CBL - Campus del Baix Llobregat

Projecte llegit

Títol: Anàlisi i detecció de vulnerabilitats mitjançant Machine Learning


Estudiants que han llegit aquest projecte:


Director/a: LEÓN ABARCA, OLGA

Departament: ENTEL

Títol: Anàlisi i detecció de vulnerabilitats mitjançant Machine Learning

Data inici oferta: 04-02-2021     Data finalització oferta: 04-10-2021



Estudis d'assignació del projecte:
    GR ENG TELEMÀTICA
Tipus: Individual
 
Lloc de realització: EETAC
 
Paraules clau:
Cybsersecurity, Machine Learning
 
Descripció del contingut i pla d'activitats:
 
Overview (resum en anglès):

According to Europol in its latest report of 2020 we are in a situation where cybercrime
is steadily evolving, the resilience and creativity of attackers is constantly increasing,
and they are often one step ahead of any organization trying to fight them.
The pandemic has made our lives virtual, and criminals have not hesitated to take
advantage of the situation. The attacks during this year have been extremely varied,
from DDoS to Ransomware for the distribution of pornography. In general, an attacker
has an opportunistic profile and this time they have taken advantage of two things; the
lack of skilled personnel to cover cybersecurity positions and how unprepared we were
for massive remote work.
The increase in cloud applications means that companies are constantly connected to
the Internet, and although according to the annual Accenture report, most
organizations better anticipate cyberattacks, a door has been opened to indirect
targets such as suppliers in the supply chain. These attacks can have an
unsustainable price for this type of companies. We must keep in mind that the
profitability of outsourcing is 55% so it is understandable that many companies hire
third parties to meet their needs of cost reduction. Not to mention the human and
economic effort that can involve doing various tasks internally. But it should be noted
that when a company goes to a third party to hire a service, this third party is probably
associated with a large company such as Microsoft or Google. These big players
however have the most CVE associated in 2020 and therefore we end up talking about
different ways to get to the same place, preventing small- and large-scale
vulnerabilities


© CBLTIC Campus del Baix Llobregat - UPC