P
Pedro García-Teodoro
Researcher at University of Granada
Publications - 80
Citations - 3283
Pedro García-Teodoro is an academic researcher from University of Granada. The author has contributed to research in topics: Intrusion detection system & Anomaly detection. The author has an hindex of 18, co-authored 77 publications receiving 2813 citations.
Papers
More filters
Book ChapterDOI
N3: A Geometrical Approach for Network Intrusion Detection at the Application Layer
TL;DR: This work proposes an algorithm that assigns an anomaly score to each service request on the basis of its similarity with a previously established model of normality, and demonstrates that this approach yields a very high detection rate with a low level of false alarms.
Proceedings Article
Pair-wise similarity criteria for flows identification in P2P/non-P2P traffic classification
TL;DR: This paper introduces a similarity-based method to pair flows up, which is aimed at reducing the cost of identifying P2P/non-P2P traffic flows and different similarity measures for flows pairing are proposed and analyzed.
Aplicación de técnicas de agrupamiento a la detección de intrusiones en red mediante N3
Jesús E. Díaz-Verdejo,Juan M. Estévez-Tapiador,Pedro García-Teodoro,Madrid Telemática,Edificio Sabatini +4 more
TL;DR: In el presente trabajo se desarrollan tecnicas de agrupamiento de vectores de caracteristicas for su aplicacion en un sistema de deteccion de intrusiones en red propuesto por los autores as mentioned in this paper.
Book ChapterDOI
A Security Response Approach Based on the Deployment of Mobile Agents
TL;DR: A response mechanism to improve the tolerance against security threats in MANET environments is introduced, started after detecting the existence of nodes with malicious behavior, and is based on the use of one or more mobile agents to improved the connectivity of the network.
Proceedings ArticleDOI
AMon: A Monitoring Multidimensional Feature Application to Secure Android Environments
José Antonio Gómez-Hernández,Pedro García-Teodoro,J.A. Holgado-Terriza,Gabriel Maciá-Fernández,J. Camacho-Paez,M. Robles-Carrillo +5 more
TL;DR: AMon as discussed by the authors collects device related information from several sources: communications, /proc filesystem, applications and device usage, which is dynamically gathered over time and its execution does not require to get special privileges or to be system root.