Validation of Cybersecurity Framework for Threat Mitigation

Currently on the Internet there are many threats that threaten the security of the information of users who daily access this network using different devices that connect from their homes or organizations that in many cases do not have security controls enough and end up exposing themselves to all t...

Full description

Autores:
Tipo de recurso:
Fecha de publicación:
2022
Institución:
Universidad Pedagógica y Tecnológica de Colombia
Repositorio:
RiUPTC: Repositorio Institucional UPTC
Idioma:
eng
OAI Identifier:
oai:repositorio.uptc.edu.co:001/14355
Acceso en línea:
https://revistas.uptc.edu.co/index.php/ingenieria/article/view/14840
https://repositorio.uptc.edu.co/handle/001/14355
Palabra clave:
Threats
Bloackchain
Cybersecurity
Framework
Risks
Validation
Amenazas
Blockchain
Ciberseguridad
Framework
riesgos
Validación
Rights
License
Copyright (c) 2022 Yeison-Isaac Llanten-Lucio, Siler Amador-Donado, Katerine Marceles-Villalba
id REPOUPTC2_64654d6ad1f8450e5e57a6b697873b41
oai_identifier_str oai:repositorio.uptc.edu.co:001/14355
network_acronym_str REPOUPTC2
network_name_str RiUPTC: Repositorio Institucional UPTC
repository_id_str
dc.title.en-US.fl_str_mv Validation of Cybersecurity Framework for Threat Mitigation
dc.title.es-ES.fl_str_mv Validación de framework de ciberseguridad para la mitigación de amenazas
title Validation of Cybersecurity Framework for Threat Mitigation
spellingShingle Validation of Cybersecurity Framework for Threat Mitigation
Threats
Bloackchain
Cybersecurity
Framework
Risks
Validation
Amenazas
Blockchain
Ciberseguridad
Framework
riesgos
Validación
title_short Validation of Cybersecurity Framework for Threat Mitigation
title_full Validation of Cybersecurity Framework for Threat Mitigation
title_fullStr Validation of Cybersecurity Framework for Threat Mitigation
title_full_unstemmed Validation of Cybersecurity Framework for Threat Mitigation
title_sort Validation of Cybersecurity Framework for Threat Mitigation
dc.subject.en-US.fl_str_mv Threats
Bloackchain
Cybersecurity
Framework
Risks
Validation
topic Threats
Bloackchain
Cybersecurity
Framework
Risks
Validation
Amenazas
Blockchain
Ciberseguridad
Framework
riesgos
Validación
dc.subject.es-ES.fl_str_mv Amenazas
Blockchain
Ciberseguridad
Framework
riesgos
Validación
description Currently on the Internet there are many threats that threaten the security of the information of users who daily access this network using different devices that connect from their homes or organizations that in many cases do not have security controls enough and end up exposing themselves to all those threats that grow over time. That is why this article aims to propose the validation of a cybersecurity framework that allows mitigating and reducing risks to increase security levels through the implementation of controls for homes and organizations using emerging technologies such as: IoT, Blockchain and Deep Learning. The foregoing was carried out with the methodological approach of action research starting from the improvement of the process in search of transformation, thus obtaining as results the integration of the aforementioned methodologies for the detection of possible malicious hosts within an internal network through an intelligent analysis of the traffic that passes through the same network in order to intelligently generate rules in intrusion detection systems (IDS) in an automated way and that these rules can in turn be distributed through a secure channel using the Blockchain technology, to finally guarantee the integrity of said rules and that also allows maintaining the immutability and synchronization of the same information with all the devices connected to the framework.
publishDate 2022
dc.date.accessioned.none.fl_str_mv 2024-07-05T19:12:09Z
dc.date.available.none.fl_str_mv 2024-07-05T19:12:09Z
dc.date.none.fl_str_mv 2022-10-02
dc.type.none.fl_str_mv info:eu-repo/semantics/article
dc.type.coar.fl_str_mv http://purl.org/coar/resource_type/c_2df8fbb1
dc.type.coarversion.fl_str_mv http://purl.org/coar/version/c_970fb48d4fbd8a85
dc.type.version.spa.fl_str_mv info:eu-repo/semantics/publishedVersion
dc.type.coarversion.spa.fl_str_mv http://purl.org/coar/version/c_970fb48d4fbd8a326
status_str publishedVersion
dc.identifier.none.fl_str_mv https://revistas.uptc.edu.co/index.php/ingenieria/article/view/14840
10.19053/01211129.v31.n62.2022.14840
dc.identifier.uri.none.fl_str_mv https://repositorio.uptc.edu.co/handle/001/14355
url https://revistas.uptc.edu.co/index.php/ingenieria/article/view/14840
https://repositorio.uptc.edu.co/handle/001/14355
identifier_str_mv 10.19053/01211129.v31.n62.2022.14840
dc.language.none.fl_str_mv eng
dc.language.iso.spa.fl_str_mv eng
language eng
dc.relation.none.fl_str_mv https://revistas.uptc.edu.co/index.php/ingenieria/article/view/14840/12263
https://revistas.uptc.edu.co/index.php/ingenieria/article/view/14840/12567
dc.rights.en-US.fl_str_mv Copyright (c) 2022 Yeison-Isaac Llanten-Lucio, Siler Amador-Donado, Katerine Marceles-Villalba
http://creativecommons.org/licenses/by/4.0
dc.rights.coar.fl_str_mv http://purl.org/coar/access_right/c_abf2
dc.rights.coar.spa.fl_str_mv http://purl.org/coar/access_right/c_abf243
rights_invalid_str_mv Copyright (c) 2022 Yeison-Isaac Llanten-Lucio, Siler Amador-Donado, Katerine Marceles-Villalba
http://creativecommons.org/licenses/by/4.0
http://purl.org/coar/access_right/c_abf243
http://purl.org/coar/access_right/c_abf2
dc.format.none.fl_str_mv application/pdf
text/xml
dc.publisher.en-US.fl_str_mv Universidad Pedagógica y Tecnológica de Colombia
dc.source.en-US.fl_str_mv Revista Facultad de Ingeniería; Vol. 31 No. 62 (2022): October-December 2022 (Continuous Publication); e14840
dc.source.es-ES.fl_str_mv Revista Facultad de Ingeniería; Vol. 31 Núm. 62 (2022): Octubre-Diciembre 2022 (Publicación Continua) ; e14840
dc.source.none.fl_str_mv 2357-5328
0121-1129
institution Universidad Pedagógica y Tecnológica de Colombia
repository.name.fl_str_mv Repositorio Institucional UPTC
repository.mail.fl_str_mv repositorio.uptc@uptc.edu.co
_version_ 1839633848823971840
spelling 2022-10-022024-07-05T19:12:09Z2024-07-05T19:12:09Zhttps://revistas.uptc.edu.co/index.php/ingenieria/article/view/1484010.19053/01211129.v31.n62.2022.14840https://repositorio.uptc.edu.co/handle/001/14355Currently on the Internet there are many threats that threaten the security of the information of users who daily access this network using different devices that connect from their homes or organizations that in many cases do not have security controls enough and end up exposing themselves to all those threats that grow over time. That is why this article aims to propose the validation of a cybersecurity framework that allows mitigating and reducing risks to increase security levels through the implementation of controls for homes and organizations using emerging technologies such as: IoT, Blockchain and Deep Learning. The foregoing was carried out with the methodological approach of action research starting from the improvement of the process in search of transformation, thus obtaining as results the integration of the aforementioned methodologies for the detection of possible malicious hosts within an internal network through an intelligent analysis of the traffic that passes through the same network in order to intelligently generate rules in intrusion detection systems (IDS) in an automated way and that these rules can in turn be distributed through a secure channel using the Blockchain technology, to finally guarantee the integrity of said rules and that also allows maintaining the immutability and synchronization of the same information with all the devices connected to the framework.Actualmente en internet se encuentran muchas amenazas que atentan a la seguridad de la información de los usuarios que diariamente acceden a esta red haciendo uso de diferentes dispositivos que se conectan desde sus hogares u organizaciones que en gran cantidad de casos no cuentan con los controles de seguridad suficientes y terminan exponiéndose a todas esas amenazas que crecen con el pasar del tiempo. Es por ello que en este artículo tiene como objetivo proponer la validación de un framework de ciberseguridad que permita mitigar y disminuir los riesgos para aumentar los niveles de seguridad a través de la implementación de controles para los hogares y organizaciones haciendo uso de tecnologías emergentes como: IoT, Blockchain y Deep Learning. Lo anterior, se llevó a cabo con el enfoque metodológico de investigación acción partiendo desde el mejoramiento de proceso en busca de transformación, obteniendo de esa manera como resultados la integración de las metodologías antes mencionadas para detección de posibles host maliciosos dentro de una red interna mediante un análisis inteligente del tráfico que transita por la misma red con el fin de generar de manera inteligente reglas en sistemas de detectores de intrusos (IDS) de forma automatizada y que a su vez estas reglas se puedan distribuirse por un canal seguro haciendo uso de la tecnología Blockchain, para finalmente garantizar la integridad de dichas reglas y que además permita mantener la inmutabilidad y la sincronización de la misma información con todos los dispositivos conectados al framework.application/pdftext/xmlengengUniversidad Pedagógica y Tecnológica de Colombiahttps://revistas.uptc.edu.co/index.php/ingenieria/article/view/14840/12263https://revistas.uptc.edu.co/index.php/ingenieria/article/view/14840/12567Copyright (c) 2022 Yeison-Isaac Llanten-Lucio, Siler Amador-Donado, Katerine Marceles-Villalbahttp://creativecommons.org/licenses/by/4.0http://purl.org/coar/access_right/c_abf243http://purl.org/coar/access_right/c_abf2Revista Facultad de Ingeniería; Vol. 31 No. 62 (2022): October-December 2022 (Continuous Publication); e14840Revista Facultad de Ingeniería; Vol. 31 Núm. 62 (2022): Octubre-Diciembre 2022 (Publicación Continua) ; e148402357-53280121-1129ThreatsBloackchainCybersecurityFrameworkRisksValidationAmenazasBlockchainCiberseguridadFrameworkriesgosValidaciónValidation of Cybersecurity Framework for Threat MitigationValidación de framework de ciberseguridad para la mitigación de amenazasinfo:eu-repo/semantics/articlehttp://purl.org/coar/resource_type/c_2df8fbb1info:eu-repo/semantics/publishedVersionhttp://purl.org/coar/version/c_970fb48d4fbd8a326http://purl.org/coar/version/c_970fb48d4fbd8a85Llanten-Lucio, Yeison-IsaacAmador-Donado, SilerMarceles-Villalba, Katerine001/14355oai:repositorio.uptc.edu.co:001/143552025-07-18 11:53:44.166metadata.onlyhttps://repositorio.uptc.edu.coRepositorio Institucional UPTCrepositorio.uptc@uptc.edu.co