Please use this identifier to cite or link to this item:
http://hdl.handle.net/2445/209364
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | López de Miguel, Manuel | - |
dc.contributor.advisor | Roca Cánovas, Raúl | - |
dc.contributor.author | Cirera Bosch, Arnau | - |
dc.date.accessioned | 2024-04-03T09:45:15Z | - |
dc.date.available | 2024-04-03T09:45:15Z | - |
dc.date.issued | 2024-01-17 | - |
dc.identifier.uri | http://hdl.handle.net/2445/209364 | - |
dc.description | Treballs Finals de Grau d'Enginyeria Informàtica, Facultat de Matemàtiques, Universitat de Barcelona, Any: 2024, Director: Manuel López de Miguel i Raúl Roca Cánovas | ca |
dc.description.abstract | [en] An IT infrastructure exposed to the Internet needs to protect itself against potential cyberattacks that could stop the service it provides or compromise the integrity of the data it contains. To have control over the cybersecurity of an infrastructure, organizations monitor their systems with threat detection solutions in order to be able to manage incidents that occur. This project aims to develop a unified and self-scalable cyber threat detection solution that allows monitoring of an IT network in a simple and visual way for the user. This involves, on the one hand, monitoring various aspects, such as application logs and network devices, network traffic, alerts from intrusion detection systems, file modification and events from end devices (servers and personal computers). This information will then be centralized and filtered with a cyber threat detection system based on detection rules, which will generate alerts that will be displayed on a set of control panels to be able to manage incidents that may occur in the infrastructure. The system will be deployed using Kubernetes, an open source platform for automating the deployment, scaling and management of containerized applications. This makes it possible to deploy different solutions in containers in an automatic and scalable way to a cloud infrastructure, thus facilitating the creation of solutions based on microservices that need a reliable and scalable system effectively. The core of threat detection will be provided by Wazuh solution, a free and open source security platform that unifies XDR (Extended Detection and Response) and SIEM (Security Information and Event Management) capabilities. It contains different modules that bring different functionalities to the system such as rule-based threat detection, log centralization, text analysis and search, active and remote response to security incidents, software vulnerability analysis and compliance control regulatory (such as PCI DSS, GDPR and CIS, among others). | ca |
dc.format.extent | 56 p. | - |
dc.format.mimetype | application/pdf | - |
dc.language.iso | cat | ca |
dc.rights | memòria: cc-nc-nd (c) Arnau Cirera Bosch, 2024 | - |
dc.rights | codi: GPL (c) Arnau Cirera Bosch, 2024 | - |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/es/ | - |
dc.rights.uri | http://www.gnu.org/licenses/gpl-3.0.ca.html | * |
dc.source | Treballs Finals de Grau (TFG) - Enginyeria Informàtica | - |
dc.subject.classification | Seguretat informàtica | ca |
dc.subject.classification | Seguretat de les xarxes d'ordinadors | ca |
dc.subject.classification | Desenvolupament de programari d'aplicació | ca |
dc.subject.classification | Programari | ca |
dc.subject.classification | Treballs de fi de grau | ca |
dc.subject.other | Computer security | en |
dc.subject.other | Computer network security | en |
dc.subject.other | Development of application software | en |
dc.subject.other | Computer software | en |
dc.subject.other | Bachelor's theses | en |
dc.title | Sistema de detecció d'amenaces cibernètiques | ca |
dc.type | info:eu-repo/semantics/bachelorThesis | ca |
dc.rights.accessRights | info:eu-repo/semantics/openAccess | ca |
Appears in Collections: | Programari - Treballs de l'alumnat Treballs Finals de Grau (TFG) - Enginyeria Informàtica |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
tfg_cirera_bsch_arnau.pdf | Memòria | 3.65 MB | Adobe PDF | View/Open |
codi.zip | Codi font | 1.5 MB | zip | View/Open |
This item is licensed under a Creative Commons License