[EN] The main contribution of this paper is to provide an accurate taxonomy for delivery techniques, which allows the detection of novel techniques and the identification of appropriate countermeasures. Delivery is a key ...
[EN] The main contribution of this paper is to provide an accurate taxonomy for Persistence techniques, which allows the detection of novel techniques and the identification of appropriate countermeasures. Persistence is ...
Cervera I Tejedo, Carles(Universitat Politècnica de València, 2018-10-18)
[ES] El objetivo de este proyecto es hacer un análisis de fuentes abiertas en profundidad
del grupo de ciberespionaje Turla, contextualizado en la comunidad de ciberinteligencia
rusa, a priori una de las más potentes del ...
[EN] Destructive and control operations are today a major threat for cyber physical systems. These operations, known as Computer Network Attack (CNA), and usually linked to state-sponsored actors, are much less analyzed ...
[EN] Cyber threat intelligence feeds the focus on atomic and computed indicators of compromise. These indicators are the main source of tactical cyber intelligence most organizations benefit from. They are expressed in ...
Villalón Huerta, Antonio(Universitat Politècnica de València, 2023-06-05)
[ES] La información y los sistemas que la tratan son un activo a proteger para personas, organizaciones e incluso países enteros. Nuestra dependencia en las tecnologías de la información es cada día mayor, por lo que su ...
Sánchez Madrid, Marcos(Universitat Politècnica de València, 2013-09-17)
Existen herramientas que permiten controlar todas las conexiones que se hacen desde
y hacia Internet, mediante sistemas IDS y sistemas IPS, de esta forma se alerta de los
ataques recibidos. Son herramientas orientadas a ...
Villalón-Huerta, Antonio; Marco-Gisbert, Héctor; Ripoll-Ripoll, Ismael(Institute of Electrical and Electronics Engineers, 2022)
[EN] Different kill chain models have been defined and analyzed to provide a common sequence of actions followed in offensive cyber operations. These models allow analysts to identify these operations and to understand how ...