<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1684-1859</journal-id>
<journal-title><![CDATA[Revista Cubana de Informática Médica]]></journal-title>
<abbrev-journal-title><![CDATA[RCIM]]></abbrev-journal-title>
<issn>1684-1859</issn>
<publisher>
<publisher-name><![CDATA[Universidad de Ciencias Médicas de La Habana]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1684-18592021000200013</article-id>
<title-group>
<article-title xml:lang="es"><![CDATA[Sistemas para la detección de intrusiones en redes de datos de instituciones de salud]]></article-title>
<article-title xml:lang="en"><![CDATA[Intrusion-Detection Systems for Healthcare Institutions&#8217; Data Networks]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Perdigón Llanes]]></surname>
<given-names><![CDATA[Rudibel]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Orellana García]]></surname>
<given-names><![CDATA[Arturo]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Empresa Comercializadora &#8220;Frutas Selectas&#8221;  ]]></institution>
<addr-line><![CDATA[ Pinar del Río]]></addr-line>
<country>Cuba</country>
</aff>
<aff id="Af2">
<institution><![CDATA[,Universidad de las Ciencias Informáticas Centro de Informática Médica ]]></institution>
<addr-line><![CDATA[ La Habana]]></addr-line>
<country>Cuba</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>12</month>
<year>2021</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>12</month>
<year>2021</year>
</pub-date>
<volume>13</volume>
<numero>2</numero>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://scielo.sld.cu/scielo.php?script=sci_arttext&amp;pid=S1684-18592021000200013&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://scielo.sld.cu/scielo.php?script=sci_abstract&amp;pid=S1684-18592021000200013&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://scielo.sld.cu/scielo.php?script=sci_pdf&amp;pid=S1684-18592021000200013&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="es"><p><![CDATA[RESUMEN El empleo de las tecnologías digitales en instituciones médicas permite mejorar la calidad en la prestación de servicios de salud. Sin embargo, su utilización incrementa las vulnerabilidades y los riesgos de seguridad en estas organizaciones. En la actualidad los sistemas digitales en el sector de la salud representan un objetivo atractivo para los ciberdelicuentes porque constituyen fuentes de información valiosa deficientemente protegida. El estudio de la literatura permitió identificar una carencia de investigaciones orientadas a elevar la seguridad en redes de datos de instituciones de salud. La presente investigación tiene como objetivo realizar una revisión bibliográfica sobre los principales Sistemas de Detección de Intrusiones de código abierto existentes en la actualidad para contribuir a fortalecer la seguridad en las redes de datos de estas organizaciones. Se identificó la superioridad de Snort y Suricata como herramientas de código abierto para la detección de intrusiones en redes de datos.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[ABSTRACT The use of digital technologies in medical institutions allows to improve the quality of health services. However, its use increases the vulnerabilities and security risks of these organizations. Currently, digital systems in the health sector represent an attractive target for cyber-criminals because they constitute poorly protected sources of valuable information. The study of the literature made it possible to identify a lack of research aimed at increasing security in health institutions data networks. The objective of this research is to carry out a literature review on the main open source Intrusion Detection Systems currently existing to strengthen security in the data networks of these organizations. The superiority of Snort and Suricata as open source tools for intrusion detection in data networks was identified.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[IDS]]></kwd>
<kwd lng="es"><![CDATA[seguridad computacional]]></kwd>
<kwd lng="es"><![CDATA[sistemas de computación]]></kwd>
<kwd lng="es"><![CDATA[redes de comunicación de computadores]]></kwd>
<kwd lng="en"><![CDATA[IDS]]></kwd>
<kwd lng="en"><![CDATA[computer security]]></kwd>
<kwd lng="en"><![CDATA[computer systems]]></kwd>
<kwd lng="en"><![CDATA[computer communication networks]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<label>1</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ioana]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[Dumitrache]]></surname>
<given-names><![CDATA[I]]></given-names>
</name>
</person-group>
<source><![CDATA[Cyber Security in Healthcare Networks. 6th IEEE International Conference on E-Health and Bioengineering - EHB 2017]]></source>
<year>2017</year>
<page-range>414-7</page-range><publisher-loc><![CDATA[Sinaia, Romania ]]></publisher-loc>
<publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B2">
<label>2</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rodríguez]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Vidal]]></surname>
<given-names><![CDATA[MJ]]></given-names>
</name>
<name>
<surname><![CDATA[Cuellar]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Martínez]]></surname>
<given-names><![CDATA[BD]]></given-names>
</name>
<name>
<surname><![CDATA[Cabrera]]></surname>
<given-names><![CDATA[YM]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Desarrollo de la informatización en Hospitales]]></article-title>
<source><![CDATA[INFODIR]]></source>
<year>2015</year>
<volume>21</volume>
<page-range>3-15</page-range></nlm-citation>
</ref>
<ref id="B3">
<label>3</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Coventry]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
<name>
<surname><![CDATA[Branley]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cybersecurity in healthcare: A narrative review of trends, threats and ways forward]]></article-title>
<source><![CDATA[Maturitas]]></source>
<year>2018</year>
<volume>113</volume>
<page-range>48-52</page-range></nlm-citation>
</ref>
<ref id="B4">
<label>4</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[García]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
<name>
<surname><![CDATA[Vidal]]></surname>
<given-names><![CDATA[MJ]]></given-names>
</name>
</person-group>
<source><![CDATA[La informática y la seguridad. Un tema de importancia para el directivo]]></source>
<year>2016</year>
<volume>22</volume>
<page-range>47-58</page-range><publisher-name><![CDATA[INFODIR]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B5">
<label>5</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jalali]]></surname>
<given-names><![CDATA[MS]]></given-names>
</name>
<name>
<surname><![CDATA[Kaiser]]></surname>
<given-names><![CDATA[JP]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cybersecurity in Hospitals: A Systematic, Organizational Perspective]]></article-title>
<source><![CDATA[Journal of Medical Internet Research]]></source>
<year>2018</year>
<volume>20</volume>
<numero>5</numero>
<issue>5</issue>
</nlm-citation>
</ref>
<ref id="B6">
<label>6</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ahmed]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Barkat]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[False Data Injection Attacks in Healthcare]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Boo]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Stirling]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Chi]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Ong]]></surname>
<given-names><![CDATA[KL.]]></given-names>
</name>
<name>
<surname><![CDATA[Williams]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
</person-group>
<collab>Data Mining</collab>
<source><![CDATA[Communications in Computer and Information Science]]></source>
<year>2018</year>
<volume>845</volume>
<page-range>192-202</page-range><publisher-loc><![CDATA[Singapore ]]></publisher-loc>
<publisher-name><![CDATA[AusDM 2017]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B7">
<label>7</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Abraham]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
<name>
<surname><![CDATA[Chatterjee]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[Sims]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Muddling through cybersecurity: Insights from the U.S. healthcare industry]]></article-title>
<source><![CDATA[Business Horizons]]></source>
<year>2019</year>
<volume>62</volume>
<page-range>539-48</page-range></nlm-citation>
</ref>
<ref id="B8">
<label>8</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Barad]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Linking Cyber Security Improvement Actions in Healthcare Systems to Their Strategic Improvement Needs]]></article-title>
<source><![CDATA[Procedia Manufacturing]]></source>
<year>2019</year>
<volume>39</volume>
<page-range>279-86</page-range></nlm-citation>
</ref>
<ref id="B9">
<label>9</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bhuyan]]></surname>
<given-names><![CDATA[SS]]></given-names>
</name>
<name>
<surname><![CDATA[Kabir]]></surname>
<given-names><![CDATA[U]]></given-names>
</name>
<name>
<surname><![CDATA[Escareno]]></surname>
<given-names><![CDATA[JM]]></given-names>
</name>
<name>
<surname><![CDATA[Ector]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
<name>
<surname><![CDATA[Palakodeti]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Wyant]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Transforming Healthcare Cybersecurity from Reactive to Proactive: Current Status and Future Recommendations]]></article-title>
<source><![CDATA[Journal of Medical Systems]]></source>
<year>2020</year>
<volume>44</volume>
<numero>98</numero>
<issue>98</issue>
<page-range>1-9</page-range></nlm-citation>
</ref>
<ref id="B10">
<label>10</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sánchez-Henarejos]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Fernández-Alemán]]></surname>
<given-names><![CDATA[J. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Toval]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Hernández-Hernández]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[Sánchez-García]]></surname>
<given-names><![CDATA[AB]]></given-names>
</name>
<name>
<surname><![CDATA[Carrillo de Gea]]></surname>
<given-names><![CDATA[J.M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Guía de buenas prácticas de seguridad informática en el tratamiento de datos de salud para el personal sanitario en atención primaria]]></article-title>
<source><![CDATA[Atención Primaria]]></source>
<year>2014</year>
<volume>46</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>214-22</page-range></nlm-citation>
</ref>
<ref id="B11">
<label>11</label><nlm-citation citation-type="">
<collab>World Economic Forum</collab>
<source><![CDATA[The Global Risks Report 2020]]></source>
<year>2020</year>
<edition>15th</edition>
</nlm-citation>
</ref>
<ref id="B12">
<label>12</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sethuraman]]></surname>
<given-names><![CDATA[SC]]></given-names>
</name>
<name>
<surname><![CDATA[Vijayakumar]]></surname>
<given-names><![CDATA[V]]></given-names>
</name>
<name>
<surname><![CDATA[Walczak]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyber Attacks on Healthcare Devices Using Unmanned Aerial Vehicles]]></article-title>
<source><![CDATA[Journal of Medical Systems]]></source>
<year>2020</year>
<volume>44</volume>
<numero>29</numero>
<issue>29</issue>
<page-range>1-10</page-range></nlm-citation>
</ref>
<ref id="B13">
<label>13</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jalali]]></surname>
<given-names><![CDATA[MS]]></given-names>
</name>
<name>
<surname><![CDATA[Razak]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Gordon]]></surname>
<given-names><![CDATA[W]]></given-names>
</name>
<name>
<surname><![CDATA[Perakslis]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
<name>
<surname><![CDATA[Madnick]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Health Care and Cybersecurity: Bibliometric Analysis of the Literature]]></article-title>
<source><![CDATA[Journal of Medical Internet Research]]></source>
<year>2019</year>
<volume>21</volume>
<numero>2</numero>
<issue>2</issue>
</nlm-citation>
</ref>
<ref id="B14">
<label>14</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Guerrero]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<source><![CDATA[Diseño e implementación de un sistema de monitoreo a la red de datos de entidad prestadora del servicio de salud]]></source>
<year>2020</year>
<page-range>100</page-range><publisher-loc><![CDATA[Colombia ]]></publisher-loc>
<publisher-name><![CDATA[Universidad Nacional Abierta y a Distancia]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B15">
<label>15</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mahamat]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Flauzac]]></surname>
<given-names><![CDATA[O]]></given-names>
</name>
<name>
<surname><![CDATA[Nolot]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
<name>
<surname><![CDATA[Rabat]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
<name>
<surname><![CDATA[Gonzalez]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Secure Exchanges Activity in Function of Event Detection with the SDN]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Mendy]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Ouya]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Dioum]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[Thiaré]]></surname>
<given-names><![CDATA[O]]></given-names>
</name>
</person-group>
<source><![CDATA[e-Infrastructure and e-Services for Developing Countries. AFRICOMM 2018, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering]]></source>
<year>2019</year>
<page-range>315-24</page-range><publisher-loc><![CDATA[Senegal ]]></publisher-loc>
<publisher-name><![CDATA[Dakar]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B16">
<label>16</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Socarrás]]></surname>
<given-names><![CDATA[HE]]></given-names>
</name>
<name>
<surname><![CDATA[Santana]]></surname>
<given-names><![CDATA[I]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Ciberseguridad del Sistema de Control Industrial de la Planta Cloro-Sosa ELQUIM]]></article-title>
<source><![CDATA[Revista lbérica de Sistemas y Tecnologías de Información]]></source>
<year>2019</year>
<volume>32</volume>
<page-range>83-96</page-range></nlm-citation>
</ref>
<ref id="B17">
<label>17</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Maniriho]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
<name>
<surname><![CDATA[Jovial]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
<name>
<surname><![CDATA[Niyigaba]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
<name>
<surname><![CDATA[Bizimana]]></surname>
<given-names><![CDATA[Z]]></given-names>
</name>
<name>
<surname><![CDATA[Ahmad]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Detecting Intrusions in Computer Network Traffic with Machine Learning Approaches]]></article-title>
<source><![CDATA[International Journal of Intelligent Engineering and Systems]]></source>
<year>2020</year>
<volume>13</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>433-45</page-range></nlm-citation>
</ref>
<ref id="B18">
<label>18</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Aludhilu]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
<name>
<surname><![CDATA[Rodríguez-Puente]]></surname>
<given-names><![CDATA[RA]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Systematic Literature Review on Intrusion Detection Approaches]]></article-title>
<source><![CDATA[Revista Cubana de Ciencias Informáticas]]></source>
<year>2020</year>
<volume>14</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>58-78</page-range></nlm-citation>
</ref>
<ref id="B19">
<label>19</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Castellanos]]></surname>
<given-names><![CDATA[O]]></given-names>
</name>
<name>
<surname><![CDATA[García]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Análisis y caracterización de conjuntos de datos para detección de intrusiones]]></article-title>
<source><![CDATA[Serie Científica de la Universidad de las Ciencias Informáticas]]></source>
<year>2020</year>
<volume>13</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>39-52</page-range></nlm-citation>
</ref>
<ref id="B20">
<label>20</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[X]]></given-names>
</name>
<name>
<surname><![CDATA[Kordas]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Hu]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
<name>
<surname><![CDATA[Gaedke]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Smith]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Administrative Evaluation of Intrusion Detection System]]></article-title>
<source><![CDATA[2nd Annual Conference on Research in Information Technology]]></source>
<year>2013</year>
<page-range>47-52</page-range><publisher-loc><![CDATA[Florida, USA ]]></publisher-loc>
<publisher-name><![CDATA[Association for Computing Machinery]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B21">
<label>21</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Murphy]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
</person-group>
<source><![CDATA[Comparing the performance of intrusion detection systems: snort and suricata]]></source>
<year>2019</year>
<publisher-loc><![CDATA[EEUU ]]></publisher-loc>
<publisher-name><![CDATA[Colorado Technical University]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B22">
<label>22</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Perdigón]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Ramírez]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Plataformas de software libre para la virtualización de servidores en pequeñas y medianas empresas cubanas]]></article-title>
<source><![CDATA[Revista Cubana de Ciencias Informáticas]]></source>
<year>2020</year>
<volume>14</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>40-57</page-range></nlm-citation>
</ref>
<ref id="B23">
<label>23</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Perdigón]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Pérez]]></surname>
<given-names><![CDATA[MT]]></given-names>
</name>
</person-group>
<source><![CDATA[Análisis holístico del impacto social de los negocios electrónicos en América Latina, de 2014 a 2019]]></source>
<year>2020</year>
<volume>10</volume>
<numero>18</numero>
<issue>18</issue>
<publisher-loc><![CDATA[Paakat ]]></publisher-loc>
<publisher-name><![CDATA[Revista de Tecnología y Sociedad]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B24">
<label>24</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Macia-Fernández]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
<name>
<surname><![CDATA[Camacho]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Magan-Carrión]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Fuentes-García]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[García-Teodoro]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[UGR&#8217;16: Un nuevo conjunto de datos para la evaluación de IDS de red]]></article-title>
<source><![CDATA[XIII Jornadas de Ingeniería Telemática]]></source>
<year>2017</year>
<page-range>71-8</page-range><publisher-loc><![CDATA[Valencia, España ]]></publisher-loc>
<publisher-name><![CDATA[Editorial Universidad Politécnica de Valencia]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B25">
<label>25</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Arteaga]]></surname>
<given-names><![CDATA[JE]]></given-names>
</name>
</person-group>
<source><![CDATA[Evaluación de las funcionalidades de los sistemas de detección de intrusos basados en la red de plataformas Open Source utilizando la técnica de detección de anomalías]]></source>
<year>2018</year>
<page-range>162</page-range><publisher-loc><![CDATA[Ecuador ]]></publisher-loc>
<publisher-name><![CDATA[Escuela Superior Politécnica de Chimborazo]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B26">
<label>26</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kumar]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[Singh]]></surname>
<given-names><![CDATA[RA]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Comprehensive Review on Intrusion Detection System and Techniques]]></article-title>
<source><![CDATA[International Conference on Contemporary Technological Solutions towards fulfilment of Social Needs]]></source>
<year>2018</year>
<page-range>133-7</page-range><publisher-loc><![CDATA[India ]]></publisher-loc>
<publisher-name><![CDATA[SHODH SANGAM]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B27">
<label>27</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Divekar]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Parekh]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Savla]]></surname>
<given-names><![CDATA[V]]></given-names>
</name>
<name>
<surname><![CDATA[Mishra]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Shirole]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Benchmarking datasets for Anomaly-based Network Intrusion Detection: KDD CUP 99 alternatives]]></article-title>
<source><![CDATA[3rd International Conference on Computing, Communication and Security (ICCCS)]]></source>
<year>2018</year>
<page-range>1-8</page-range><publisher-loc><![CDATA[Kathmandu, Nepal ]]></publisher-loc>
<publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B28">
<label>28</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ashok]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[Manikrao]]></surname>
<given-names><![CDATA[V]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Comparative Study and Analysis of Network Intrusion Detection Tools]]></article-title>
<source><![CDATA[International Conference on Applied and Theoretical Computing and Communication Technology]]></source>
<year>2015</year>
<page-range>312-5</page-range><publisher-loc><![CDATA[Davangere, India ]]></publisher-loc>
<publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B29">
<label>29</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ocampo CA]]></surname>
<given-names><![CDATA[Castro YV]]></given-names>
</name>
<name>
<surname><![CDATA[Solarte Martínez]]></surname>
<given-names><![CDATA[GR.]]></given-names>
</name>
</person-group>
<source><![CDATA[Sistema de detección de intrusos en redes corporativas]]></source>
<year>2017</year>
<volume>22</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>60-8</page-range><publisher-name><![CDATA[Scientia et Technica]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B30">
<label>30</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Park]]></surname>
<given-names><![CDATA[W]]></given-names>
</name>
<name>
<surname><![CDATA[Ahn]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Performance Comparison and Detection Analysis in Snort and Suricata Environment]]></article-title>
<source><![CDATA[Wireless Pers Commun]]></source>
<year>2017</year>
<volume>94</volume>
<page-range>241-52</page-range></nlm-citation>
</ref>
<ref id="B31">
<label>31</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Raza]]></surname>
<given-names><![CDATA[SA]]></given-names>
</name>
<name>
<surname><![CDATA[Issac]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Performance comparison of intrusion detection systems and application of machine learning to Snort system]]></article-title>
<source><![CDATA[Future Generation Computer Systems]]></source>
<year>2018</year>
<volume>80</volume>
<page-range>157-70</page-range></nlm-citation>
</ref>
<ref id="B32">
<label>32</label><nlm-citation citation-type="">
<collab>G2 Crowd.com</collab>
<source><![CDATA[Best Intrusion Detection and Prevention Systems (IDPS)]]></source>
<year>2020</year>
</nlm-citation>
</ref>
<ref id="B33">
<label>33</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Karim]]></surname>
<given-names><![CDATA[I]]></given-names>
</name>
<name>
<surname><![CDATA[Vien]]></surname>
<given-names><![CDATA[QT]]></given-names>
</name>
<name>
<surname><![CDATA[Anh Le]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
<name>
<surname><![CDATA[Mapp]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A Comparative Experimental Design and Performance Analysis of Snort-Based Intrusion Detection System in Practical Computer networks]]></article-title>
<source><![CDATA[Computers]]></source>
<year>2017</year>
<volume>6</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1-15</page-range></nlm-citation>
</ref>
<ref id="B34">
<label>34</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Uvidia]]></surname>
<given-names><![CDATA[LA]]></given-names>
</name>
</person-group>
<source><![CDATA[Evaluación de herramientas de generación de tráfico malicioso aplicadas a una red ip virtualizada]]></source>
<year>2017</year>
<page-range>40</page-range><publisher-loc><![CDATA[España ]]></publisher-loc>
<publisher-name><![CDATA[Universidad Politécnica de Valencia]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B35">
<label>35</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bouziani]]></surname>
<given-names><![CDATA[O]]></given-names>
</name>
<name>
<surname><![CDATA[Benaboud]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
<name>
<surname><![CDATA[Samir Chamkar]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Lazaar]]></surname>
<given-names><![CDATA[SA]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Comparative study of Open Source IDSs according to their Ability to Detect Attacks]]></article-title>
<source><![CDATA[2nd International Conference on Networking, Information Systems &amp; Security]]></source>
<year>2019</year>
<page-range>1-5</page-range><publisher-loc><![CDATA[Rabat, Marruecos ]]></publisher-loc>
<publisher-name><![CDATA[Association for Computing Machinery]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B36">
<label>36</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Alsakran]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
<name>
<surname><![CDATA[Bendiab]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
<name>
<surname><![CDATA[Shiaeles]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Kolokotronis]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[(2020) Intrusion Detection Systems for Smart Home IoT Devices: Experimental Comparison Study]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Thampi]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Martinez Perez]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Ko]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Rawat]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
</person-group>
<source><![CDATA[Security in Computing and Communications 2019]]></source>
<year>2020</year>
<page-range>1208</page-range><publisher-loc><![CDATA[Singapore ]]></publisher-loc>
<publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B37">
<label>37</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Caro]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<source><![CDATA[Despligue y explotación de herramientas Open Source para la monitorización y gestión de eventos en un entorno virtualizado]]></source>
<year>2020</year>
<page-range>382</page-range><publisher-loc><![CDATA[España ]]></publisher-loc>
<publisher-name><![CDATA[Universidad de Cádiz]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B38">
<label>38</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Farré]]></surname>
<given-names><![CDATA[X]]></given-names>
</name>
</person-group>
<source><![CDATA[Desplegar la herramienta "ZeekIDS" y su posterior explotación para el análisis de actividades sospechosas en la red]]></source>
<year>2019</year>
<page-range>124</page-range><publisher-loc><![CDATA[España ]]></publisher-loc>
<publisher-name><![CDATA[Universitat Oberta de Catalunya]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B39">
<label>39</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Alyousef]]></surname>
<given-names><![CDATA[MY]]></given-names>
</name>
<name>
<surname><![CDATA[Abdelmajeed]]></surname>
<given-names><![CDATA[NT]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Dynamically Detecting Security Threats and Updating a Signature Based Intrusion Detection System&#8217;s Database]]></article-title>
<source><![CDATA[Procedia Computer Science]]></source>
<year>2019</year>
<volume>159</volume>
<page-range>1507-16</page-range></nlm-citation>
</ref>
<ref id="B40">
<label>40</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hänninen]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<source><![CDATA[Open source intrusion detection systems evaluation for small and medium-sized enterprise environments]]></source>
<year>2019</year>
<page-range>77</page-range><publisher-loc><![CDATA[Finlandia ]]></publisher-loc>
<publisher-name><![CDATA[JAMK University of Applied Sciences]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B41">
<label>41</label><nlm-citation citation-type="">
<collab>Interpol.int</collab>
<source><![CDATA[Cybercriminals targeting critical healthcare institutions with ransomware]]></source>
<year>2020</year>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
