María José Erquiaga

María José Erquiaga
National University of Cuyo | UNCUYO · Institute for Information and Comunication Technologies (ITIC)

About

14
Publications
7,627
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
19
Citations
Introduction
María José Erquiaga currently works at the Institute for Information and Comunication Technologies (ITIC), National University of Cuyo. María does research in Computer Security and Reliability and Computer Communications (Networks). Their current project is 'Stratosphere Project'.

Publications

Publications (14)
Preprint
Full-text available
Many activities related to cybercrime operations do not require much secrecy, such as developing websites or translating texts. This research provides indications that many users of a popular public internet marketing forum have connections to cybercrime. It does so by investigating the involvement in cybercrime of a population of users interested...
Preprint
Full-text available
This report presents the current state of security in IPv6 for IoT devices. In this research conducted from May 2020 to July 2020, we explored the global growth of IPv6 and compared it with the real growth of IPv6 in a medium size network. If IPv6 is already being used, are attackers already attacking using this protocol? To answer this question we...
Conference Paper
Full-text available
El crecimiento vertiginoso de nuevas tecnologías, trae aparejado el crecimiento de aplicaciones maliciosas. Estas aplicaciones hacen uso de los recursos de los dispositivos infectados para realizar actividades ilícitas, enviar mails de forma masiva (spam) o minar para obtener criptomonedas. Para minar, se re-quiere grandes capacidades de cómputo La...
Chapter
Full-text available
During the last couple of years there has been an important surge on the use of HTTPs by malware. The reason for this increase is not completely understood yet, but it is hypothesized that it was forced by organizations only allowing web traffic to the Internet. Using HTTPs makes malware behavior similar to normal connections. Therefore, there has...
Article
Full-text available
During the last couple of years there has been an important surge on the use of HTTPs by malware. The reason for this increase is not completely understood yet, but it is hypothesized that it was forced by organizations only allowing web traffic to the Internet. Using HTTPs makes malware behavior similar to normal connections. Therefore, there has...
Poster
Full-text available
During the last couple of years there has been an important surge on the use of HTTPs by malware. The reason for this increase is not completely understood yet, but it is hypothesized that it was forced by organizations only allowing web traffic to the Internet. Using HTTPs makes malware behavior similar to normal connections. Therefore, there has...
Conference Paper
Full-text available
Some botnets use special algorithms to generate the domain names they need to connect to their command and control servers. They are refereed as Domain Generation Algorithms. Domain Generation Algorithms generate domain names and tries to resolve their IP addresses. If the domain has an IP address, it is used to connect to that command and control...
Conference Paper
Full-text available
The fast evolution of Botnet malware made it extremely difficult to detect. Despite it can be just considered as a tool, nowadays it has become one of the most dangerous threats for system administrators. Botnets are used as the starting point for different kind of attacks, such as SPAM, Denegation of Service, key logging and traffic sniffing, amon...
Article
Full-text available
Resumen. Este trabajo define al malware en general, y a las botnets en particular. Describiendo el ciclo de vida de las redes zombies, los BotnetMaster, que controlan estas redes, los mecanismos de propagación, y los mecanismos de control teniendo en cuenta las topologías de las botnets, este análisis es fundamental para la detección y mitigación d...

Projects

Project (1)
Project
The Stratophere Project creates a free-software, machine learning-based, behavioral Intrusion Prevention System https://stratosphereips.org