dc.contributor | Astudillo Salinas, Darwin Fabian | |
dc.contributor | Tello Oquendo, Luis Patricio | |
dc.creator | Fernández Orellana, Erick Adrián | |
dc.creator | Quizhpe Quezada, Linder Flavio | |
dc.date.accessioned | 2023-08-03T17:48:43Z | |
dc.date.accessioned | 2023-08-10T13:48:10Z | |
dc.date.available | 2023-08-03T17:48:43Z | |
dc.date.available | 2023-08-10T13:48:10Z | |
dc.date.created | 2023-08-03T17:48:43Z | |
dc.date.issued | 2023-08-03 | |
dc.identifier | http://dspace.ucuenca.edu.ec/handle/123456789/42581 | |
dc.identifier.uri | https://repositorioslatinoamericanos.uchile.cl/handle/2250/8151677 | |
dc.description.abstract | With the constant evolution of telecommunications networks and the exponential increase in Internet traffic, it is necessary to prevent increasingly sophisticated cyberattacks. DGAs is a technique that allows for the automatic and covert generation of
malicious domains to control Bots and execute these attacks. It is proposed to implement two Botnets detection algorithms based on DGAs: MaldomDetector and masked
N-grams. These algorithms use supervised machine learning and rely on the extraction of lexical and statistical features from domain names. To carry out the detection
of mAGDs, the BNDF framework will be used as a base. However, as BNDF does not
provide real-time results, an early detection module was developed to optimize the framework’s operation based on the selected detection algorithms. Different test scenarios were designed in controlled environments and on a real network. In the controlled
scenarios, various evaluation metrics were used to determine the detection performance of the algorithms. In real network tests, DNS requests were analyzed alongside the
predictions made by the algorithms, with the aim of evaluating the accuracy of the
predictions. Finally, the computational resource usage required by each algorithm was
evaluated. Masked N-grams demonstrated excellent performance in terms of classification, achieving a value of 85.09 % in all metrics. MaldomDetector showed a better
processing time with 1.38 ms per domain, making it the best option for networks with
limited resources. | |
dc.language | spa | |
dc.publisher | Universidad de Cuenca | |
dc.relation | TE;506 | |
dc.rights | http://creativecommons.org/licenses/by-nc-nd/4.0/ | |
dc.rights | openAccess | |
dc.rights | Attribution-NonCommercial-NoDerivatives 4.0 Internacional | |
dc.subject | Algoritmos informáticos | |
dc.subject | Redes de comunicación | |
dc.subject | Programación | |
dc.subject | Educación superior | |
dc.title | Implementación y evaluación de algoritmos de detección de botnets basados en técnicas DGA en la red de comunicación de un Instituto de Educación Superior (IES). | |
dc.type | bachelorThesis | |