scispace - formally typeset
P

Pedro García-Teodoro

Researcher at University of Granada

Publications -  80
Citations -  3283

Pedro García-Teodoro is an academic researcher from University of Granada. The author has contributed to research in topics: Intrusion detection system & Anomaly detection. The author has an hindex of 18, co-authored 77 publications receiving 2813 citations.

Papers
More filters
Book ChapterDOI

N3: A Geometrical Approach for Network Intrusion Detection at the Application Layer

TL;DR: This work proposes an algorithm that assigns an anomaly score to each service request on the basis of its similarity with a previously established model of normality, and demonstrates that this approach yields a very high detection rate with a low level of false alarms.
Proceedings Article

Pair-wise similarity criteria for flows identification in P2P/non-P2P traffic classification

TL;DR: This paper introduces a similarity-based method to pair flows up, which is aimed at reducing the cost of identifying P2P/non-P2P traffic flows and different similarity measures for flows pairing are proposed and analyzed.

Aplicación de técnicas de agrupamiento a la detección de intrusiones en red mediante N3

TL;DR: In el presente trabajo se desarrollan tecnicas de agrupamiento de vectores de caracteristicas for su aplicacion en un sistema de deteccion de intrusiones en red propuesto por los autores as mentioned in this paper.
Book ChapterDOI

A Security Response Approach Based on the Deployment of Mobile Agents

TL;DR: A response mechanism to improve the tolerance against security threats in MANET environments is introduced, started after detecting the existence of nodes with malicious behavior, and is based on the use of one or more mobile agents to improved the connectivity of the network.
Proceedings ArticleDOI

AMon: A Monitoring Multidimensional Feature Application to Secure Android Environments

TL;DR: AMon as discussed by the authors collects device related information from several sources: communications, /proc filesystem, applications and device usage, which is dynamically gathered over time and its execution does not require to get special privileges or to be system root.