Mikel Iturbe

Mikel Iturbe
Mondragon Unibertsitatea | Mu · Electronics and Computing

PhD

About

12
Publications
3,956
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
105
Citations
Introduction
I am Mikel Iturbe, Lecturer & Researcher at Mondragon University, located at the heart of the Basque Country. My research interests include Network Security, Data Science applications and Industrial Control Systems. I am part of the Data Analysis and Cybersecurity team. My main research line is related to anomaly detection and security monitoring of Industrial Control Systems by leveraging data-driven methods. I am also interested in the field of data science, machine learning and network security. I got my PhD concerning Industrial Network security at Mondragon University. I hold a MSc in ICT Security at at the Open University of Catalonia, the Autonomous University of Barcelona and the Rovira i Virgili University and I got my BSc in Computer Engineering at Mondragon University. Moreove

Publications

Publications (12)
Conference Paper
Full-text available
A common problem that arises when facing classification tasks is the class imbalance problem, which happens when one or more classes are heavily underrepresented compared to the rest, being usually those minority classes the ones of interest. A natural solution consists of correcting the imbalance by sampling methods, being Synthetic Minority Overs...
Article
Specifically tailored industrial control systems (ICSs) attacks are becoming increasingly sophisticated, accentuating the need of ICS cyber security. The nature of these systems makes traditional IT security measures not suitable, requiring expressly developed security countermeasures. Within the past decades, research has been focused in network-b...
Chapter
The security landscape in Industrial settings has completely changed in the last decades. From the initial primitive setups, industrial networks have evolved into massively interconnected environments, thus developing the Industrial Internet of Things (IIoT) paradigm. In IIoT, multiple, heterogeneous devices collaborate by collecting, sending and p...
Article
Full-text available
El presente trabajo, define una arquitectura interoperable y escalable que permitirá la servitización del sector de máquina herramienta. Las TICs y el concepto de Internet of Things posibilitan interconectar diferentes dispositivos y controladores ofreciendo servicios de valor añadido. Uno de los problemas a resolver es la interoperabilidad entre l...
Conference Paper
Full-text available
Recent incidents have shown that Industrial Control Systems (ICS) are becoming increasingly susceptible to sophisticated and targeted attacks initiated by adversaries with high motivation, domain knowledge, and resources. Although traditional security mechanisms can be implemented at the IT-infrastructure level of such cyber-physical systems, the c...
Chapter
In the same manner that Online Social Networks (OSN) usage increases, non-legitimate campaigns over these types of web services are growing. This is the reason why significant number of users are affected by social spam every day and therefore, their privacy is threatened. To deal with this issue in this study we focus on mood analysis, among all c...
Conference Paper
Full-text available
In the last years, cyber security of Industrial Control Systems (ICSs) has become an important issue due to the discovery of sophisticated malware that by attacking Critical Infrastructures, could cause catastrophic safety results. Researches have been developing countermeasures to enhance cyber security for pre-Internet era systems, which are extr...
Article
Full-text available
Industrial Networks (INs) are widespread environments where heterogeneous devices collaborate to control and monitor physical processes. Some of the controlled processes belong to Critical Infrastructures (CIs), and, as such, IN protection is an active research field. Among different types of security solutions, IN Anomaly Detection Systems (ADSs)...
Article
Full-text available
Process Control Systems (PCSs) are the operating core of Critical Infrastructures (CIs). As such, anomaly detection has been an active research field to ensure CI normal operation. Previous approaches have leveraged network level data for anomaly detection, or have disregarded the existence of process disturbances, thus opening the possibility of m...
Conference Paper
Full-text available
n this work a comparison of the SURF and MU-SURF feature descriptor vectors is made. First, the descriptors’ performance is evaluated using a standard data set of general transformed images. This evaluation consists in counting correspondences and correct matches between ten image pairs. Image pairs have different transformations (rotation, scale c...

Network

Cited By