According to the FBI, cybernetic attacks through bot networks have greatly proliferated to the extent that it can provoke severe complications in all kinds of sectors. To detect these kinds of situations, we can collect all pertinent information to allow us to make optimized searches for the opportune detection of malignant access attempts.
In this project, we addressed the following questions:
- Which data structures are the best to store this kind of information?
- What data structure will enable us to make a more efficient information search?
- How can we know if it is a malignant access?
- How can we distinguish real access attempts from those which aren't?
- How can we implement groups of information that characterize these accesses?