| dc.contributor.author | Rey Castiblanco, Carlos Andres | |
| dc.contributor.author | REY CASTIBLANCO , CARLOS ANDRES | |
| dc.coverage.spatial | Bogotá, Escuela Superior de Guerra "General Rafael Reyes Prieto",2025 | |
| dc.date.accessioned | 2026-04-28T20:16:38Z | |
| dc.date.available | 2026-04-28T20:16:38Z | |
| dc.date.issued | 2025 | |
| dc.date.submitted | 2025 | |
| dc.identifier.uri | https://hdl.handle.net/20.500.14205/11701 | |
| dc.description.abstract | El aumento de ciberamenazas en Colombia, especialmente aquellas vinculadas a inteligencia artificial (IA), plantea riesgos significativos para la infraestructura crítica cibernética del sector defensa. Este estudio cualitativo y descriptivo analiza cómo la IA incrementa la complejidad y persistencia de los ataques cibernéticos, destacando desafíos en la prevención y mitigación de riesgos. Se emplearon metodologías como FAIR y triangulación conceptual para identificar vulnerabilidades, evaluar impactos y formular estrategias de mitigación basadas en amenazas persistentes avanzadas. Los resultados evidencian que la IA no solo amplifica los riesgos al automatizar ataques, sino que también requiere enfoques estratégicos de ciberseguridad que incluyan actualización tecnológica y análisis anticipado de riesgos. La investigación concluye que es esencial implementar procesos robustos de gestión del riesgo y metodologías preventivas para proteger la infraestructura crítica del sector defensa frente a amenazas cibernéticas impulsadas por IA. | es_ES |
| dc.description.abstract | The rise of cyber threats in Colombia, particularly those linked to artificial intelligence (AI), poses significant risks to the critical cyber infrastructure of the defense sector. This qualitative and descriptive study examines how AI increases the complexity and persistence of cyberattacks, highlighting challenges in risk prevention and mitigation. Methodologies such as FAIR and conceptual triangulation were employed to identify vulnerabilities, assess impacts, and propose mitigation strategies based on advanced persistent threats. Results show that AI not only amplifies risks by automating attacks but also demands strategic cybersecurity approaches involving technological updates and anticipatory risk analysis. The study concludes that robust risk management processes and preventive methodologies are essential to safeguard the critical infrastructure of the defense sector against AI-driven cyber threats. | es_ES |
| dc.description.sponsorship | Escuela Superior de Guerra " General Rafael Reyes Prieto" | es_ES |
| dc.format.extent | 29 páginas | |
| dc.format.mimetype | application/pdf | es_ES |
| dc.language.iso | spa | es_ES |
| dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/4.0/ | * |
| dc.title | Riesgos para la Infraestructura Crítica Cibernética del Sector Defensa: implementación de inteligencia artificial e identificación con metodología FAIR. | es_ES |
| dc.title.alternative | Risks to the Cyber Critical Infrastructure of the Defense Sector: Implementation of Artificial Intelligence and Identification with FAIR Methodology. | es_ES |
| dcterms.bibliographicCitation | Abdullahi, M., Baashar, Y., Alhussian, H., Alwadain, A., Aziz, N., Capretz, L. F., & Abdulkadir, S. J. (2022). Detecting cybersecurity attacks in internet of things using artificial intelligence methods: A systematic literature review. Electronics, 11(2), 198. | es_ES |
| dcterms.bibliographicCitation | Agrawal, G., Kaur, A., y Myneni, S. (2024). A review of generative models in generating synthetic attack data for cybersecurity. Electronics, 13(2), 322 - 325. | es_ES |
| dcterms.bibliographicCitation | Akbarian, F., Ramezani, A., Hamidi, M., y Haghighat, V. (2020). Advanced algorithm to detect stealthy cyber attacks on automatic generation control in smart grid. ET Cyber‐Physical Systems: Theory & Applications, 54, 351-358. | es_ES |
| dcterms.bibliographicCitation | Alhayani, B., Mohammed, H. J., Chaloob, I. Z., y Ahmed, J. S. (2021). Effectiveness of artificial Intelligence techniques against cyber security risks apply of IT industry. Materials Today: Proceedings, 531(10.1016). | es_ES |
| dcterms.bibliographicCitation | Ankalaki, S., Rajesh, A., Pallavi, M., Hukkeri, G., & Naik, G. R. (2025). Cyber attack prediction: From traditional machine learning to generative artificial intelligence. IEEE Access., 1-14. | es_ES |
| dcterms.bibliographicCitation | Ansari, M. F., Dash, B., Sharma, P., y Yathiraju, N. (2022). The impact and limitations of artificial intelligence in cybersecurity: a literature review. International Journal of Advanced Research in Computer and Communication Engineering. | es_ES |
| dcterms.bibliographicCitation | Birthriya, S. K., Ahlawat, P., & Jain, A. K. (2025). Detection and Prevention of Spear Phishing Attacks: A Comprehensive Survey. . Computers & Security, 1-14. | es_ES |
| dcterms.bibliographicCitation | Chakraborty, A., Biswas, A., & Khan, A. K. (2023). Artificial intelligence for cybersecurity: Threats, attacks and mitigation. In Artificial Intelligence for Societal Issues (pp. 3-25). Cham: Springer International Publishing. | es_ES |
| dcterms.bibliographicCitation | Chauhan, R., Sabeel, U., Izaddoost, A., & Shah Heydari, S. (2021). Polymorphic adversarial cyberattacks using WGAN. Journal of Cybersecurity and Privacy, 1(4), 767-792. | es_ES |
| dcterms.bibliographicCitation | Chehri, A., Fofana, I., & Yang, X. (2021). Security risk modeling in smart grid critical infrastructures in the era of big data and artificial intelligence. Sustainability, 13(6), 3196. | es_ES |
| dcterms.bibliographicCitation | Choudhary, A., Choudhary, P., & Salve, S. (2018). A study on various cyber attacks and a proposed intelligent system for monitoring such attacks. 2018 3rd International Conference on Inventive Computation Technologies (ICICT), 10(27), 612-617. | es_ES |
| dcterms.bibliographicCitation | Comando Cibernético de las Fuerzas Militares. (2024). Boletín informativo nº 24. Publicación mensual de CCOCI. | es_ES |
| dcterms.bibliographicCitation | Consejo de Política Económica y Social . (14 de febrero de 2025). POLÍTICA NACIONAL DE INTELIGENCIA ARTIFICIAL . Obtenido de https://www.dnp.gov.co/LaEntidad_/subdireccion-general-prospectiva-desarrollo-nacional/direccion-desarrollo-digital/Paginas/documentos-conpes-confianza-y-seguridad-digital.aspx | es_ES |
| dcterms.bibliographicCitation | Cosano, A. R. (2024). EL LIBRO BLANCO DE LA INTELIGENCIA ARTIFICIAL GENERATIVA . ESPAÑA : DigitalES. | es_ES |
| dcterms.bibliographicCitation | Goffer, M., Uddin, M., Has an, S., Barikdar, C., Hassan, J., Das, N., & Hasan, R. (2025). AI-Enhanced Cyber Threat Detection and Response Advancing National Security in Critical Infrastructure. Journal of Posthumanism, 5(3), 1667-1689. | es_ES |
| dcterms.bibliographicCitation | Guembe, B., Azeta, A., Misra, S., Osamor, V. C., Fernández-Sanz, L., y Pospelova, V. (2022). The emerging threat of AI-deriven cyber-attacks: A review. Applied Artificial Intelligence, 36(1), 2037254. | es_ES |
| dcterms.bibliographicCitation | Hernández, R., Fernández, C., & Baptista, P. (2014). Metodología de la investigación (Vol. 6, pp. 102-256). México: mcGraw-Hill. | es_ES |
| dcterms.bibliographicCitation | Jimmy, F. (2024). Cyber security vulnerabilities and remediation through cloud security tools. Journal of Artificial Intelligence General science (JAIGS), 2(1), 129-171. | es_ES |
| dcterms.bibliographicCitation | Kure, H. I., Islam, S., y Mouratidis, H. (2022). An integrated cyber security risk management framework and risk predication for the critical infrastructure protection. Neural Computing and Applications, 34(18), 15241-15271. | es_ES |
| dcterms.bibliographicCitation | Landauer, M., Alton, L., Lindorfer, M., Skopik, F., Wurzenberger, M., & Hotwagner, W. (2025). Trace of the Times: Rootkit Detection through Temporal Anomalies in Kernel Activity. Landauer, M., Alton, L., Lindorfer, M., Skopik, F., Wurzenberger, M., & Hotwagner, W. (2025). Trace of the Times: Rootkit Detection through Temporal Anomalies in Kernel Activity. , 1-12. | es_ES |
| dcterms.bibliographicCitation | Maddireddy, B. R., & Maddireddy, B. R. (2020). Proactive Cyber Defense: Utilizing AI for Early Threat Detection and Risk Assessment. International Journal of Advanced Engineering Technologies and Innovations, 1(2), 64-83. | es_ES |
| dcterms.bibliographicCitation | Malik, S. (2024). The Future of AI in Biometric Security: Enhancing Authentication and Privacy Protection. | es_ES |
| dcterms.bibliographicCitation | Margalef, L., & Arenas, A. (2006). ¿Qué entendemos por innovación Educativa? A proposito del desarrollo curricular. Perpectiva Educacional, 1(47), 13-31. | es_ES |
| dcterms.bibliographicCitation | Mosteanu, N. R. (2020). Artificial intelligence and cyber security “face to face with cyber-attack maltese case of risk management approach. Ecoforum Journal, 9(2). | es_ES |
| dcterms.bibliographicCitation | Pătrașcu, P. (2019). CYBERNETIC ACTIONS ON CRITICAL INFRASTRUCTURES IN THE MILITARY FIEL. . Bulletin of" Carol I" National Defence University , 40-45. | es_ES |
| dcterms.bibliographicCitation | Roopesh, M., Nishat, N., Rasetti, S., & Rahaman, M. A. (2024). A Review Of Machine Learning And Feature Selection Techniques For Cybersecurity Attack Detection With A Focus On DDoS Attacks. Academic Journal on Science, Technology, Engineering & Mathematic Education, 4(03), 178-194. | es_ES |
| dcterms.bibliographicCitation | Roselli, N. (2011). Teoria del aprendizaje colaborativo y la teoria de la repesentación social: convergencias y posibles articulaciones. Revista colombiana de Ciencias Sociales, 2(2), 173-191. | es_ES |
| dcterms.bibliographicCitation | Sarker, I. H. (2024). AI for critical infrastructure protection and resilience. . AI-driven cybersecurity and threat intelligence: Cyber automation, intelligent decision-making and explainability, 153-172. | es_ES |
| dcterms.bibliographicCitation | Shaik, A., & Shaik, A. (2024). Integrated AI Cyber Secured Approach for Detection of Rootkits in Malware. In International Conference on Frontiers of Intelligent Computing: Theory and Applications. Singapore: Springer Nature Singapore., 12, 567-576. | es_ES |
| dcterms.bibliographicCitation | Thomas, T. (2016). Russia's information warfare strategy: can the nation cope in future conflicts?. . The Transformation of Russia’s Armed Forces , 148-177. | es_ES |
| dcterms.bibliographicCitation | Truong, T. C., Diep, Q. B., & Zelinka, I. (2020). Artificial intelligence in the cyber domain: Offense and defense. Symmetry, 12(3), 410. | es_ES |
| dcterms.bibliographicCitation | Vakulyk, O., Petrenko, P., Kuzmenko, I., Pochtovyi, M., & Orlovskyi, R. (2020). CYBERSECURITY AS A COMPONENT OF THE NATIONAL SECURITY OF THE STATE. Journal of Security & Sustainability Issues, 9(3), 1-10. | es_ES |
| dcterms.bibliographicCitation | Volk, M. (2024). A safer future: Leveraging the AI power to improve the cybersecurity in critical infrastructures. Electrotechnical Review/Elektrotehniski Vestnik, 91(3), 1-10. | es_ES |
| dcterms.bibliographicCitation | Wang, J., Guo, J., Li, K., & Zheng, H. (2024). Distributed adaptive event-triggered control of connected automated vehicle platoon systems with spoofing cyber attacks. IEEE Transactions on Vehicular Technology., 1-10. | es_ES |
| dcterms.bibliographicCitation | Yamin, M. M., Ullah, M., Ullah, H., & Katt, B. (2021). Weaponized AI for cyber-attacks. Journal of Information Security and Applications, 57, 102722. | es_ES |
| dcterms.bibliographicCitation | Zhang, Z., Al Hamadi, H., Damiani, E., Yeun, C. Y., & Taher, F. (2022). Explainable artificial Intelligence applications in cyber security: State-of-the-art in Research. IEEE Access, 10, 93104-93139. | es_ES |
| datacite.rights | http://purl.org/coar/access_right/c_16ec | es_ES |
| oaire.resourcetype | http://purl.org/coar/resource_type/c_2df8fbb1 | es_ES |
| oaire.version | http://purl.org/coar/version/c_ab4af688f83e57aa | es_ES |
| dc.audience | Público general | es_ES |
| dc.contributor.tutor | Becerra Cuervo, Jairo Andrés (Metodologico) | |
| dc.contributor.tutor | Giraldo Rios, Lucas Adolfo (Temático) | |
| dc.identifier.instname | Escuela Superior de Guerra "General Rafael Reyes Prieto" | es_ES |
| dc.identifier.reponame | Repositorio ESDEG | es_ES |
| dc.publisher.place | Bogotá | es_ES |
| dc.publisher.program | Maestría en Ciberseguridad y Ciberdefensa | es_ES |
| dc.relation.citationEdition | 29 páginas | es_ES |
| dc.rights.accessrights | info:eu-repo/semantics/restrictedAccess | es_ES |
| dc.rights.cc | Attribution-NonCommercial-NoDerivatives 4.0 Internacional | * |
| dc.subject.keywords | Ciberseguridad | es_ES |
| dc.subject.keywords | Inteligencia artificial | es_ES |
| dc.subject.keywords | Ciberamenazas | es_ES |
| dc.subject.keywords | Infraestructura crítica | es_ES |
| dc.subject.keywords | Mitigación | es_ES |
| dc.subject.keywords | Defensa | es_ES |
| dc.subject.keywords | Cybersecurity | es_ES |
| dc.subject.keywords | Artificial intelligence | es_ES |
| dc.subject.keywords | Cyberthreats | es_ES |
| dc.subject.keywords | Critical infrastructure | es_ES |
| dc.subject.keywords | Mitigation | es_ES |
| dc.subject.keywords | Defense | es_ES |
| dc.type.driver | info:eu-repo/semantics/article | es_ES |
| dc.type.hasversion | info:eu-repo/semantics/restrictedAccess | es_ES |
| dc.type.spa | Artículo | es_ES |