39 research outputs found

    Actividades prácticas para la asignatura de Seguridad de sistemas de información

    Get PDF
    La gran mayoría de los nuevos planes de estudios están incorporando nuevas asignaturas dedicadas a la Seguridad de Sistemas Informáticos. Un aspecto clave de estas asignaturas es el trabajo práctico y determinar qué actividades pueden ser las más idóneas para mostrar a los alumnos los diferentes aspectos de la Seguridad. En este artículo presentamos dos actividades prácticas que combinan los conceptos relativos a la autenticación basada en tarjetas inteligentes y el control de acceso en sistemas operativos Windows y Linux.Peer Reviewe

    A Systematic Literature Review of Digital Game-based Assessment Empirical Studies: Current Trends and Open Challenges

    Full text link
    Technology has become an essential part of our everyday life, and its use in educational environments keeps growing. In addition, games are one of the most popular activities across cultures and ages, and there is ample evidence that supports the benefits of using games for assessment. This field is commonly known as game-based assessment (GBA), which refers to the use of games to assess learners' competencies, skills, or knowledge. This paper analyzes the current status of the GBA field by performing the first systematic literature review on empirical GBA studies, based on 66 research papers that used digital GBAs to determine: (1) the context where the study has been applied, (2) the primary purpose, (3) the knowledge domain of the game used, (4) game/tool availability, (5) the size of the data sample, (6) the data science techniques and algorithms applied, (7) the targeted stakeholders of the study, and (8) what limitations and challenges are reported by authors. Based on the categories established and our analysis, the findings suggest that GBAs are mainly used in formal education and for assessment purposes, and most GBAs focus on assessing STEM content and cognitive skills. Furthermore, the current limitations indicate that future GBA research would benefit from the use of bigger data samples and more specialized algorithms. Based on our results, we discuss the status of the field with the current trends and the open challenges (including replication and validation problems) providing recommendations for the future research agenda of the GBA field.Comment: 23 pages, 12 figures, 1 tabl

    Aprendizaje de tecnologías informáticas en titulaciones de Ciencias de la Comunicación mediante ABP

    Get PDF
    La inclusión de contenidos tecnológicos informáticos en titulaciones de posgrado en Ciencias de la Comunicación es un reto desde el punto de vista docente. En este sentido nos encontramos con alumnos que carecen de una base tecnológica suficiente que permita profundizar en detalles sobre el desarrollo o explotación de las nuevas tecnologías de la información y las comunicaciones, especialmente las relativas a las innovaciones tecnológicas en el entorno móvil. Partiendo de la dificultad que supone enfrentarse a este reto, el presente artículo presenta la experiencia docente con la asignatura Innovación Tecnológica en Contenidos Digitales del Máster Interuniversitario en Comunicación Móvil y Contenidos Digitales de la Facultad de Comunicación y Documentación de la Universidad de Murcia. En esta asignatura encontramos alumnos con distinta formación, como Publicidad, Comunicación Audivisual, Periodismo y Documentación. Hemos puesto en práctica, de forma exitosa, una experiencia docente de Aprendizaje Basado en Proyectos (ABP) y en este artículo incluimos detalles sobre la metodología, los recursos docentes y los resultados de aprendizaje obtenidos. Además mostramos un resumen de los proyectos desarrollados y la valoración de los alumnos, así como unas reflexiones acerca de la idoneidad de esta clase de enfoques docentes para estos marcos de aprendizaje de la informática.Teaching about information technologies (IT) for students of Communication Sciences is a challenging task. Those students do not usually have enough skills and knowledge about technological innovation in order to deal with some details about the development and deployment of information technologies, especially those related to the mobile ecosystem. Based on this fact, this paper presents the teaching experience in the subject Technology Innovation in Digital Contents of the Master's Degree in Mobile Communication and Digital Contents of the Faculty of Communication Sciences at our university. It is a subject with students from different degrees, like Advertising, Audiovisual Communication, Journalism, and Documentation. As we will see, we have successfully implemented a teaching experience based on Project- Based Learning (PBL). We include details about the process, the teaching resources and the obtained results. Moreover, the paper includes a summary of the projects and the evaluation of the students, as well as a discussion about the suitability of this approach

    VAASI: Crafting valid and abnormal adversarial samples for anomaly detection systems in industrial scenarios

    Get PDF
    In the realm of industrial anomaly detection, machine and deep learning models face a critical vulnerability to adversarial attacks. In this context, existing attack methodologies primarily target continuous features, often in the context of images, making them unsuitable for the categorical or discrete features prevalent in industrial systems. To fortify the cybersecurity of industrial environments, this paper introduces a groundbreaking adversarial attack approach tailored to the unique demands of these settings. Our novel technique enables the creation of targeted adversarial samples that are valid within the framework of supervised cyberattack detection models in industrial scenarios, preserving the consistency of discrete values and correcting cases where an adversarial sample transitions into a normal one. Our approach leverages the SHAP interpretability method to identify the most salient features for each sample. Subsequently, the Projected Gradient Descent technique is employed to perturb continuous features, ensuring adversarial sample generation. To handle categorical features for a specific adversarial sample, our method scrutinizes the closest sample within the normal training dataset and replicates its categorical feature values. Additionally, Decision Trees trained within a Random Forest are utilized to ensure that the resulting adversarial samples maintain the essential abnormal behavior required for detection. The validation of our proposal was conducted using the WADI dataset obtained from a water distribution plant, providing a realistic industrial context. During validation, we assessed the mean error and the total number of adversarial samples generated by our approach, comparing it with the original Projected Gradient Descent method and the Carlini & Wagner attack across various parameter configurations. Remarkably, our proposal consistently achieved the best trade-off between mean error and the number of generated adversarial samples, showcasing its superiority in safeguarding industrial systems

    An interpretable semi‐supervised system for detecting cyberattacks using anomaly detection in industrial scenarios

    Get PDF
    When detecting cyberattacks in Industrial settings, it is not sufficient to determine whether the system is suffering a cyberattack. It is also fundamental to explain why the system is under a cyberattack and which are the assets affected. In this context, the Anomaly Detection based on Machine Learning (ML) and Deep Learning (DL) techniques showed great performance when detecting cyberattacks in industrial scenarios. However, two main limitations hinder using them in a real environment. Firstly, most solutions are trained using a supervised approach, which is impractical in the real industrial world. Secondly, the use of black‐box ML and DL techniques makes it impossible to interpret the decision made by the model. This article proposes an interpretable and semi‐supervised system to detect cyberattacks in Industrial settings. Besides, our proposal was validated using data collected from the Tennessee Eastman Process. To the best of our knowledge, this system is the only one that offers interpretability together with a semi‐supervised approach in an industrial setting. Our system discriminates between causes and effects of anomalies and also achieved the best performance for 11 types of anomalies out of 20 with an overall recall of 0.9577, a precision of 0.9977, and a F1‐score of 0.9711

    A Methodology for Evaluating the Robustness of Anomaly Detectors to Adversarial Attacks in Industrial Scenarios

    Full text link
    Anomaly Detection systems based on Machine and Deep learning are the most promising solutions to detect cyberattacks in the industry. However, these techniques are vulnerable to adversarial attacks that downgrade prediction performance. Several techniques have been proposed to measure the robustness of Anomaly Detection in the literature. However, they do not consider that, although a small perturbation in an anomalous sample belonging to an attack, i.e., Denial of Service, could cause it to be misclassified as normal while retaining its ability to damage, an excessive perturbation might also transform it into a truly normal sample, with no real impact on the industrial system. This paper presents a methodology to calculate the robustness of Anomaly Detection models in industrial scenarios. The methodology comprises four steps and uses a set of additional models called support models to determine if an adversarial sample remains anomalous. We carried out the validation using the Tennessee Eastman process, a simulated testbed of a chemical process. In such a scenario, we applied the methodology to both a Long-Short Term Memory (LSTM) neural network and 1-dimensional Convolutional Neural Network (1D-CNN) focused on detecting anomalies produced by different cyberattacks. The experiments showed that 1D-CNN is significantly more robust than LSTM for our testbed. Specifically, a perturbation of 60% (empirical robustness of 0.6) of the original sample is needed to generate adversarial samples for LSTM, whereas in 1D-CNN the perturbation required increases up to 111% (empirical robustness of 1.11)

    Forced Solid-State Interactions for the Selective “Turn-On” Fluorescence Sensing of Aluminum Ions in Water Using a Sensory Polymer Substrate

    Get PDF
    Selective and sensitive solid sensory substrates for detecting Al(III) in pure water are reported. The material is a flexible polymer film that can be handled and exhibits gel behavior and membrane performance. The film features a chemically anchored salicylaldehyde benzoylhydrazone derivative as an aluminum ion fluorescence sensor. A novel procedure for measuring Al(III) at the ppb level using a single solution drop in 20 min was developed. In this procedure, a drop was allowed to enter the hydrophilic material for 15 min before a 5 min drying period. The process forced the Al(III) to interact with the sensory motifs within the membrane before measuring the fluorescence of the system. The limit of detection of Al(III) was 22 ppm. Furthermore, a water-soluble sensory polymer containing the same sensory motifs was developed with a limit of detection of Al(III) of 1.5 ppb, which was significantly lower than the Environmental Protection Agency recommendations for drinking water.Spanish Ministerio de Economía y Competitividad-Feder (MAT2011-22544) and by the Consejería de Educación - Junta de Castilla y León (BU232U13)
    corecore