Mostrar el registro sencillo del ítem
dc.contributor.author | Aragonés Lozano, Mario | es_ES |
dc.contributor.author | Pérez Llopis, Israel | es_ES |
dc.contributor.author | Esteve Domingo, Manuel | es_ES |
dc.date.accessioned | 2024-06-20T18:16:27Z | |
dc.date.available | 2024-06-20T18:16:27Z | |
dc.date.issued | 2023-08 | es_ES |
dc.identifier.uri | http://hdl.handle.net/10251/205300 | |
dc.description.abstract | [EN] Cyberattacks are increasing in number and diversity in nature daily, and the tendency for them is to escalate dramatically in the forseeable future, with critical infrastructures (CI) assets and networks not being an exception to this trend. As time goes by, cyberattacks are more complex than before and unknown until they spawn, being very difficult to detect and remediate. To be reactive against those cyberattacks, usually defined as zero-day attacks, cyber-security specialists known as threat hunters must be in organizations' security departments. All the data generated by the organization's users must be processed by those threat hunters (which are mainly benign and repetitive and follow predictable patterns) in short periods to detect unusual behaviors. The application of artificial intelligence, specifically machine learning (ML) techniques (for instance NLP, C-RNN-GAN, or GNN), can remarkably impact the real-time analysis of those data and help to discriminate between harmless data and malicious data, but not every technique is helpful in every circumstance; as a consequence, those specialists must know which techniques fit the best at every specific moment. The main goal of the present work is to design a distributed and scalable system for threat hunting based on ML, and with a special focus on critical infrastructure needs and characteristics. | es_ES |
dc.description.sponsorship | This work was supported by the European Commission's Project PRAETORIAN (Protection of Critical Infrastructures from Advanced Combined Cyber and Physical Threats) under the Horizon 2020 Framework (Grant Agreement No. 101021274). | es_ES |
dc.language | Inglés | es_ES |
dc.publisher | MDPI AG | es_ES |
dc.relation.ispartof | Mathematics | es_ES |
dc.rights | Reconocimiento (by) | es_ES |
dc.subject | Critical infrastructure protection | es_ES |
dc.subject | Threat hunting | es_ES |
dc.subject | Cyberattacks | es_ES |
dc.subject | Artificial intelligence | es_ES |
dc.subject | Machine learning | es_ES |
dc.subject.classification | INGENIERÍA TELEMÁTICA | es_ES |
dc.title | Threat Hunting System for Protecting Critical Infrastructures Using a Machine Learning Approach | es_ES |
dc.type | Artículo | es_ES |
dc.identifier.doi | 10.3390/math11163448 | es_ES |
dc.relation.projectID | info:eu-repo/grantAgreement/EC/H2020/101021274/EU/Protection of Critical Infrastructures from advanced combined cyber and physical threats/ | es_ES |
dc.rights.accessRights | Abierto | es_ES |
dc.contributor.affiliation | Universitat Politècnica de València. Escuela Técnica Superior de Ingenieros de Telecomunicación - Escola Tècnica Superior d'Enginyers de Telecomunicació | es_ES |
dc.contributor.affiliation | Universitat Politècnica de València. Departamento de Comunicaciones - Departament de Comunicacions | es_ES |
dc.description.bibliographicCitation | Aragonés Lozano, M.; Pérez Llopis, I.; Esteve Domingo, M. (2023). Threat Hunting System for Protecting Critical Infrastructures Using a Machine Learning Approach. Mathematics. 11(16). https://doi.org/10.3390/math11163448 | es_ES |
dc.description.accrualMethod | S | es_ES |
dc.relation.publisherversion | https://doi.org/10.3390/math11163448 | es_ES |
dc.type.version | info:eu-repo/semantics/publishedVersion | es_ES |
dc.description.volume | 11 | es_ES |
dc.description.issue | 16 | es_ES |
dc.identifier.eissn | 2227-7390 | es_ES |
dc.relation.pasarela | S\498281 | es_ES |
dc.contributor.funder | COMISION DE LAS COMUNIDADES EUROPEA | es_ES |
dc.contributor.funder | Universitat Politècnica de València | es_ES |