DOI:

https://doi.org/10.14483/22484728.10001

Publicado:

2014-12-24

Número:

Vol. 8 Núm. 2 (2014)

Sección:

Visión de Caso

Asturiux: detection system of computational anomalies

Autores/as

  • Felipe A. Corredor
  • Juan D. Villamarin V.

Palabras clave:

Computational anomalies, Events monitoring, Alert, Detection, Distributed system, Computational intelligence (es).

Descargas

Resumen (es)

Everyday in network management, it is complex the process to correlate events in different dimensions: legal violation, intrusions, monitoring failures, violation to security policies or breach of standards; to which face professionals, teaching and students in this area in Colombia. This article presents the technological aspects for the design and development of a distributed system for the computational anomalies detection that was termed “Asturiux”, which arises as a product from a research project in the teleinformatics area. To addressing this problematic it use the network security administration, and anomalies detection. The system was fully developed with free software, in which were integrated different technologies for the communication, authentication, persistence, computational intelligence and remote alerts. The verification instruments and the realized tests, reflect a high level of system efficiency, and acceptation from the actors involved.

Referencias

Polica Nacional, E. G. Criminalidad y analisis espacial de los delitos en Colombia, 2010. Recup..de http://oasportal.policia.gov.co/imagenes ponal/dijin/revista criminalidad/volumen53 1/estudios estadisticos/cifras.pdf. Mayo 2012.

Kroll Eiu, et al. Global Fraud report 2011. Recuperado

de http://www.krolladvisory.com/media/pdfs/KRL FraudReport2010-11.pdf. Septiembre 2012.

Villar Eugenio, G. F. Administracion avanzada de sistemas

informaticos (Primera.). Mexico: Alfaomega-Rama. 2010.

Marks Adam, Y. R. (2008). Information security awareness in higher education: An exploratory study. Computers & Security, 27, 241{253. 2008.

Hoang Xuan Dau, J., & PeterBertok. A programbasedanomaly

intrusion detection scheme using multiple detection engines and fuzzy inference. Journal of Network and Computer Applications, 32, 1219{1228.2009.

Anastasakis Leonidas. The information security policy unpacked: A critical study of the content of university policies. International Journal of Information Management, 29, 449{457. 2009.

Clark Andrew J., J. J. D. Data preprocessing for anomaly based network intrusion detection: A review. Computers & Security, 30, 353{375. 2011.

Seredynski Franciszek, P. B. Anomaly detection in TCP/IP networks using immune systems paradigm.Computer Communications, 30, 740{749. 2007.

Yang Ming Su. Real-time anomaly detection systems

for Denial-of-Service attacks by weighted k-nearestneighbor

classiers. Expert Systems with Applications,38, 3492{3498. 2011.

Podgurski Andy, W. M. Application-based anomaly intrusion detection with dynamic information ow analysis. Computers & Security, 27, 176{187. 2008.

Morris Franklin, et al. Information security policy: An organizational-level process model. Computers & Security, 28, 493{508. 2009

Goel Sanjay, I. N. Metrics for characterizing the form of security policies. Journal of Strategic Information Systems, 19, 281{295. 2010.

Cuppens Frederic Cuppens, Y. E. Formal enforcement

and management of obligation policies. Data & Knowledge Engineering, 71, 127{147. 2011.

IETF. RFC 4765 - The Intrusion Detection Message

Exchange Format (IDMEF). Recuperado de http://www.ietf.org/rfc/rfc4765.txt. Mayo 2012002E Vision Electronica

Cómo citar

APA

Corredor, F. A., y Villamarin V., J. D. (2014). Asturiux: detection system of computational anomalies. Visión electrónica, 8(2), 95–105. https://doi.org/10.14483/22484728.10001

ACM

[1]
Corredor, F.A. y Villamarin V., J.D. 2014. Asturiux: detection system of computational anomalies. Visión electrónica. 8, 2 (dic. 2014), 95–105. DOI:https://doi.org/10.14483/22484728.10001.

ACS

(1)
Corredor, F. A.; Villamarin V., J. D. Asturiux: detection system of computational anomalies. Vis. Electron. 2014, 8, 95-105.

ABNT

CORREDOR, Felipe A.; VILLAMARIN V., Juan D. Asturiux: detection system of computational anomalies. Visión electrónica, [S. l.], v. 8, n. 2, p. 95–105, 2014. DOI: 10.14483/22484728.10001. Disponível em: https://revistas.udistrital.edu.co/index.php/visele/article/view/10001. Acesso em: 18 abr. 2024.

Chicago

Corredor, Felipe A., y Juan D. Villamarin V. 2014. «Asturiux: detection system of computational anomalies». Visión electrónica 8 (2):95-105. https://doi.org/10.14483/22484728.10001.

Harvard

Corredor, F. A. y Villamarin V., J. D. (2014) «Asturiux: detection system of computational anomalies», Visión electrónica, 8(2), pp. 95–105. doi: 10.14483/22484728.10001.

IEEE

[1]
F. A. Corredor y J. D. Villamarin V., «Asturiux: detection system of computational anomalies», Vis. Electron., vol. 8, n.º 2, pp. 95–105, dic. 2014.

MLA

Corredor, Felipe A., y Juan D. Villamarin V. «Asturiux: detection system of computational anomalies». Visión electrónica, vol. 8, n.º 2, diciembre de 2014, pp. 95-105, doi:10.14483/22484728.10001.

Turabian

Corredor, Felipe A., y Juan D. Villamarin V. «Asturiux: detection system of computational anomalies». Visión electrónica 8, no. 2 (diciembre 24, 2014): 95–105. Accedido abril 18, 2024. https://revistas.udistrital.edu.co/index.php/visele/article/view/10001.

Vancouver

1.
Corredor FA, Villamarin V. JD. Asturiux: detection system of computational anomalies. Vis. Electron. [Internet]. 24 de diciembre de 2014 [citado 18 de abril de 2024];8(2):95-105. Disponible en: https://revistas.udistrital.edu.co/index.php/visele/article/view/10001

Descargar cita

Visitas

268

Dimensions


PlumX


Descargas

Los datos de descargas todavía no están disponibles.
Loading...