{"id":101574,"date":"2008-09-23T09:26:00","date_gmt":"2008-09-23T09:26:00","guid":{"rendered":"http:\/\/weblogs.madrimasd.org\/\/sociedadinformacion\/archive\/2008\/09\/23\/101574.aspx"},"modified":"2008-09-23T09:26:00","modified_gmt":"2008-09-23T09:26:00","slug":"programas-inteligentes-para-proteger-tu-entorno-informatico","status":"publish","type":"post","link":"https:\/\/www.madrimasd.org\/blogs\/sociedadinformacion\/2008\/09\/23\/101574","title":{"rendered":"Programas inteligentes para proteger tu entorno inform\u00e1tico"},"content":{"rendered":"<link rel=\"File-List\" href=\"file:\/\/\/C:%5CDOCUME%7E1%5CLIZO%27N%7E1%5CLOCALS%7E1%5CTemp%5Cmsohtml1%5C01%5Cclip_filelist.xml\"><!--[if gte mso 9]><xml> <w:WordDocument>  <w:View>Normal<\/w:View>  <w:Zoom>0<\/w:Zoom>  <w:PunctuationKerning\/>  <w:ValidateAgainstSchemas\/>  <w:SaveIfXMLInvalid>false<\/w:SaveIfXMLInvalid>  <w:IgnoreMixedContent>false<\/w:IgnoreMixedContent>  <w:AlwaysShowPlaceholderText>false<\/w:AlwaysShowPlaceholderText>  <w:Compatibility>   <w:BreakWrappedTables\/>   <w:SnapToGridInCell\/>   <w:WrapTextWithPunct\/>   <w:UseAsianBreakRules\/>   <w:DontGrowAutofit\/>  <\/w:Compatibility>  <w:BrowserLevel>MicrosoftInternetExplorer4<\/w:BrowserLevel> <\/w:WordDocument><\/xml><![endif]--><!--[if gte mso 9]><xml> <w:LatentStyles DefLockedState=\"false\" LatentStyleCount=\"156\"> <\/w:LatentStyles><\/xml><![endif]--><br \/>\n<style><!-- \/* Style Definitions *\/ p.MsoNormal, li.MsoNormal, div.MsoNormal\t{mso-style-parent:\"\";\tmargin:0in;\tmargin-bottom:.0001pt;\tmso-pagination:widow-orphan;\tfont-size:12.0pt;\tfont-family:\"Times New Roman\";\tmso-fareast-font-family:\"Times New Roman\";\tmso-ansi-language:ES-TRAD;}a:link, span.MsoHyperlink\t{color:blue;\ttext-decoration:underline;\ttext-underline:single;}a:visited, span.MsoHyperlinkFollowed\t{color:purple;\ttext-decoration:underline;\ttext-underline:single;}@page Section1\t{size:8.5in 11.0in;\tmargin:1.0in 1.25in 1.0in 1.25in;\tmso-header-margin:.5in;\tmso-footer-margin:.5in;\tmso-paper-source:0;}div.Section1\t{page:Section1;}--><\/style>\n<p><!--[if gte mso 10]>\n\n<style> \/* Style Definitions *\/ table.MsoNormalTable\t{mso-style-name:\"Table Normal\";\tmso-tstyle-rowband-size:0;\tmso-tstyle-colband-size:0;\tmso-style-noshow:yes;\tmso-style-parent:\"\";\tmso-padding-alt:0in 5.4pt 0in 5.4pt;\tmso-para-margin:0in;\tmso-para-margin-bottom:.0001pt;\tmso-pagination:widow-orphan;\tfont-size:10.0pt;\tfont-family:\"Times New Roman\";\tmso-ansi-language:#0400;\tmso-fareast-language:#0400;\tmso-bidi-language:#0400;}<\/style>\n\n<![endif]--><!--[if gte mso 9]><xml> <o:shapedefaults v:ext=\"edit\" spidmax=\"1026\"\/><\/xml><![endif]--><!--[if gte mso 9]><xml> <o:shapelayout v:ext=\"edit\">  <o:idmap v:ext=\"edit\" data=\"1\"\/> <\/o:shapelayout><\/xml><![endif]--><b><span lang=\"ES-TRAD\"><o:p><\/o:p><\/span><\/b><link rel=\"File-List\" href=\"file:\/\/\/C:%5CDOCUME%7E1%5CLIZO%27N%7E1%5CLOCALS%7E1%5CTemp%5Cmsohtml1%5C01%5Cclip_filelist.xml\"><!--[if gte mso 9]><xml> <w:WordDocument>  <w:View>Normal<\/w:View>  <w:Zoom>0<\/w:Zoom>  <w:PunctuationKerning\/>  <w:ValidateAgainstSchemas\/>  <w:SaveIfXMLInvalid>false<\/w:SaveIfXMLInvalid>  <w:IgnoreMixedContent>false<\/w:IgnoreMixedContent>  <w:AlwaysShowPlaceholderText>false<\/w:AlwaysShowPlaceholderText>  <w:Compatibility>   <w:BreakWrappedTables\/>   <w:SnapToGridInCell\/>   <w:WrapTextWithPunct\/>   <w:UseAsianBreakRules\/>   <w:DontGrowAutofit\/>  <\/w:Compatibility>  <w:BrowserLevel>MicrosoftInternetExplorer4<\/w:BrowserLevel> <\/w:WordDocument><\/xml><![endif]--><!--[if gte mso 9]><xml> <w:LatentStyles DefLockedState=\"false\" LatentStyleCount=\"156\"> <\/w:LatentStyles><\/xml><![endif]--><\/p>\n<style><!-- \/* Style Definitions *\/ p.MsoNormal, li.MsoNormal, div.MsoNormal\t{mso-style-parent:\"\";\tmargin:0in;\tmargin-bottom:.0001pt;\tmso-pagination:widow-orphan;\tfont-size:12.0pt;\tfont-family:\"Times New Roman\";\tmso-fareast-font-family:\"Times New Roman\";\tmso-ansi-language:ES-TRAD;}a:link, span.MsoHyperlink\t{color:blue;\ttext-decoration:underline;\ttext-underline:single;}a:visited, span.MsoHyperlinkFollowed\t{color:purple;\ttext-decoration:underline;\ttext-underline:single;}@page Section1\t{size:8.5in 11.0in;\tmargin:1.0in 1.25in 1.0in 1.25in;\tmso-header-margin:.5in;\tmso-footer-margin:.5in;\tmso-paper-source:0;}div.Section1\t{page:Section1;}--><\/style>\n<p><!--[if gte mso 10]>\n\n<style> \/* Style Definitions *\/ table.MsoNormalTable\t{mso-style-name:\"Table Normal\";\tmso-tstyle-rowband-size:0;\tmso-tstyle-colband-size:0;\tmso-style-noshow:yes;\tmso-style-parent:\"\";\tmso-padding-alt:0in 5.4pt 0in 5.4pt;\tmso-para-margin:0in;\tmso-para-margin-bottom:.0001pt;\tmso-pagination:widow-orphan;\tfont-size:10.0pt;\tfont-family:\"Times New Roman\";\tmso-ansi-language:#0400;\tmso-fareast-language:#0400;\tmso-bidi-language:#0400;}<\/style>\n\n<![endif]--><link rel=\"File-List\" href=\"file:\/\/\/C:%5CDOCUME%7E1%5CLIZO%27N%7E1%5CLOCALS%7E1%5CTemp%5Cmsohtml1%5C01%5Cclip_filelist.xml\"><!--[if gte mso 9]><xml> <w:WordDocument>  <w:View>Normal<\/w:View>  <w:Zoom>0<\/w:Zoom>  <w:PunctuationKerning\/>  <w:ValidateAgainstSchemas\/>  <w:SaveIfXMLInvalid>false<\/w:SaveIfXMLInvalid>  <w:IgnoreMixedContent>false<\/w:IgnoreMixedContent>  <w:AlwaysShowPlaceholderText>false<\/w:AlwaysShowPlaceholderText>  <w:Compatibility>   <w:BreakWrappedTables\/>   <w:SnapToGridInCell\/>   <w:WrapTextWithPunct\/>   <w:UseAsianBreakRules\/>   <w:DontGrowAutofit\/>  <\/w:Compatibility>  <w:BrowserLevel>MicrosoftInternetExplorer4<\/w:BrowserLevel> <\/w:WordDocument><\/xml><![endif]--><!--[if gte mso 9]><xml> <w:LatentStyles DefLockedState=\"false\" LatentStyleCount=\"156\"> <\/w:LatentStyles><\/xml><![endif]--><\/p>\n<style><!-- \/* Style Definitions *\/ p.MsoNormal, li.MsoNormal, div.MsoNormal\t{mso-style-parent:\"\";\tmargin:0in;\tmargin-bottom:.0001pt;\tmso-pagination:widow-orphan;\tfont-size:12.0pt;\tfont-family:\"Times New Roman\";\tmso-fareast-font-family:\"Times New Roman\";\tmso-ansi-language:ES-TRAD;}a:link, span.MsoHyperlink\t{color:blue;\ttext-decoration:underline;\ttext-underline:single;}a:visited, span.MsoHyperlinkFollowed\t{color:purple;\ttext-decoration:underline;\ttext-underline:single;}@page Section1\t{size:8.5in 11.0in;\tmargin:1.0in 1.25in 1.0in 1.25in;\tmso-header-margin:.5in;\tmso-footer-margin:.5in;\tmso-paper-source:0;}div.Section1\t{page:Section1;}--><\/style>\n<p><!--[if gte mso 10]>\n\n<style> \/* Style Definitions *\/ table.MsoNormalTable\t{mso-style-name:\"Table Normal\";\tmso-tstyle-rowband-size:0;\tmso-tstyle-colband-size:0;\tmso-style-noshow:yes;\tmso-style-parent:\"\";\tmso-padding-alt:0in 5.4pt 0in 5.4pt;\tmso-para-margin:0in;\tmso-para-margin-bottom:.0001pt;\tmso-pagination:widow-orphan;\tfont-size:10.0pt;\tfont-family:\"Times New Roman\";\tmso-ansi-language:#0400;\tmso-fareast-language:#0400;\tmso-bidi-language:#0400;}<\/style>\n\n<![endif]--><\/p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 12pt;\" align=\"justify\"><span style=\"font-size: 10pt; font-family: Arial;\" lang=\"ES-TRAD\">Cient\u00edficos de la <a href=\"http:\/\/www.uc3m.es\/\" target=\"_blank\">UniversidadCarlos III de Madrid<\/a> (UC3M) han desarrollado un sistema capaz de detectarintrusiones en los ordenadores y de decidir, de forma aut\u00f3noma, si se deberesponder a ellas.<u1:p><\/u1:p><\/span><span style=\"font-size: 10pt;\" lang=\"ES-TRAD\"><o:p><\/o:p><\/span><\/p>\n<div align=\"justify\"><\/div>\n<p class=\"MsoNormal\" style=\"\" align=\"justify\"><span style=\"font-size: 10pt; font-family: Arial;\" lang=\"ES-TRAD\">Los sistemas dedetecci\u00f3n de intrusiones (IDS, por sus siglas en ingl\u00e9s) son herramientas deseguridad preparadas para monitorizar los eventos sospechosos que se producenen un sistema inform\u00e1tico. Para reducir el riesgo de intrusi\u00f3n, una de lasamenazas que afecta a la seguridad inform\u00e1tica, un equipo de investigadores dela UC3M ha desarrollado un sistema multiagente que identifica eventossospechosos e indica de forma aut\u00f3noma si procede tomar acciones de respuestafrente a ellos. Ambas capacidades son deseables a la hora de dise\u00f1ar un IDS,seg\u00fan Agust\u00edn Orfila, uno de los creadores de este software, del <a href=\"http:\/\/www.inf.uc3m.es\/\" target=\"_blank\">Departamento de Inform\u00e1tica de la UC3M<\/a>.<u1:p><\/u1:p><\/span><span style=\"font-size: 10pt;\" lang=\"ES-TRAD\"><o:p><\/o:p><\/span><\/p>\n<div align=\"justify\"><\/div>\n<p class=\"MsoNormal\" style=\"\" align=\"justify\"><span style=\"font-size: 10pt; font-family: Arial;\" lang=\"ES-TRAD\"><u2:p><u1:p><\/u1:p><\/u2:p><u2:p><br \/><\/u2:p><\/span><\/p>\n<p class=\"MsoNormal\" style=\"\" align=\"justify\"><span style=\"font-size: 10pt; font-family: Arial;\" lang=\"ES-TRAD\"><u2:p>Ver noticia completa<a href=\"http:\/\/www.madrimasd.org\/informacionidi\/noticias\/noticia.asp?id=36240&amp;tipo=g\"> aqu\u00ed<\/a>.<\/u2:p><\/p>\n<p class=\"MsoNormal\" style=\"\" align=\"justify\"><span style=\"font-size: 10pt; font-family: Arial;\" lang=\"ES-TRAD\">FUENTE |<\/span><span style=\"font-size: 10pt; font-family: Arial;\" lang=\"ES-TRAD\"> <\/span><span style=\"font-size: 10pt; font-family: Arial;\" lang=\"ES-TRAD\"><a href=\"http:\/\/www.uc3m.es\/\">UC3M<\/a> &#8211; <a href=\"http:\/\/www.madrimasd.org\/\">mi+d<\/a><\/span><span style=\"font-size: 10pt;\" lang=\"ES-TRAD\"><o:p><\/o:p><\/span><\/p>\n<p class=\"MsoNormal\" align=\"justify\"><span style=\"font-size: 10pt; font-family: Arial;\" lang=\"ES-TRAD\"><\/span><span style=\"font-family: Arial;\" lang=\"ES-TRAD\"><o:p><\/o:p><\/span><\/p>\n<p><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cient\u00edficos de la UniversidadCarlos III de Madrid (UC3M) han desarrollado un sistema capaz de detectarintrusiones en los ordenadores y de decidir, de forma aut\u00f3noma, si se deberesponder a ellas. Los sistemas dedetecci\u00f3n de intrusiones (IDS, por sus siglas en ingl\u00e9s) son herramientas deseguridad preparadas para monitorizar los eventos sospechosos que se producenen un sistema inform\u00e1tico. Para reducir el riesgo de intrusi\u00f3n, una de lasamenazas que afecta a la seguridad inform\u00e1tica, un equipo de investigadores dela UC3M ha desarrollado un sistema multiagente que identifica eventossospechosos e indica de forma aut\u00f3noma si procede tomar acciones de respuestafrente a ellos. Ambas capacidades son\u2026<\/p>\n","protected":false},"author":58,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0},"categories":[1],"tags":[],"blocksy_meta":{"styles_descriptor":{"styles":{"desktop":"","tablet":"","mobile":""},"google_fonts":[],"version":4}},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.madrimasd.org\/blogs\/sociedadinformacion\/wp-json\/wp\/v2\/posts\/101574"}],"collection":[{"href":"https:\/\/www.madrimasd.org\/blogs\/sociedadinformacion\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.madrimasd.org\/blogs\/sociedadinformacion\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.madrimasd.org\/blogs\/sociedadinformacion\/wp-json\/wp\/v2\/users\/58"}],"replies":[{"embeddable":true,"href":"https:\/\/www.madrimasd.org\/blogs\/sociedadinformacion\/wp-json\/wp\/v2\/comments?post=101574"}],"version-history":[{"count":0,"href":"https:\/\/www.madrimasd.org\/blogs\/sociedadinformacion\/wp-json\/wp\/v2\/posts\/101574\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.madrimasd.org\/blogs\/sociedadinformacion\/wp-json\/wp\/v2\/media?parent=101574"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.madrimasd.org\/blogs\/sociedadinformacion\/wp-json\/wp\/v2\/categories?post=101574"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.madrimasd.org\/blogs\/sociedadinformacion\/wp-json\/wp\/v2\/tags?post=101574"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}