2 research outputs found

    Desarrollo de un chatbot cognitivo capaz de dar respuesta a diferentes incidentes de ciberseguridad

    Get PDF
    This work aims to present the design and development of an artificial intelligence in the form of a chatbot that can provide support to a company's cybersecurity team and carry out threat management tasks. To achieve this objective, an exhaustive study of the different artificial intelligence tools that work with the interpretation of natural language was carried out, evaluating in detail each of the functionalities they offer. After a rigorous evaluation, a specific tool was selected and trained so that it could understand human language and perform cybersecurity tasks once it has understood what the user needs. In addition to performing threat management tasks, the chatbot also provides information on cybersecurity incident prevention and resolution, making it a valuable resource for non-technical users to resolve and prevent security incidents on their devices. The development of the chatbot was done in a test environment that simulated the possible environment of a company's cybersecurity teams. This made it possible to evaluate the performance of the chatbot and correct possible problems before taking it to production. In addition, how to bring the chatbot to production in commercial environments was studied, considering technical and implementation aspects. The results of the project are highly satisfactory, since the chatbot has been able to correctly interpret and perform the interactions that were proposed at the beginning of the project. In addition, the information provided by the chatbot on prevention and resolution of cybersecurity incidents has proven valuable for cybersecurity teams. In general, it can be concluded that the chatbot designed in this project has great potential to improve the cybersecurity of companies and provide support to cybersecurity teams

    Formal security policy implementations in network firewalls.

    Get PDF
    Network security should be based around security policies. From high-level natural language, non-technical, policies created by management, down to device and vendor specific policies, or configurations, written by network system administrators. There exists a multitude of research into policy-based network systems which has been undertaken. This paper provides an overview of the different type of policies relating to security in networks, and a taxonomy of the research into systems which have been proposed to support the network administrators in difficult tasks of creating, managing and deploying these policies
    corecore