About
14
Publications
7,627
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
19
Citations
Introduction
María José Erquiaga currently works at the Institute for Information and Comunication Technologies (ITIC), National University of Cuyo. María does research in Computer Security and Reliability and Computer Communications (Networks). Their current project is 'Stratosphere Project'.
Publications
Publications (14)
Many activities related to cybercrime operations do not require much secrecy, such as developing websites or translating texts. This research provides indications that many users of a popular public internet marketing forum have connections to cybercrime. It does so by investigating the involvement in cybercrime of a population of users interested...
This report presents the current state of security in IPv6 for IoT devices. In this research conducted from May 2020 to July 2020, we explored the global growth of IPv6 and compared it with the real growth of IPv6 in a medium size network. If IPv6 is already being used, are attackers already attacking using this protocol? To answer this question we...
El crecimiento vertiginoso de nuevas tecnologías, trae aparejado el crecimiento de aplicaciones maliciosas. Estas aplicaciones hacen uso de los recursos de los dispositivos infectados para realizar actividades ilícitas, enviar mails de forma masiva (spam) o minar para obtener criptomonedas. Para minar, se re-quiere grandes capacidades de cómputo La...
During the last couple of years there has been an important surge on the use of HTTPs by malware. The reason for this increase is not completely understood yet, but it is hypothesized that it was forced by organizations only allowing web traffic to the Internet. Using HTTPs makes malware behavior similar to normal connections. Therefore, there has...
During the last couple of years there has been an important surge on the use of HTTPs by malware. The reason for this increase is not completely understood yet, but it is hypothesized that it was forced by organizations only allowing web traffic to the Internet. Using HTTPs makes malware behavior similar to normal connections. Therefore, there has...
During the last couple of years there has been an important surge on the use of HTTPs by malware. The reason for this increase is not completely understood yet, but it is hypothesized that it was forced by organizations only allowing web traffic to the Internet. Using HTTPs makes malware behavior similar to normal connections. Therefore, there has...
Some botnets use special algorithms to generate the domain names they need to connect to their command
and control servers. They are refereed as Domain Generation Algorithms. Domain Generation Algorithms generate domain names and tries to resolve their IP addresses. If the domain has an IP address, it is used to connect to that command and control...
The fast evolution of Botnet malware made it extremely difficult to detect. Despite it can be just considered as a tool, nowadays it has become one of the most dangerous threats for system administrators. Botnets are used as the starting point for different kind of attacks, such as SPAM, Denegation of Service, key logging and traffic sniffing, amon...
Resumen. Este trabajo define al malware en general, y a las botnets en particular. Describiendo el ciclo de vida de las redes zombies, los BotnetMaster, que controlan estas redes, los mecanismos de propagación, y los mecanismos de control teniendo en cuenta las topologías de las botnets, este análisis es fundamental para la detección y mitigación d...
Projects
Project (1)
The Stratophere Project creates a free-software, machine learning-based, behavioral Intrusion Prevention System
https://stratosphereips.org