Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Gabriel Maciá-Fernández is active.

Publication


Featured researches published by Gabriel Maciá-Fernández.


Computers & Security | 2009

Anomaly-based network intrusion detection: Techniques, systems and challenges

Pedro García-Teodoro; Jesús E. Díaz-Verdejo; Gabriel Maciá-Fernández; Enrique Vázquez

The Internet and computer networks are exposed to an increasing number of security threats. With new types of attacks appearing continually, developing flexible and adaptive security oriented approaches is a severe challenge. In this context, anomaly-based network intrusion detection techniques are a valuable technology to protect target systems and networks against malicious activities. However, despite the variety of such methods described in the literature in recent years, security tools incorporating anomaly detection functionalities are just starting to appear, and several important problems remain to be solved. This paper begins with a review of the most well-known anomaly-based intrusion detection techniques. Then, available platforms, systems under development and research projects in the area are presented. Finally, we outline the main challenges to be dealt with for the wide scale deployment of anomaly-based intrusion detectors, with special emphasis on assessment issues.


ACM Computing Surveys | 2013

Survey and taxonomy of botnet research through life-cycle

Rafael A. Rodríguez-Gómez; Gabriel Maciá-Fernández; Pedro García-Teodoro

Of all current threats to cybersecurity, botnets are at the top of the list. In consequence, interest in this problem is increasing rapidly among the research community and the number of publications on the question has grown exponentially in recent years. This article proposes a taxonomy of botnet research and presents a survey of the field to provide a comprehensive overview of all these contributions. Furthermore, we hope to provide researchers with a clear perspective of the gaps that remain to be filled in our defenses against botnets. The taxonomy is based upon the botnets life-cycle, defined as the sequence of stages a botnet needs to pass through in order to reach its goal. This approach allows us to consider the problem of botnets from a global perspective, which constitutes a key difference from other taxonomies that have been proposed. Under this novel taxonomy, we conclude that all attempts to defeat botnets should be focused on one or more stages of this life-cycle. In fact, the sustained hindering of any of the stages makes it possible to thwart a botnets progress and thus render it useless. We test the potential capabilities of our taxonomy by means of a survey of current botnet research, and find it genuinely useful in understanding the focus of the different contributions in this field.


IEEE Transactions on Information Forensics and Security | 2009

Mathematical Model for Low-Rate DoS Attacks Against Application Servers

Gabriel Maciá-Fernández; Jesús E. Díaz-Verdejo; Pedro García-Teodoro

In recent years, variants of denial of service (DoS) attacks that use low-rate traffic have been proposed, including the Shrew attack, reduction of quality attacks, and low-rate DoS attacks against application servers (LoRDAS). All of these are flooding attacks that take advantage of vulnerability in the victims for reducing the rate of the traffic. Although their implications and impact have been comprehensively studied, mainly by means of simulation, there is a need for mathematical models by which the behaviour of these sometimes complex processes can be described. In this paper, we propose a mathematical model for the LoRDAS attack. This model allows us to evaluate its performance by relating it to the configuration parameters of the attack and the dynamics of network and victim. The model is validated by comparing the performance values given against those obtained from a simulated environment. In addition, some applicability issues for the model are contributed, together with interpretation guidelines to the models behaviour. Finally, experience of the model enables us to make some recommendations for the challenging task of building defense techniques against this attack.


Computer Networks | 2013

Survey A model-based survey of alert correlation techniques

Saeed Salah; Gabriel Maciá-Fernández; Jesús E. Díaz-Verdejo

As telecommunication networks evolve rapidly in terms of scalability, complexity, and heterogeneity, the efficiency of fault localization procedures and the accuracy in the detection of anomalous behaviors are becoming important factors that largely influence the decision making process in large management companies. For this reason, telecommunication companies are doing a big effort investing in new technologies and projects aimed at finding efficient management solutions. One of the challenging issues for network and system management operators is that of dealing with the huge amount of alerts generated by the managed systems and networks. In order to discover anomalous behaviors and speed up fault localization processes, alert correlation is one of the most popular resources. Although many different alert correlation techniques have been investigated, it is still an active research field. In this paper, a survey of the state of the art in alert correlation techniques is presented. Unlike other authors, we consider that the correlation process is a common problem for different fields in the industry. Thus, we focus on showing the broad influence of this problem. Additionally, we suggest an alert correlation architecture capable of modeling current and prospective proposals. Finally, we also review some of the most important commercial products currently available.


Computer Networks | 2007

Evaluation of a low-rate DoS attack against iterative servers

Gabriel Maciá-Fernández; Jesús E. Díaz-Verdejo; Pedro García-Teodoro

This paper presents a low-rate DoS attack that could be launched against iterative servers. Such an attack takes advantage of the vulnerability consisting in the possibility of forecasting the instant at which an iterative server will generate a response to a client request. This knowledge could allow a potential intruder to overflow application buffers with relatively low-rate traffic to the server, thus avoiding the usual DoS IDS detection techniques. Besides the fundamentals of the attack, the authors also introduce a mathematical model for evaluating the efficiency of this kind of attack. The evaluation is contrasted with both simulated and real implementations. Some variants of the attack are also studied. The overall results derived from this work show how the proposed low-rate DoS attack could cause an important negative impact on the performance of iterative servers.


Computer Networks | 2010

Defense techniques for low-rate DoS attacks against application servers

Gabriel Maciá-Fernández; Rafael A. Rodríguez-Gómez; Jesús E. Díaz-Verdejo

Low-rate denial of service (DoS) attacks have recently emerged as new strategies for denying networking services. Such attacks are capable of discovering vulnerabilities in protocols or applications behavior to carry out a DoS with low-rate traffic. In this paper, we focus on a specific attack: the low-rate DoS attack against application servers, and address the task of finding an effective defense against this attack. Different approaches are explored and four alternatives to defeat these attacks are suggested. The techniques proposed are based on modifying the way in which an application server accepts incoming requests. They focus on protective measures aimed at (i) preventing an attacker from capturing all the positions in the incoming queues of applications, and (ii) randomizing the server operation to eliminate possible vulnerabilities due to predictable behaviors. We extensively describe the suggested techniques, discussing the benefits and drawbacks for each under two criteria: the attack efficiency reduction obtained, and the impact on the normal operation of the server. We evaluate the proposed solutions in a both a simulated and a real environment, and provide guidelines for their implementation in a production system.


Computers & Security | 2008

Evaluation of a low-rate DoS attack against application servers

Gabriel Maciá-Fernández; Jesús E. Díaz-Verdejo; Pedro García-Teodoro

In the network security field there is a need to identify new movements and trends that attackers might adopt, in order to anticipate their attempts with defense and mitigation techniques. The present study explores new approaches that attackers could use in order to make denial of service attacks against application servers. We show that it is possible to launch such attacks by using low-rate traffic directed against servers, and apply the proposed techniques to defeat a persistent HTTP server. The low-rate feature is highly beneficial to the attacker for two main reasons: firstly, because the resources needed to carry out the attack are considerably reduced, easing its execution. Secondly, the attack is more easily hidden to security mechanisms that rely on the detection of high-rate traffic. In this paper, a mechanism that allows the attacker to control the attack load in order to bypass an IDS is contributed. We present the fundamentals of the attack, describing its strategy and design issues. The performance is also evaluated in both simulated and real environments. Finally, a study of possible improvement techniques to be used by the attackers is contributed.


critical information infrastructures security | 2007

LoRDAS: a low-rate dos attack against application servers

Gabriel Maciá-Fernández; Jesús E. Díaz-Verdejo; Pedro García-Teodoro; Francisco de Toro-Negro

In a communication network, there always exist some specific servers that should be considered a critical infrastructure to be protected, specially due to the nature of the services that they provide. In this paper, a low-rate denial of service attack against application servers is presented. The attack gets advantage of known timing mechanisms in the server behaviour to wisely strike ON/OFF attack waveforms that cause denial of service, while the traffic rate sent to the server is controlled, thus allowing to bypass defense mechanisms that rely on the detection of high rate traffics. First, we determine the conditions that a server should present to be considered a potential victim of this attack. As an example, the persistent HTTP server case is presented, being the procedure for striking the attack against it described. Moreover, the efficiency achieved by the attack is evaluated in both simulated and real environments, and its behaviour studied according to the variations on the configuration parameters. The aim of this work is to denounce the feasibility of such attacks in order to motivate the development of defense mechanisms.


next generation internet | 2010

Efficient multimedia transmission in wireless sensor networks

J. F. Mingorance-Puga; Gabriel Maciá-Fernández; António Grilo; Nestor Michael C. Tiglao

Real-time multimedia data such as video are usually loss-tolerant but require timely delivery in order to be useful to the application. Loss recovery through the retransmission of lost data may introduce unacceptable delays, which is the reason why these data types are usually delivered with no transport layer reliability, using erasure coding and similar techniques to maximize data recovery at the receiver. However, in Wireless Multimedia Sensor Networks (WMSNs), these mechanisms are not enough to provide an acceptable image quality and, thus, reliable transport protocols adapted to these requirements are needed. This paper presents some mechanisms to improve multimedia transmissions in WMSNs when reliable transport layer protocols are used. They consist of assigning a budget of time for the sending of certain amount of information and estimating if the channel conditions allow to complete the transmission or not. If it is not likely to complete it, then the transmission is stopped, thus saving important energy resources in the sensors. We evaluate this approach by modifying the behavior of a previously proposed reliable transport protocol (DTSN). Our proposal, M-DTSN, improves DTSN flexibility by managing the trade-off between media quality and timely delivery for real-time multimedia data with some degree of loss-tolerance. The simulation results demonstrate that the advantages of M-DTSN for the transmission of multimedia data are quite significant when compared with the original DTSN protocol.


international conference on computer communications | 2014

Tackling the Big Data 4 vs for anomaly detection

José Camacho; Gabriel Maciá-Fernández; Jesús E. Díaz-Verdejo; Pedro García-Teodoro

In this paper, a framework for anomaly detection and forensics in Big Data is introduced. The framework tackles the Big Data 4 Vs: Variety, Veracity, Volume and Velocity. The varied nature of the data sources is treated by transforming the typically unstructured data into a highly dimensional and structured data set. To overcome both the uncertainty (low veracity) and high dimension introduced, a latent variable method, in particular Principal Component Analysis (PCA), is applied. PCA is well known to present outstanding capabilities to extract information from highly dimensional data sets. However, PCA is limited to low size, thought highly multivariate, data sets. To handle this limitation, a kernel computation of PCA is employed. This avoids computational problems due to the size (number of observations) in the data sets and allows parallelism. Also, hierarchical models are proposed if dimensionality is extreme. Finally, to handle high velocity in analyzing time series data flows, the Exponentially Weighted Moving Average (EWMA) approach is employed. All these steps are discussed in the paper, and the VAST 2012 mini challenge 2 is used for illustration.

Collaboration


Dive into the Gabriel Maciá-Fernández's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Yong Wang

University of Electronic Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge