dc.contributor.advisor | Ruiz Parrales, Iván Rubén | |
dc.contributor.author | Briones Ronquillo, Rubén Jacinto | |
dc.date.accessioned | 2024-03-14T14:02:29Z | |
dc.date.available | 2024-03-14T14:02:29Z | |
dc.date.issued | 2024 | |
dc.identifier.uri | http://dspace.utb.edu.ec/handle/49000/15657 | |
dc.description | The analytical focus on classifying CVE vulnerabilities and identifying threats through malicious DNS registration is essential to strengthen cybersecurity in network environments and communication protocols. This study focuses on the application of data analysis techniques to understand the nature and impact of known vulnerabilities, as well as to detect indicators of compromise through DNS traffic. By integrating information from the CVE database with DNS records, abnormal behavior patterns and correlations can be identified that help prevent and mitigate potential attacks. This analytical approach provides a holistic view of online threats, allowing cybersecurity professionals to make informed and proactive decisions to protect networks and communication systems. | es_ES |
dc.description | The analytical focus on classifying CVE vulnerabilities and identifying threats through malicious DNS registration is essential to strengthen cybersecurity in network environments and communication protocols. This study focuses on the application of data analysis techniques to understand the nature and impact of known vulnerabilities, as well as to detect indicators of compromise through DNS traffic. By integrating information from the CVE database with DNS records, abnormal behavior patterns and correlations can be identified that help prevent and mitigate potential attacks. This analytical approach provides a holistic view of online threats, allowing cybersecurity professionals to make informed and proactive decisions to protect networks and communication systems. | es_ES |
dc.description.abstract | El enfoque analítico en la clasificación de vulnerabilidades CVE y la identificación de amenazas a través del registro malicioso en DNS es fundamental para fortalecer la seguridad cibernética en entornos de redes y protocolos de comunicación. Este estudio se centra en la aplicación de técnicas de análisis de datos para comprender la naturaleza y el impacto de las vulnerabilidades conocidas, así como para detectar indicadores de compromiso a través del tráfico DNS. Al integrar información de la base de datos CVE con registros DNS, se pueden identificar patrones de comportamiento anormales y correlaciones que ayuden a prevenir y mitigar posibles ataques. Este enfoque analítico proporciona una visión holística de las amenazas en línea, permitiendo a los profesionales de seguridad cibernética tomar decisiones informadas y proactivas para proteger las redes y sistemas de comunicación. | es_ES |
dc.format.extent | 42 p. | es_ES |
dc.language.iso | es | es_ES |
dc.publisher | Babahoyo: UTB-FAFI. 2024 | es_ES |
dc.rights | Atribución-NoComercial-SinDerivadas 3.0 Ecuador | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/ec/ | * |
dc.subject | Enfoque Analítico | es_ES |
dc.subject | Clasificación de Vulnerabilidades - CVE | es_ES |
dc.subject | Registro Malicioso | es_ES |
dc.subject | DNS | es_ES |
dc.subject | Seguridad Cibernética | es_ES |
dc.subject | Amenazas en Redes | es_ES |
dc.subject | Protocolos de Comunicación | es_ES |
dc.title | Enfoque Analítico en la Clasificación de Vulnerabilidades CVE y la Identificación de Amenazas a través del Registro Malicioso en DNS. | es_ES |
dc.type | bachelorThesis | es_ES |