SciELO - Scientific Electronic Library Online

 
vol.15 número4  suppl.1Algoritmos de detección de anomalías con redes profundas. Revisión para detección de fraudes bancariosActividades de calidad para la eficiencia del desempeño desde etapas tempranas del software índice de autoresíndice de materiabúsqueda de artículos
Home Pagelista alfabética de revistas  

Servicios Personalizados

Articulo

Indicadores

  • No hay articulos citadosCitado por SciELO

Links relacionados

  • No hay articulos similaresSimilares en SciELO

Compartir


Revista Cubana de Ciencias Informáticas

versión On-line ISSN 2227-1899

Resumen

ECHEVERRIA CASTILLO, Yohandra; PENA CASANOVA, Mónica  y  LABORI DE LA NUEZ, Bárbara. Architecture for the detection of security policy violations. Rev cuba cienc informat [online]. 2021, vol.15, n.4, suppl.1, pp. 265-280.  Epub 01-Dic-2021. ISSN 2227-1899.

Logs are highly relevant in the management of computer security, because the information recorded in them contributes to auditing and forensic analysis activities, supporting internal investigations, establishing baselines and identifying operational trends and behavior problems of information systems. Among the logs associated with security are the logs generated by access to network services, specifically the internet through a proxy. The process of detecting security violations from the analysis of logs of users' Internet browsing requires variants that standardize the existing formats. Analysis and search strategies must be defined that allow the generation of alarms and reports in the event of the detection of any security violation to the policies established in the organization. This article presents an analysis of the different formats to define the structure of the Logs. An architecture is proposed for the detection of security violations from the analysis of Internet browsing Logs of users, as well as the necessary components as a result of the analysis developed. A common format is determined for the standardization of the structure of the logs, allowing a greater capacity for analysis. The tools necessary for the implementation of the proposed architecture are evaluated.

Palabras clave : log; users; violations; security; Internet.

        · resumen en Español     · texto en Español     · Español ( pdf )