{"id":62338,"date":"2008-11-01T00:00:00","date_gmt":"2008-11-01T00:00:00","guid":{"rendered":"https:\/\/www.deberes.net\/tesis\/sin-categoria\/data-mining-approaches-for-analysis-of-worm-activity-toward-automatic-signature-generation\/"},"modified":"2008-11-01T00:00:00","modified_gmt":"2008-11-01T00:00:00","slug":"data-mining-approaches-for-analysis-of-worm-activity-toward-automatic-signature-generation","status":"publish","type":"post","link":"https:\/\/www.deberes.net\/tesis\/analisis-de-datos\/data-mining-approaches-for-analysis-of-worm-activity-toward-automatic-signature-generation\/","title":{"rendered":"Data mining approaches for analysis of worm activity toward automatic signature generation"},"content":{"rendered":"<h2>Tesis doctoral de <strong> Urko Zurutuza Ortega <\/strong><\/h2>\n<p>En esta tesis se propone un marco para el an\u00e1lisis de tr\u00e1fico no solicitado (como intentos de propagaci\u00f3n de gusanos inform\u00e1ticos) recopilados por un sistema de monitorizaci\u00f3n de red. El an\u00e1lisis de esta informaci\u00f3n puede ser utilizado para conocer el tr\u00e1fico que circula por internet, as\u00ed como a modo de plataforma que permita tomar medidas ante fases tempranas de ataques a gran escala mediante la generaci\u00f3n autom\u00e1tica de firmas de sistemas de detecci\u00f3n de intrusiones (ids). Dicho an\u00e1lisis se realiza de forma iterativa utilizando t\u00e9cnicas de data mining. El marco se valida de forma experimental utilizando datos reales. Se muestra que unos pocos patrones son generalmente los responsables de generar grandes vol\u00famenes de datos, y se demuestra que el sistema es capaz de explicar m\u00e1s del 99% del tr\u00e1fico de un d\u00eda utilizando 86 firmas de ids generadas tras cinco iteraciones.<\/p>\n<p>&nbsp;<\/p>\n<h3>Datos acad\u00e9micos de la tesis doctoral \u00ab<strong>Data mining approaches for analysis of worm activity toward automatic signature generation<\/strong>\u00ab<\/h3>\n<ul>\n<li><strong>T\u00edtulo de la tesis:<\/strong>\u00a0 Data mining approaches for analysis of worm activity toward automatic signature generation <\/li>\n<li><strong>Autor:<\/strong>\u00a0 Urko Zurutuza Ortega <\/li>\n<li><strong>Universidad:<\/strong>\u00a0 Mondrag\u00f3n unibertsitatea<\/li>\n<li><strong>Fecha de lectura de la tesis:<\/strong>\u00a0 11\/01\/2008<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3>Direcci\u00f3n y tribunal<\/h3>\n<ul>\n<li><strong>Director de la tesis<\/strong>\n<ul>\n<li>Roberto Uribeetxeberria Ezpeleta<\/li>\n<\/ul>\n<\/li>\n<li><strong>Tribunal<\/strong>\n<ul>\n<li>Presidente del tribunal: Miguel Soriano <\/li>\n<li>pedro Garcia (vocal)<\/li>\n<li>Jos\u00e9 Manuel Estevez (vocal)<\/li>\n<li>Javier Areitio (vocal)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tesis doctoral de Urko Zurutuza Ortega En esta tesis se propone un marco para el an\u00e1lisis de tr\u00e1fico no solicitado [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"categories":[2207,13880,2528,54137],"tags":[137659,137658,137657,119548,137656,137655],"class_list":["post-62338","post","type-post","status-publish","format-standard","hentry","category-analisis-de-datos","category-informatica","category-inteligencia-artificial","category-mondragon-unibertsitatea","tag-javier-areitio","tag-jose-manuel-estevez","tag-miguel-soriano","tag-pedro-garcia","tag-roberto-uribeetxeberria-ezpeleta","tag-urko-zurutuza-ortega"],"_links":{"self":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/posts\/62338","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/comments?post=62338"}],"version-history":[{"count":0,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/posts\/62338\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/media?parent=62338"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/categories?post=62338"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/tags?post=62338"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}