as a promising means to provide wireless coverage in open geographical areas. Nevertheless, in wireless networks such as WiFi, signal coverage alone is insufficient to guarantee that network performance meets the quality of service (QoS) requirements of real-time communication services, as it also depends on the traffic load produced by ground users sharing the medium access. We formulate a new problem for UAVs optimal deployment in which the QoS level is guaranteed for real-time voice over WiFi (VoWiFi) communications. More specifically, our goal is to dispatch the minimum number of UAVs possible to provide VoWiFi service to a set of ground users subject to coverage, call-blocking probability, and QoS constraints. Optimal solutions are found using well-known heuristics that include K-means clusterization and genetic algorithms. Via numerical results, we show that the WiFi standard revision (e.g. IEEE 802.11a/b/g/n/ac) in use plays an important role in both coverage and QoS performance and hence, in the number of UAVs required to provide the service. © 2022 The Author(s)},
note = {cited By 0},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
2021
Alonso, R. Estepa; Diaz-Verdejo, J.; Alonso, A. Estepa; Madinabeitia, G.; Muñoz, F. J.
Generación automática de firmas para detección de ciberataques basados en URI Actas de congresos
2021.
@proceedings{jitel-firmas,
title = {Generación automática de firmas para detección de ciberataques basados en URI},
author = {R. {Estepa Alonso} and J. {Diaz-Verdejo} and A. {Estepa Alonso} and G. {Madinabeitia} and F. J. {Muñoz} },
year = {2021},
date = {2021-10-30},
urldate = {2021-10-30},
booktitle = {Actas de las XV Jornadas de Ingeniería Telemática (JITEL 2021)},
journal = {Actas de las XV Jornadas de Ingeniería Telemática (JITEL 2021)},
pages = {22-25},
abstract = {La mayor parte de los sistemas de detección de intrusiones (IDS) operativos se basan en el uso de firmas que permiten identificar ataques conocidos. La dependencia de estos IDS con la actualización de
las bases de datos de firmas constituye una de sus mayores limitaciones, siendo de interés el desarrollo de sistemas que posibiliten la generación automática o supervisada de firmas.
En el presente trabajo se evalúa experimentalmente un sistema para la generación de firmas a partir de un IDS basado en anomal´ıas propuesto en un trabajo previo. También se desarrolla y evalúa un
sistema automatizado para la selección del punto de operación óptimo del generador de firmas. Los resultados preliminares de este trabajo en curso muestran que se pueden generar firmas nuevas que aumenten la capacidad de detección del IDS basados en firmas o patrones conocidos (SIDS) controlando el número de falsos positivos introducidos.},
keywords = {},
pubstate = {published},
tppubtype = {proceedings}
}
las bases de datos de firmas constituye una de sus mayores limitaciones, siendo de interés el desarrollo de sistemas que posibiliten la generación automática o supervisada de firmas.
En el presente trabajo se evalúa experimentalmente un sistema para la generación de firmas a partir de un IDS basado en anomal´ıas propuesto en un trabajo previo. También se desarrolla y evalúa un
sistema automatizado para la selección del punto de operación óptimo del generador de firmas. Los resultados preliminares de este trabajo en curso muestran que se pueden generar firmas nuevas que aumenten la capacidad de detección del IDS basados en firmas o patrones conocidos (SIDS) controlando el número de falsos positivos introducidos.
Román, Isabel; Madinabeitia, Germán; Estepa, Rafael; Díaz-Verdejo, Jesús; Estepa, Antonio; González-Sánchez, José Luis; Prieto, Felipe Lemuz
Aplicación de control de acceso y técnicas de Blockchain para el control de datos genéticos Proceedings Article
En: Actas de las VI Jornadas Nacionales de Investigación en Ciberseguridad, pp. 293–299, 2021, ISBN: 9788490444634.
@inproceedings{Roman2021,
title = {Aplicación de control de acceso y técnicas de Blockchain para el control de datos genéticos},
author = {Isabel Román and Germán Madinabeitia and Rafael Estepa and Jesús Díaz-Verdejo and Antonio Estepa and José Luis González-Sánchez and Felipe Lemuz Prieto},
url = {https://ruidera.uclm.es/xmlui/handle/10578/28677},
doi = {10.18239/jornadas_2021.34.67},
isbn = {9788490444634},
year = {2021},
date = {2021-01-01},
booktitle = {Actas de las VI Jornadas Nacionales de Investigación en Ciberseguridad},
pages = {293--299},
abstract = {Este trabajo presenta una solución al reto de mejorar la trazabilidad del acceso a información genética almacenada en una aplicación propietaria a trav´es del uso de blockchain. Para ello se realizan tres acciones: (a) se normaliza la estructura y acceso a los datos conforme al estándar sanitario FHIR; (b) se dise ña una arquitectura normalizada de control de acceso a los datos en la que el paciente puede administrar las políticas de acceso a sus datos clínicos compatible con el RGDP; (c) se securiza mediante blockchain la trazabilidad del acceso a los datos. Los resultados de las tres acciones anteriores se integran en un demostrador o una aplicación piloto que tiene las siguientes características: (a) arquitectura SOA con interfaces normalizados de acceso que siguen el estándar FHIR; (b) cuenta con sistema distribuido de control de acceso de grano fino que sigue el estándard XACML/SAML; (c) utiliza blockchain de forma que se garantice la trazabilidad y la integridad de los registros de acceso al sistema.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Estepa, Rafael; Estepa, Antonio; Díaz-Verdejo, Jesús; Lara, Agustín W; Madinabeitia, Germán; Sánchez, José A. Morales
Diseño de un IDS basado en anomalías para IoT: caso de estudio en SmartCities Proceedings Article
En: Actas de las VI Jornadas Nacionales de Investigación en Ciberseguridad, pp. 135–138, 2021.
@inproceedings{Estepa-jnic2021,
title = {Diseño de un IDS basado en anomalías para IoT: caso de estudio en SmartCities},
author = {Rafael Estepa and Antonio Estepa and Jesús Díaz-Verdejo and Agustín W Lara and Germán Madinabeitia and José A. Morales Sánchez},
url = {https://ruidera.uclm.es/xmlui/handle/10578/28638},
doi = {10.18239/jornadas_2021.34.30},
year = {2021},
date = {2021-01-01},
urldate = {2021-01-01},
booktitle = {Actas de las VI Jornadas Nacionales de Investigación en Ciberseguridad},
pages = {135--138},
abstract = {Los sistemas de Smart-City constituyen un campo específico en el IoT. Las soluciones de ciberseguridad IT tradicionales son excesivamente genéricas y poco eficientes para este tipo de instalaciones con escasos recursos computacionales y de coste limitado. Por ello, en conjunción con una empresa del sector, se está desarrollando un proyecto para la detección de incidentes de seguridad de un sistema de Iluminación Inteligente. En este artículo se describen los resultados iniciales del proyecto.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Diaz-Verdejo, J.; Muñoz, F. J.; Alonso, R. Estepa; Alonso, A. Estepa; Madinabeitia, G.
Sobre las capacidades de detección de los IDS basados en firmas Proceedings Article
En: Serrano, Manuel A.; Fernández-Medina, Eduardo; Alcaraz, Cristina; Castro, Noemí; Calvo, Guillermo (Ed.): Actas de las VI Jornadas Nacionales de Investigación en Ciberseguridad, pp. 55–64, Ediciones de la Universidad de Castilla-La Mancha, 2021, ISBN: 9788490444634.
@inproceedings{diaz-verdejo-jnic21,
title = {Sobre las capacidades de detección de los IDS basados en firmas},
author = {J. Diaz-Verdejo and F. J. Muñoz and R. Estepa Alonso and A. Estepa Alonso and G. Madinabeitia},
editor = {Manuel A. Serrano and Eduardo Fernández-Medina and Cristina Alcaraz and Noemí Castro and Guillermo Calvo},
url = {https://ruidera.uclm.es/xmlui/handle/10578/28597},
doi = {10.18239/jornadas_2021.34.00},
isbn = {9788490444634},
year = {2021},
date = {2021-01-01},
urldate = {2021-01-01},
booktitle = {Actas de las VI Jornadas Nacionales de Investigación en Ciberseguridad},
pages = {55--64},
publisher = {Ediciones de la Universidad de Castilla-La Mancha},
series = {Colección Jornadas y Congresos},
abstract = {Los sistemas de detección de intrusiones (IDS) pueden detectar actividades maliciosas y generar alertas a supervisar, por lo que constituyen el n´ ucleo de los sistemas de monitorización de la seguridad de las redes. Tradicionalmente, se ha asumido que los IDS basados en firmas (SIDS) ofrecen una capacidad de detección y tasa de falsos positivos adecuadas, presentando limitaciones sólo en la detección de ataques 0-day. Sin embargo, estas capacidades están inequívocamente asociadas a la calidad de las firmas disponibles, que varían no sólo en el tiempo sino con la herramienta concreta utilizada. En este trabajo se exploran las capacidades de diversos sistemas SIDS ampliamente utilizados en un escenario real en el contexto de servicios web. Asimismo, se analiza la evolución de sus prestaciones a lo largo del tiempo considerando la actualización de las firmas. Los resultados de nuestras pruebas evidencian una gran variabilidad en las prestaciones en función de la herramienta seleccionada, así como una deficiente cobertura de ataques conocidos, incluso cuando se optimizan las reglas para ajustarse al sistema a proteger. Consecuentemente, es necesario revisar el papel de los SIDS como elementos de protección, ya que pueden proporcionar una falsa sensación de seguridad.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Estepa, R.; Estepa, A.; Madinabeitia, G.; Garcia, E.
RPL Cross-Layer Scheme for IEEE 802.15.4 IoT Devices with Adjustable Transmit Power Artículo de revista
En: IEEE Access, vol. 9, pp. 120689-120703, 2021, ISSN: 21693536, (cited By 5).
@article{Estepa2021120689,
title = {RPL Cross-Layer Scheme for IEEE 802.15.4 IoT Devices with Adjustable Transmit Power},
author = {R. Estepa and A. Estepa and G. Madinabeitia and E. Garcia},
url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85113833413&doi=10.1109%2fACCESS.2021.3107981&partnerID=40&md5=013e007afc3cced8a0ce5eaeae0b38c6},
doi = {10.1109/ACCESS.2021.3107981},
issn = {21693536},
year = {2021},
date = {2021-01-01},
journal = {IEEE Access},
volume = {9},
pages = {120689-120703},
publisher = {Institute of Electrical and Electronics Engineers Inc.},
abstract = {We propose a novel cross-layer scheme to reduce energy consumption in wireless sensor networks composed of IEEE 802.15.4 IoT devices with adjustable transmit power. Our approach is based on the IETF's Routing Protocol for Low power and lossy networks (RPL). Nodes discover neighbors and keep fresh link statistics for each available transmit power level. Using the product of ETX and local transmit power level as a single metric, each node selects both the parent that minimizes the energy for packet transmission along the path to the root and the optimal local transmit power to be used. We have implemented our cross-layer scheme in NG-Contiki using the Z1 mote and two transmit power levels (55mW and 31mW). Simulations of a network of 15 motes show that (on average) 66% of nodes selected the low-power setting in a 25m times25textm area. As a result, we obtained an average reduction of 25% of the energy spent on transmission and reception of packets compared to the standard RPL settings where all nodes use the same transmit power level. In large scenarios (e.g., 150m times150textm and 40-100 motes), our approach provides better results in dense networks where reducing the transmit power of nodes does not translate into longer paths to the root nor degraded quality of service. © 2013 IEEE.},
note = {cited By 5},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
2020
Díaz-Verdejo, Jesús E.; Estepa, Antonio; Estepa, Rafael; Madinabeitia, German; Muñoz-Calle, Fco Javier
A methodology for conducting efficient sanitization of HTTP training datasets Artículo de revista
En: Future Generation Computer Systems, vol. 109, pp. 67–82, 2020, ISSN: 0167739X.
@article{Diaz-Verdejo2020,
title = {A methodology for conducting efficient sanitization of HTTP training datasets},
author = {Jesús E. Díaz-Verdejo and Antonio Estepa and Rafael Estepa and German Madinabeitia and Fco Javier Muñoz-Calle},
url = {https://linkinghub.elsevier.com/retrieve/pii/S0167739X19322629},
doi = {10.1016/j.future.2020.03.033},
issn = {0167739X},
year = {2020},
date = {2020-08-01},
urldate = {2020-08-01},
journal = {Future Generation Computer Systems},
volume = {109},
pages = {67--82},
publisher = {Elsevier B.V.},
abstract = {The performance of anomaly-based intrusion detection systems depends on the quality of the datasets used to form normal activity profiles. Suitable datasets should include high volumes of real-life data free from attack instances. On account of this requirement, obtaining quality datasets from collected data requires a process of data sanitization that may be prohibitive if done manually, or uncertain if fully automated. In this work, we propose a sanitization approach for obtaining datasets from HTTP traces suited for training, testing, or validating anomaly-based attack detectors. Our methodology has two sequential phases. In the first phase, we clean known attacks from data using a pattern-based approach that relies on tools that detect URI-based known attacks. In the second phase, we complement the result of the first phase by conducting assisted manual labeling systematically and efficiently, setting the focus of expert examination not on the raw data (which would be millions of URIs), but on the set of words that compose the URIs. This dramatically downsizes the volume of data that requires expert discernment, making manual sanitization of large datasets feasible. We have applied our method to sanitize a trace that includes 45 million requests received by the library web server of the University of Seville. We were able to generate clean datasets in less than 84 h with only 33 h of manual supervision. We have also applied our method to some public benchmark datasets, confirming that attacks unnoticed by signature-based detectors can be discovered in a reduced time span.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Estepa, R.; Díaz-Verdejo, J. E.; Estepa, A.; Madinabeitia, G.
How Much Training Data is Enough? A Case Study for HTTP Anomaly-Based Intrusion Detection Artículo de revista
En: IEEE Access, vol. 8, pp. 44410-44425, 2020, ISSN: 2169-3536.
@article{2020-howmuch,
title = {How Much Training Data is Enough? A Case Study for HTTP Anomaly-Based Intrusion Detection},
author = {R. Estepa and J. E. Díaz-Verdejo and A. Estepa and G. Madinabeitia},
doi = {10.1109/ACCESS.2020.2977591},
issn = {2169-3536},
year = {2020},
date = {2020-03-02},
journal = {IEEE Access},
volume = {8},
pages = {44410-44425},
abstract = {Most anomaly-based intrusion detectors rely on models that learn from training datasets whose quality is crucial in their performance. Albeit the properties of suitable datasets have been formulated, the influence of the dataset size on the performance of the anomaly-based detector has received scarce attention so far. In this work, we investigate the optimal size of a training dataset. This size should be large enough so that training data is representative of normal behavior, but after that point, collecting more data may result in unnecessary waste of time and computational resources, not to mention an increased risk of overtraining. In this spirit, we provide a method to find out when the amount of data collected at the production environment is representative of normal behavior in the context of a detector of HTTP URI attacks based on 1-grammar. Our approach is founded on a set of indicators related to the statistical properties of the data. These indicators are periodically calculated during data collection, producing time series that stabilize when more training data is not expected to translate to better system performance, which indicates that data collection can be stopped. We present a case study with real-life datasets collected at the University of Seville (Spain) and a public dataset from the University of Saskatchewan. The application of our method to these datasets showed that more than 42% of one trace, and almost 20% of another were unnecessarily collected, thereby showing that our proposed method can be an efficient approach for collecting training data at the production environment.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Mayor, V.; Estepa, R.; Estepa, A.; Madinabeitia, G.
Unified call admission control in corporate domains Artículo de revista
En: Computer Communications, vol. 150, pp. 589-602, 2020, ISSN: 01403664, (cited By 4).
@article{Mayor2020589,
title = {Unified call admission control in corporate domains},
author = {V. Mayor and R. Estepa and A. Estepa and G. Madinabeitia},
url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85076849304&doi=10.1016%2fj.comcom.2019.11.041&partnerID=40&md5=5af7826dafc22674ad6e1d5dd0e20f57},
doi = {10.1016/j.comcom.2019.11.041},
issn = {01403664},
year = {2020},
date = {2020-01-01},
urldate = {2020-01-01},
journal = {Computer Communications},
volume = {150},
pages = {589-602},
publisher = {Elsevier B.V.},
abstract = {Call Admission Control is a central mechanism for assurance of quality of service in telephony. While CAC is integrated into Public Switched Telephony Network (PSTN), its application to voice over IP in a corporate environment is challenging not only due to the heterogeneity of technologies, but also because of the difficulty of implementation into commercial VoIP terminals or Access Points. We present a novel framework that unifies call admission control for VoIP telephony corporate users despite their access network (i.e., WiFi or Ethernet) under a single corporate management domain. Our Unified CAC (U-CAC) system can be implemented in a VoIP Gateway/Proxy and uses only standard protocols already present in commercial off-the-shelf devices, avoiding the need to modify the firmware of existing APs or VoIP terminals. We define two variants of the decision algorithm: basic and advanced. In the basic mode of operation, the admission of new calls is based on the availability of spare circuits and the impact of the new call in the speech quality of VoWiFi calls in progress. In the advanced mode of operation, the traffic load in affected APs is proactively reduced by reconfiguring ongoing calls before rejecting the new call. Simulation results show that the number of simultaneous VoWiFi calls under guaranteed quality increases with our unified call admission control scheme. When using the advanced mode of operation, the number of simultaneous calls under guaranteed quality can be doubled when compared to the standard mode of operation. © 2019 Elsevier B.V.},
note = {cited By 4},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Mayor, V.; Estepa, R.; Estepa, A.; Madinabeitia, G.
Energy-efficient uavs deployment for qos-guaranteed vowifi service Artículo de revista
En: Sensors (Switzerland), vol. 20, no 16, pp. 1-32, 2020, ISSN: 14248220, (cited By 8).
@article{Mayor20201,
title = {Energy-efficient uavs deployment for qos-guaranteed vowifi service},
author = {V. Mayor and R. Estepa and A. Estepa and G. Madinabeitia},
url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85089348929&doi=10.3390%2fs20164455&partnerID=40&md5=e3dcfd4e62d8b2180e9fdfe7b936b6c0},
doi = {10.3390/s20164455},
issn = {14248220},
year = {2020},
date = {2020-01-01},
urldate = {2020-01-01},
journal = {Sensors (Switzerland)},
volume = {20},
number = {16},
pages = {1-32},
publisher = {MDPI AG},
abstract = {This paper formulates a new problem for the optimal placement of Unmanned Aerial Vehicles (UAVs) geared towards wireless coverage provision for Voice over WiFi (VoWiFi) service to a set of ground users confined in an open area. Our objective function is constrained by coverage and by VoIP speech quality and minimizes the ratio between the number of UAVs deployed and energy efficiency in UAVs, hence providing the layout that requires fewer UAVs per hour of service. Solutions provide the number and position of UAVs to be deployed, and are found using well-known heuristic search methods such as genetic algorithms (used for the initial deployment of UAVs), or particle swarm optimization (used for the periodical update of the positions). We examine two communication services: (a) one bidirectional VoWiFi channel per user; (b) single broadcast VoWiFi channel for announcements. For these services, we study the results obtained for an increasing number of users confined in a small area of 100 m2 as well as in a large area of 10,000 m2 . Results show that the drone turnover rate is related to both users’ sparsity and the number of users served by each UAV. For the unicast service, the ratio of UAVs per hour of service tends to increase with user sparsity and the power of radio communication represents 14–16% of the total UAV energy consumption depending on ground user density. In large areas, solutions tend to locate UAVs at higher altitudes seeking increased coverage, which increases energy consumption due to hovering. However, in the VoWiFi broadcast communication service, the traffic is scarce, and solutions are mostly constrained only by coverage. This results in fewer UAVs deployed, less total power consumption (between 20% and 75%), and less sensitivity to the number of served users. © 2020 by the authors. Licensee MDPI, Basel, Switzerland.},
note = {cited By 8},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
2019
Mayor, V.; Estepa, R.; Estepa, A.; Madinabeitia, G.
Deploying a Reliable UAV-Aided Communication Service in Disaster Areas Artículo de revista
En: Wireless Communications and Mobile Computing, vol. 2019, 2019, ISSN: 15308669, (cited By 25).
@article{Mayor2019,
title = {Deploying a Reliable UAV-Aided Communication Service in Disaster Areas},
author = {V. Mayor and R. Estepa and A. Estepa and G. Madinabeitia},
url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85065643702&doi=10.1155%2f2019%2f7521513&partnerID=40&md5=415539a365bd0d35ce600b19ff3ce412},
doi = {10.1155/2019/7521513},
issn = {15308669},
year = {2019},
date = {2019-01-01},
urldate = {2019-01-01},
journal = {Wireless Communications and Mobile Computing},
volume = {2019},
publisher = {Hindawi Limited},
abstract = {When telecommunication infrastructure is damaged by natural disasters, creating a network that can handle voice channels can be vital for search and rescue missions. Unmanned Aerial Vehicles (UAV) equipped with WiFi access points could be rapidly deployed to provide wireless coverage to ground users. This WiFi access network can in turn be used to provide a reliable communication service to be used in search and rescue missions. We formulate a new problem for UAVs optimal deployment which considers not only WiFi coverage but also the mac sublayer (i.e., quality of service). Our goal is to dispatch the minimum number of UAVs for provisioning a WiFi network that enables reliable VoIP communications in disaster scenarios. Among valid solutions, we choose the one that minimizes energy expenditure at the user's WiFi interface card in order to extend ground user's smartphone battery life as much as possible. Solutions are found using well-known heuristics such as K-means clusterization and genetic algorithms. Via numerical results, we show that the IEEE 802.11 standard revision has a decisive impact on the number of UAVs required to cover large areas, and that the user's average energy expenditure (attributable to communications) can be reduced by limiting the maximum altitude for drones or by increasing the VoIP speech quality. © 2019 Vicente Mayor et al.},
note = {cited By 25},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Estepa, A.; Estepa, R.; Madinabeitia, G.; Vozmediano, J.
Designing Cost-Effective Reliable Networks from a Risk Analysis Perspective: A Case Study for a Hospital Campus Artículo de revista
En: IEEE Access, vol. 7, pp. 120411-120423, 2019, ISSN: 21693536, (cited By 0).
@article{Estepa2019120411,
title = {Designing Cost-Effective Reliable Networks from a Risk Analysis Perspective: A Case Study for a Hospital Campus},
author = {A. Estepa and R. Estepa and G. Madinabeitia and J. Vozmediano},
url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85097341585&doi=10.1109%2fACCESS.2019.2937449&partnerID=40&md5=4894eb6b5897d4f7e9e02d45d51ce3be},
doi = {10.1109/ACCESS.2019.2937449},
issn = {21693536},
year = {2019},
date = {2019-01-01},
journal = {IEEE Access},
volume = {7},
pages = {120411-120423},
publisher = {Institute of Electrical and Electronics Engineers Inc.},
abstract = {The unavailability of information and communication services due to network-related incidents may have a significant impact on large organizations. Network incidents can hence be viewed as a risk for organizations whose consequences are not accounted for by traditional network design problems. In this work, we address the problem of designing a reliable wired network from a risk analysis perspective. We propose a novel methodology for the quantitative assessment of the risk associated with network-related incidents in a hospital campus. We then define an optimization problem to find the topology that minimizes the network cost plus the expected loss over time attributable to the unavailability of corporate services to staff affected by network incidents. A case study illustrates our methodology and its benefits. Using available public information, we design the topology of a campus network for a large hospital where the cost of labor exceeds 200M€/year. The solution to our optimization problem is found through well-known genetic algorithms and provides a topology where network nodes with a higher impact on productivity exhibit higher reliability. As a consequence, the topology obtained reduces more than 95% (+392 000€) the expected annual lost profits when compared to common reduced-cost topologies such as the minimum-cost ring or the non-reliable minimum-cost tree, showing that investment in risk reduction pays off. Our contribution may be used by engineers to (re)design cost-effective reliable networks or by hospital managers to support decisions on updating present infrastructure based on risk reduction. © 2013 IEEE.},
note = {cited By 0},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Alonso, Antonio J. Estepa; Díaz-Verdejo, Jesús E.; Ramírez, Estefanía Osma; Alonso, Rafael M. Estepa; Luque, Germán Madinabeitia; Romero, Agustín W. Lara
Ciberseguridad en entornos de generación eléctrica en parques renovables. Resumen extendido Proceedings Article
En: Actas de las V Jornadas Nacionales de Investigación en Ciberseguridad, pp. 334–335, 2019, ISBN: 978-84-09-12121-2.
@inproceedings{Alonso2019,
title = {Ciberseguridad en entornos de generación eléctrica en parques renovables. Resumen extendido},
author = {Antonio J. Estepa Alonso and Jesús E. Díaz-Verdejo and Estefanía Osma Ramírez and Rafael M. Estepa Alonso and Germán Madinabeitia Luque and Agustín W. Lara Romero},
isbn = {978-84-09-12121-2},
year = {2019},
date = {2019-01-01},
booktitle = {Actas de las V Jornadas Nacionales de Investigación en Ciberseguridad},
pages = {334--335},
abstract = {Este documento presenta un proyecto en curso en el marco de ciberseguridad en entornos industriales de generación eléctrica. Por limitaciones de espacio y por motivos de confidencialidad, tan sólo se describirá el contexto de este proyecto, el alcance esperado y los requisitos que debe cumplir la solución de ciberseguridad. Por último se realiza una breve introducción al diseño inicial de la solución propuesta siguiendo la aproximación de Mínimo Producto Viable. Dicha solución se basa en la definición de Indicadores de Compromiso IoC para la detección anomalías y vulnerabilidades en la planta.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Díaz-Verdejo, Jesús; Alonso, Rafael Estepa; Alonso, Antonio Estepa; Madinabeitia, Germán
Metodología supervisada para la obtención de trazas limpias del servicio HTTP Proceedings Article
En: Actas de las V Jornadas Nacionales de Investigación en Ciberseguridad, pp. 78–85, 2019.
@inproceedings{Diaz-verdejo2019,
title = {Metodología supervisada para la obtención de trazas limpias del servicio HTTP},
author = {Jesús Díaz-Verdejo and Rafael Estepa Alonso and Antonio Estepa Alonso and Germán Madinabeitia},
year = {2019},
date = {2019-01-01},
booktitle = {Actas de las V Jornadas Nacionales de Investigación en Ciberseguridad},
pages = {78--85},
abstract = {Disponer de datos adecuados para el entrenamiento, evaluación y validación de sistemas de detección de intrusos basados en anomalías representa un problema de índole práctica relevante. Las características requeridas para los datos plantean una serie de retos contrapuestos entre los que destaca la necesidad de disponer de un volumen significativo de datos reales que no contenga instancias de ataques. Esto implica un proceso de limpieza y supervisión que puede resultar muy costoso si se realiza manualmente. En este trabajo planteamos una metodología para automatizar en lo posible la adquisición y acondicionamiento de trazas del servicio HTTP para la detección de ataques basada en URI. Esta metodología se aplica con buenos resultados sobre una traza real como caso de estudio.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
NOTA: La paginación afecta a todos los apartados. Vuelva a la página 1 para ver los elementos de otras categorías.
Proyectos de investigación (ciberseguridad)
PID2020-115199RB-I00 – Detección de ciberataques en “industria conectada” e IoT mediante integración y correlación de alertas multifuente (COINCYDE)
Entidad financiadora: Ministerio de Ciencia e Innovación – MICIN/AEI/10.13039/50110 0 011033
Entidad/es participantes: Universidad de Granada / Universidad de Sevilla – N. invest.: 8
Periodo: 01/09/2021 a 31/08/2024
@online{coincyde,
title = {Detección de ciberataques en “industria conectada” e IoT mediante integración y correlación de alertas multifuente (COINCYDE)},
author = { Jesús E. {Díaz Verdejo} and Juan Carlos {Cubero Talavera} and Francisco {Cortijo Bon} and Antonio {Estepa Alonso} and Rafael {Estepa Alonso} and Germán {Madinabeitia Luque} and Olga {Pons Capote} and Amparo {Vila Miranda}
},
url = {/neus-cslab/proyectos-idi/coincyde},
year = {2021},
date = {2021-09-01},
urldate = {2021-09-01},
booktitle = {Detección de ciberataques en “industria conectada” e IoT mediante integración y correlación de alertas multifuente (COINCYDE)},
issuetitle = {MICIN/AEI/10.13039/50110 0 011033},
number = {PID2020-115199RB-I00 },
pages = {8},
institution = {Universidad de Granada / Universidad de Sevilla},
organization = {Ministerio de Ciencia e Innovación },
series = {01/09/2021 a 31/08/2024},
abstract = {Los sistemas de monitorización de la seguridad en red (NSM) se encuentran hoy en día entre los componentes más relevantes para la detección y respuesta a los ciberataques. Sin embargo, sus capacidades de detección se limitan en su mayoría a ataques conocidos y tienden a generar una gran cantidad de alertas, muchas de las cuales son falsos positivos. Así, los operadores de ciberseguridad (CSO) deben supervisar una gran cantidad de alertas para determinar la ocurrencia real de incidentes, mientras que algunos de ellos permanecen sin ser detectados. Este proyecto tiene como objetivo desarrollar nuevas técnicas para mejorar las capacidades de detección mediante la adición de nuevos métodos basados en anomalías combinados con la correlación y priorización de alertas incorporando información contextual de la red. Esto mejorará la calidad de las alertas y reducirá la tasa de falsos positivos.
En esta propuesta se plantea el desarrollo de un NSM específico para plantas industriales con elementos del Internet of Things (IoT) y, más concretamente en uno de sus usos verticales: las SmartCity. Las instalaciones que pueden beneficiarse de la solución objeto de este proyecto son aquellas que permiten el control y monitorización de parques de dispositivos inteligentes (IoT, SmartCity), desde una aplicación o servicio web que se utiliza como interfaz de usuario para la gestión de servicios inteligentes. La elección del escenario tiene
una triple motivación. Primero, por la gran relevancia y expansión de este tipo de redes en la actualidad. Segundo, el escenario plantea una serie dificultades y requisitos específicos que no han sido convenientemente abordados en los SIEM actuales. Y tercero, la selección del escenario permite acotar el contexto, lo que posibilita un abordaje adecuado de la incorporación de información contextual.
El sistema a desarrollar incorporará múltiples detectores, incluyendo los usados habitualmente, considerando nuevos detectores específicos para el escenario que están orientados a las diversas amenazas existentes. Así, se desarrollarán detectores basados en anomalías a nivel del tráfico observado (flujos), a nivel de aplicación (sensorización) y a nivel de los servicios web usados para la operación remota. Adicionalmente, se hará uso de técnicas de inteligencia artificial para la correlación y priorización de las alertas incorporando información relativa al estado e historia previa de la red. Esto permitirá identificar falsos positivos, reducir el número de alertas finalmente enviadas al CSO y mejorar la información en las mismas.
Un elemento relevante y novedoso es el uso de una matriz de tráfico generada a partir de flujos en diferentes escalas de tiempo. Esta matriz contiene información sobre las conexiones de red que pueden explotarse para múltiples usos. Así, se pueden establecer algunos indicadores de compromiso para identificar ataques. También se puede utilizar para aplicar varios tipos de análisis de minería de datos, como la búsqueda de patrones comunes entre flujos, realizar perfiles de tráfico de servicios, evaluar la importancia y encontrar relaciones entre activos. La información extraída de esta matriz se utilizará como información contextual en la correlación y priorización de alertas.
Finalmente, la arquitectura propuesta incluye realimentación a partir de las acciones del CSO, lo que permite evaluar la calidad de detección y priorización y ajustar el rendimiento del sistema.},
note = {47795 €},
keywords = {},
pubstate = {published},
tppubtype = {online}
}
En esta propuesta se plantea el desarrollo de un NSM específico para plantas industriales con elementos del Internet of Things (IoT) y, más concretamente en uno de sus usos verticales: las SmartCity. Las instalaciones que pueden beneficiarse de la solución objeto de este proyecto son aquellas que permiten el control y monitorización de parques de dispositivos inteligentes (IoT, SmartCity), desde una aplicación o servicio web que se utiliza como interfaz de usuario para la gestión de servicios inteligentes. La elección del escenario tiene
una triple motivación. Primero, por la gran relevancia y expansión de este tipo de redes en la actualidad. Segundo, el escenario plantea una serie dificultades y requisitos específicos que no han sido convenientemente abordados en los SIEM actuales. Y tercero, la selección del escenario permite acotar el contexto, lo que posibilita un abordaje adecuado de la incorporación de información contextual.
El sistema a desarrollar incorporará múltiples detectores, incluyendo los usados habitualmente, considerando nuevos detectores específicos para el escenario que están orientados a las diversas amenazas existentes. Así, se desarrollarán detectores basados en anomalías a nivel del tráfico observado (flujos), a nivel de aplicación (sensorización) y a nivel de los servicios web usados para la operación remota. Adicionalmente, se hará uso de técnicas de inteligencia artificial para la correlación y priorización de las alertas incorporando información relativa al estado e historia previa de la red. Esto permitirá identificar falsos positivos, reducir el número de alertas finalmente enviadas al CSO y mejorar la información en las mismas.
Un elemento relevante y novedoso es el uso de una matriz de tráfico generada a partir de flujos en diferentes escalas de tiempo. Esta matriz contiene información sobre las conexiones de red que pueden explotarse para múltiples usos. Así, se pueden establecer algunos indicadores de compromiso para identificar ataques. También se puede utilizar para aplicar varios tipos de análisis de minería de datos, como la búsqueda de patrones comunes entre flujos, realizar perfiles de tráfico de servicios, evaluar la importancia y encontrar relaciones entre activos. La información extraída de esta matriz se utilizará como información contextual en la correlación y priorización de alertas.
Finalmente, la arquitectura propuesta incluye realimentación a partir de las acciones del CSO, lo que permite evaluar la calidad de detección y priorización y ajustar el rendimiento del sistema.
PYC20-RE-087-USE – Sistema para la detección temprana de ciberataques en industria conectada e IoT mediante detección de anomalías multiplanta
Entidad financiadora: Universidad de Sevilla – Junta de Andalucía – Proyectos singulares de actuaciones de transferencia en los CEI en las áreas RIS3 (CEI20)
Entidad/es participantes: Universidad de Sevilla, Wellness TechGroup como agente agregado – N. invest.: 5
Periodo: 01/01/2021 a 31/12/2022
@online{cei2,
title = {Sistema para la detección temprana de ciberataques en industria conectada e IoT mediante detección de anomalías multiplanta},
url = {/neus-cslab/proyectosidi/cei2},
year = {2021},
date = {2021-01-01},
urldate = {2021-01-01},
issuetitle = {Proyectos singulares de actuaciones de transferencia en los CEI en las áreas RIS3 (CEI20)},
number = {PYC20-RE-087-USE},
pages = {5},
institution = {Universidad de Sevilla, Wellness TechGroup como agente agregado},
organization = {Universidad de Sevilla - Junta de Andalucía},
series = {01/01/2021 a 31/12/2022},
note = {68550 €},
keywords = {},
pubstate = {published},
tppubtype = {online}
}
2020/00000172 – Detección Inteligente de Incidentes de Ciberseguridad en redes IoT en base a n-gramáticas adaptativas
Entidad financiadora: US – Junta de Andalucía – Proyectos singulares de actuaciones de transferencia en los CEI en las áreas RIS3
Entidad/es participantes: Universidad de Sevilla, Wellness TechGroup como agente agregado
Periodo: 01/03/2020 a 30/09/2021
@online{cei1,
title = {Detección Inteligente de Incidentes de Ciberseguridad en redes IoT en base a n-gramáticas adaptativas},
year = {2020},
date = {2020-01-01},
urldate = {2020-01-01},
issuetitle = {Proyectos singulares de actuaciones de transferencia en los CEI en las áreas RIS3},
number = {2020/00000172},
institution = {Universidad de Sevilla, Wellness TechGroup como agente agregado},
organization = {US - Junta de Andalucía},
series = {01/03/2020 a 30/09/2021},
note = {33000 €},
keywords = {},
pubstate = {published},
tppubtype = {online}
}
NOTA: La paginación afecta a todos los apartados. Vuelva a la página 1 para ver los elementos de otras categorías.
Acciones de transferencia (ciberseguridad)
Proyectos transf.
PI-2132/22/2021 – Detección de ciberamenazas en los sistemas de monitorización y control de instalaciones de Generación Renovables (RENSHIELD)
Entidad financiadora: Isotrol / Ministerio Ciencia y Tecnología
Entidad/es participantes: AICIA – N. invest.: 6
Periodo: 01/06/2021 a 31/12/2023
@online{renshield,
title = {Detección de ciberamenazas en los sistemas de monitorización y control de instalaciones de Generación Renovables (RENSHIELD)},
url = {/neus-cslab/renshield/},
year = {2021},
date = {2021-01-01},
urldate = {2021-01-01},
number = {PI-2132/22/2021},
pages = {6},
institution = {AICIA},
organization = {Isotrol / Ministerio Ciencia y Tecnología},
series = {01/06/2021 a 31/12/2023},
note = {59994,45 €},
keywords = {},
pubstate = {published},
tppubtype = {online}
}
PI-2040/22/2020 – Diseño de un Sistema de Bastionado Híbrido en Aplicaciones Web frente a las Amenazas OWASP
Entidad financiadora: Universidad de Sevilla
Entidad/es participantes: Universidad de Sevilla – N. invest.: 4
Periodo: 15/10/2020 a 15/07/2021
@online{owasp,
title = {Diseño de un Sistema de Bastionado Híbrido en Aplicaciones Web frente a las Amenazas OWASP},
year = {2020},
date = {2020-01-01},
urldate = {2020-01-01},
number = {PI-2040/22/2020},
pages = {4},
institution = {Universidad de Sevilla},
organization = {Universidad de Sevilla},
series = {15/10/2020 a 15/07/2021},
note = {18150 €},
keywords = {},
pubstate = {published},
tppubtype = {online}
}
PI-1921/22/2019 – Protección de Servidores de Investigación Mediante Detección de Estadíos Iniciales de Ataques Multi-etapa mediante Indicadores de Compromiso (IoC)
Entidad financiadora: Univ. de Sevilla
Entidad/es participantes: AICIA – N. invest.: 4
Periodo: 15/06/2019 a 15/06/2020
@online{ioc,
title = {Protección de Servidores de Investigación Mediante Detección de Estadíos Iniciales de Ataques Multi-etapa mediante Indicadores de Compromiso (IoC)},
year = {2019},
date = {2019-01-01},
urldate = {2019-01-01},
number = {PI-1921/22/2019},
pages = {4},
institution = {AICIA},
organization = {Univ. de Sevilla},
series = {15/06/2019 a 15/06/2020},
note = {17908 €},
keywords = {},
pubstate = {published},
tppubtype = {online}
}
PI-1872/22/2018 – Análisis de Seguridad mediante Monitorización de Sesiones de Usuario en la Red de la Biblioteca de la Universidad de Sevilla
Entidad financiadora: Univ. de Sevilla
Entidad/es participantes: AICIA – N. invest.: 4
Periodo: 01/12/2018 a 01/12/2019
@online{biblio,
title = {Análisis de Seguridad mediante Monitorización de Sesiones de Usuario en la Red de la Biblioteca de la Universidad de Sevilla},
year = {2018},
date = {2018-01-01},
urldate = {2018-01-01},
number = {PI-1872/22/2018},
pages = {4},
institution = {AICIA},
organization = {Univ. de Sevilla},
series = {01/12/2018 a 01/12/2019},
note = {14800 €},
keywords = {},
pubstate = {published},
tppubtype = {online}
}
PI-1814/26/2018 – Red Eléctrica cibersegura 1
Entidad financiadora: Isotrol / Ministerio Ciencia y Tecnología (Programa CIEN)
Entidad/es participantes: AICIA – N. invest.: 4
Periodo: 01/01/2018 a 31/12/2021
@online{rec,
title = {Red Eléctrica cibersegura 1},
year = {2018},
date = {2018-01-01},
urldate = {2018-01-01},
number = {PI-1814/26/2018},
pages = {4},
institution = {AICIA},
organization = {Isotrol / Ministerio Ciencia y Tecnología (Programa CIEN)},
series = {01/01/2018 a 31/12/2021},
note = {57340 €},
keywords = {},
pubstate = {published},
tppubtype = {online}
}
PI-1786/22/2018 – Sistema de ciberportección para servidores web de la Universidad de Sevilla (CiberwebUS)
Entidad financiadora: Univ. de Sevilla
Entidad/es participantes: AICIA – N. invest.: 4
Periodo: 01/03/2018 a 31/08/2018
@online{ciberwebus,
title = {Sistema de ciberportección para servidores web de la Universidad de Sevilla (CiberwebUS)},
year = {2018},
date = {2018-01-01},
urldate = {2018-01-01},
number = {PI-1786/22/2018},
pages = {4},
institution = {AICIA},
organization = {Univ. de Sevilla},
series = {01/03/2018 a 31/08/2018},
note = {10413 €},
keywords = {},
pubstate = {published},
tppubtype = {online}
}
PI-1736/22/2017 – Detección temprana de ataques de ciberseguridad para servidores web de la biblioteca de la US
Entidad financiadora: Univ. de Sevilla
Entidad/es participantes: AICIA – N. invest.: 5
Periodo: 01/10/2017 a 30/09/2018
@online{temprana,
title = {Detección temprana de ataques de ciberseguridad para servidores web de la biblioteca de la US},
year = {2017},
date = {2017-01-01},
urldate = {2017-01-01},
number = {PI-1736/22/2017},
pages = {5},
institution = {AICIA},
organization = {Univ. de Sevilla},
series = {01/10/2017 a 30/09/2018},
note = {12800 €},
keywords = {},
pubstate = {published},
tppubtype = {online}
}
CTA 16/909 – Sistema integral para vigilancia y auditoría de ciberseguridad corporativa
Entidad financiadora: WELLNESS TELECOM, S.L. / Junta de Andalucía (Corporación Tecnológica de Andalucía)
Entidad/es participantes: AICIA – N. invest.: 4
Periodo: 01/02/2017 a 15/01/2019
@online{siva,
title = {Sistema integral para vigilancia y auditoría de ciberseguridad corporativa},
year = {2017},
date = {2017-01-01},
urldate = {2017-01-01},
number = {CTA 16/909},
pages = {4},
institution = {AICIA},
organization = {WELLNESS TELECOM, S.L. / Junta de Andalucía (Corporación Tecnológica de Andalucía)},
series = {01/02/2017 a 15/01/2019},
note = {79200 €},
keywords = {},
pubstate = {published},
tppubtype = {online}
}
NOTA: La paginación afecta a todos los apartados. Vuelva a la página 1 para ver los elementos de otras categorías.
Patentes y propiedad intelectual
- Inventores (p.o. de firma): Rafael Estepa Alonso, Antonio Estepa Alonso, Jesús Díaz Verdejo, Germán Madinabeitia Luque, Agustín Lara Romero
Título: Demostrador de anomalías en aplicaciones de iluminación inteligente
N. de solicitud: SE-59-23
Fecha de prioridad: 2023
Entidad titular: Universidad de Sevilla – Universidad de Granada
Otros
Tesis doctorales dirigidas
- Juan
Innovación docente
Ha participado en numerosas acciones de innovación docente,
Docencia previa
Ha impartido docencia en los diferentes títulos relacionados con Ing. de Telecomunicación desde el año XX. Las asignaturas impartidas son:
Grados: Titulaciones extintas
- Elec
Posgrados: Titulaciones extintas
- Diseño de
Posgrados: Titulaciones en vigor
- Planificación y explotación de redes y servicios – Máster en Ing. Telecomunicación
Gestión universitaria
- Ha sido
Premios
- Best paper: Aplicacion de control de acceso y técnicas de Blockchain para el control de datos genéticos, VI Jornadas Nacionales de Investigación en Ciberseguridad.