José Gaviria de la Puerta, Iker Pastor López , Borja Sanz Urquijo , Pablo García Bringas
The possibilities offered by the management of huge quantities of equipment and/or networks is attracting a growing number of developers of malware. In this paper, we propose a working methodology for the detection of malicious traffic, based on the analysis of the flow of packets circulating on the network. This objective is achieved through the parameterization of the characteristics of these packages to be analyzed later with supervised learning techniques focused on traffic labeling, so as to enable a proactive response to the large volume of information handled by current filters.
© 2008-2024 Fundación Dialnet · Todos los derechos reservados