Publicación: Desarrollo de asistente virtual para el acompañamiento en la navegación de sitios web o descarga de aplicaciones de forma segura
| dc.contributor.advisor | Fong Guzman, Javier Josue | |
| dc.contributor.author | Corado López, Diana Zaray | |
| dc.contributor.jury | Fong Guzman, Javier Josue | |
| dc.contributor.jury | Yass Coy, Jorge Andres | |
| dc.contributor.jury | Barrios Gonzalez, Douglas Leonel | |
| dc.date.accessioned | 2026-05-20T17:53:24Z | |
| dc.date.issued | 2023 | |
| dc.description | Formato PDF digital — 73 páginas — incluye gráficos, tablas y referencias bibliográficas | |
| dc.description.abstract | En la actualidad, las tecnologías tradicionales han mostrado limitaciones en la protección contra ataques cibernéticos. Aunque los antivirus pueden reconocer patrones o características para identificar y detectar amenazas, estos se han vuelto insuficientes frente a los nuevos vectores de ataque que explotan sesgos cognitivos o vulnerabilidades de los usuarios. En respuesta a esta necesidad, se ha desarrollado un asistente virtual con la capacidad de proporcionar educación en ciberseguridad, cuyo objetivo principal es que los usuarios puedan identificar cuándo están expuestos a un posible ataque. Para ofrecer un acompañamiento más efectivo, se creó un modelo de detección de dominios maliciosos que logra clasificar correctamente un dominio en un 70 % de las ocasiones. Finalmente, se ha demostrado que, al utilizar un asistente virtual y recibir notificaciones sobre el tipo de ataque al que se podría estar expuesto al acceder a un dominio malicioso, la probabilidad de que una persona se proteja exitosamente aumenta en un 50 %. Estos resultados resaltan la importancia de adoptar enfoques proactivos y educativos para mejorar la conciencia y la seguridad cibernética de los usuarios en el entorno digital. | spa |
| dc.description.abstract | Currently, traditional technologies have fallen behind in providing adequate protection against cyberattacks. Although antivirus software can identify and detect viruses by recognizing specific patterns, it has become insu!cient against modern attacks that exploit cognitive biases and user vulnerabilities. In response to this need, a virtual assistant capable of providing cybersecurity education was developed. Its objective is to enable users to identify potential exposure to cyberattacks. To provide more e"ective guidance, a malicious domain detection model was created, achieving a correct classification rate of 70%. Ultimately, it was demonstrated that using a virtual assistant and receiving notifications regarding the specific type of potential attack when accessing a malicious domain increases the probability of successful protection by 50%. These results highlight the importance of adopting proactive and educational approaches to enhance user awareness and cybersecurity in the digital environment. | eng |
| dc.description.degreelevel | Pregrado | |
| dc.description.degreename | Licenciado en Ingeniería en Ciencia de la Computación y Tecnologías de la Información | |
| dc.format.extent | 73 p. | |
| dc.format.mimetype | application/pdf | |
| dc.identifier.uri | https://repositorio.uvg.edu.gt/handle/123456789/6412 | |
| dc.language.iso | spa | |
| dc.publisher | Universidad del Valle de Guatemala | |
| dc.publisher.branch | Campus Central | |
| dc.publisher.faculty | Facultad de Ingeniería | |
| dc.publisher.place | Guatemala | |
| dc.publisher.program | Licenciatura en Ingeniería en Ciencia de la Computación y Tecnologías de la Información | |
| dc.relation.references | A. G. Johansen, What is antivirus software? Antivirus definition , Norton, 2023. dirección: https://us.norton.com/blog/malware/what-is-antivirus . | |
| dc.relation.references | Norton, 115 cybersecurity statistics + trends to know in 2023 , 2023. dirección: https://us. norton.com/blog/emerging-threats/cybersecurity-statistics . | |
| dc.relation.references | H. B. Essel, D. Vlachopoulos, A. Tachie-Menson, E. E. Johnson y P. K. Baah, “The impact of a virtual teaching assistant (chatbot) on students’ learning in Ghanaian higher education,” International Journal of Educational Technology in Higher Education , vol. 19, n. o 1, 2022. doi : 10.1186/s41239-022-00362-6 . | |
| dc.relation.references | A. Soofastaei, “Virtual assistants,” en Virtual Assistant , IntechOpen, oct. de 2021. doi : 10. 5772/intechopen.100248 . dirección: https://doi.org/10.5772/intechopen.100248 . | |
| dc.relation.references | R. Pieraccini, “What is a virtual assistant,” en AI Assistant , MIT Press, 2021, págs. 7-9. | |
| dc.relation.references | T. Hope, 10 types of virtual assistants , sep. de 2022. dirección: https : / / medium . com / @ossisto.digital/10-types-of-virtual-assistants-9a4cf70a37ca . | |
| dc.relation.references | OpenAI, Introducing ChatGPT , 2022. dirección: https://openai.com/blog/chatgpt . | |
| dc.relation.references | F. Clarizia, F. Colace, M. Lombardi, F. Pascale y D. Santaniello, “Chatbot: An education support system for student,” International Journal of Educational Technology in Higher Edu- cation , vol. 15, n. o 1, 2018. doi : 10.1007/978-3-030-01689-0_23 . | |
| dc.relation.references | M. V. Wüthrich y M. Merz, “Natural language processing,” en Statistical Foundations of Actuarial Learning and its Applications , Springer International Publishing AG, 2021, págs. 425-452. doi : 10.1007/978-3-031-12409-9_10 . | |
| dc.relation.references | T. Contributor, Natural language understanding (NLU) , Enterprise AI, 2023. dirección: https: //www.techtarget.com/searchenterpriseai/definition/natural-language-understanding- NLU . | |
| dc.relation.references | E. Adamopoulou y L. Moussiades, “An overview of chatbot technology,” en IFIP Advances in Information and Communication Technology , 2019, págs. 373-383. doi : 10.1007/978-3-030- 49186-4_31 . | |
| dc.relation.references | S. Yolchuyeva, G. Németh y B. Gyires-Toth, “Self-attention networks for intent detection,” en Proceedings - Natural Language Processing in a Deep Learning World , Shoumen, Bulgaria: Incoma Ltd., oct. de 2019. doi : 10 . 26615 % 2F978 - 954 - 452 - 056 - 4 _ 157 . dirección: https : //doi.org/10.26615%2F978-954-452-056-4_157 . | |
| dc.relation.references | R. Karim, Illustrated: Self-attention , mar. de 2023. dirección: https://towardsdatascience. com/illustrated-self-attention-2d627e33b20a . | |
| dc.relation.references | X. Huang, Chatbot: Design, architecture, and applications , University of Pennsylvania, 2021. di- rección: https://www.semanticscholar.org/paper/CHATBOT%3A-DESIGN%2C-ARCHITECUTRE% 2C-AND-APPLICATIONS-Huang-Marcus/5927294d4d011f7b1e5dadb275340d15c3e5d26e . | |
| dc.relation.references | C. Greyling, Dialog management considerations for chatbots , dic. de 2021. dirección: https: / / cobusgreyling . medium . com / dialog - management - considerations - for - chatbots - 6ed4dca65a80 . | |
| dc.relation.references | Sciforce, A comprehensive guide to natural language generation , feb. de 2022. dirección: https: //medium.com/sciforce/a- comprehensive- guide- to- natural- language- generation- dd63a4b6e548 . | |
| dc.relation.references | A. Vaswani, N. Shazeer, N. Parmar et al., “Attention is all you need,” en Advances in Neural Information Processing Systems , I. Guyon, U. V. Luxburg, S. Bengio et al., eds., vol. 30, Curran Associates, Inc., 2017. | |
| dc.relation.references | A. Radford, J. Wu, R. Child, D. Luan, D. Amodei e I. Sutskever, Language models are un- supervised multitask learners , 2019. dirección: https://www.semanticscholar.org/paper/ Language-Models-are-Unsupervised-Multitask-Learners-Radford-Wu/9405cc0d6169988371b2755e573c | |
| dc.relation.references | M. A. Boden, Artificial intelligence . Elsevier, jun. de 1996. | |
| dc.relation.references | D. Partridge, Artificial intelligence . Elsevier, ene. de 2002, págs. 237-250. doi : 10.1016/b0- 12-227210-2/00038-8 . | |
| dc.relation.references | Cambridge Dictionary, Intelligence , 2023. dirección: https://dictionary.cambridge.org/ dictionary/english/intelligence . | |
| dc.relation.references | S. Shaari y M. E. E. M. Matore, “Emphasizing the concept of spiritual intelligence from Islamic and Western perspectives on multiple intelligence,” Creative Education , vol. 10, n. o 12, págs. 2815-2830, ene. de 2019. doi : 10.4236/ce.2019.1012208 . | |
| dc.relation.references | M. H. Huang y R. T. Rust, “Artificial intelligence in service,” Journal of Service Research , vol. 21, n. o 2, págs. 155-172, feb. de 2018. doi : 10.1177/1094670517752459 . | |
| dc.relation.references | E. Pantano y D. Scarpi, I, robot, you, consumer: Measuring artificial intelligence types and their e ! ect on consumers emotions in service , 2022. dirección: https://journals.sagepub. com/doi/full/10.1177/10946705221103538 . | |
| dc.relation.references | B. Müller, J. Reinhardt y M. T. Strickland, Neural networks . Springer Science Business Media, dic. de 2012. | |
| dc.relation.references | I. J. Goodfellow, J. Pouget-Abadie, M. Mirza et al., “Generative adversarial nets,” Communi- cations of the ACM , 2014, Original paper. dirección: https://doi.org/10.1145/3422622 . | |
| dc.relation.references | L. Hardesty, Explained: Neural networks , MIT News, abr. de 2017. dirección: https://news. mit.edu/2017/explained-neural-networks-deep-learning-0414 . | |
| dc.relation.references | D. Yeung, I. Cloete, D. Shi y W. W. Y. Ng, “Introduction to neural networks,” en Sensitivity Analysis for Neural Networks , Springer, 2009, págs. 1-15. doi : 10.1007/978-3-642-02532- 7_1 . | |
| dc.relation.references | National Institute of Neurological Disorders and Stroke, Brain basics: The life and death of a neuron , 2023. dirección: https://www.ninds.nih.gov/health- information/public- education/brain-basics/brain-basics-life-and-death-neuron . | |
| dc.relation.references | Stanford University, Neural networks , n.d. dirección: https://cs.stanford.edu/people/ eroberts/courses/soco/projects/neural-networks/Biology/index.html . | |
| dc.relation.references | University of California - San Diego, Why are neuron axons long and spindly? Study shows they’re optimizing signaling e ! ciency , jul. de 2018. dirección: https://medicalxpress.com/ news/2018-07-neuron-axons-spindly-theyre-optimizing.html . | |
| dc.relation.references | R. García, “El perceptrón: Una red neuronal para clasificar datos,” Investigación en Modelos Matemáticos Aplicados a la Gestión y la Economía , vol. 1, pág. 3, mar. de 2022. | |
| dc.relation.references | J. M. Alvarez, El perceptrón como neurona artificial , jun. de 2018. dirección: http://blog. josemarianoalvarez.com/2018/06/10/el-perceptron-como-neurona-artificial/ . | |
| dc.relation.references | I. Goodfellow, Y. Bengio y A. Courville, Deep learning . MIT Press, nov. de 2016. | |
| dc.relation.references | A. Graves, Supervised sequence labelling with recurrent neural networks . Springer, feb. de 2012. | |
| dc.relation.references | A. Radford, K. Nasimhan, T. Salimans e I. Sutskever, “Improving language understanding with unsupervised learning,” OpenAI Blog , 2018. | |
| dc.relation.references | Q. Zhu y J. Luo, “Generative pre-trained transformer for design concept generation: An ex- ploration,” Proceedings of the Design Society , vol. 2, págs. 1825-1834, mayo de 2022. doi : 10.1017/pds.2022.185 . | |
| dc.relation.references | T. B. Brown, B. Mann, N. Ryder et al., “Language models are few-shot learners,” arXiv preprint arXiv:2005.14165 , mayo de 2020. dirección: https://arxiv.org/pdf/2005.14165.pdf . | |
| dc.relation.references | Cambridge Dictionary, Security , 2023. dirección: https : / / dictionary . cambridge . org / dictionary/english/security . | |
| dc.relation.references | Cambridge Dictionary, Information , 2023. dirección: https://dictionary.cambridge.org/ dictionary/english/information . | |
| dc.relation.references | M. E. Whitman y H. J. Mattord, Management of information security , 2. a ed. Cengage Learning, 2008. | |
| dc.relation.references | M. E. Whitman y H. J. Mattord, Principles of information security , 4. a ed. Cengage Learning, 2012. | |
| dc.relation.references | D. Craigen, N. Diakun-Thibault y R. Purse, “Defining cybersecurity,” Technology Innovation Management Review , vol. 4, n. o 10, págs. 13-21, 2014. doi : 10.22215/timreview/835 . | |
| dc.relation.references | F. Dinha, The human factor in cybersecurity: Understanding social engineering , abr. de 2023. dirección: https://www.forbes.com/sites/forbestechcouncil/2023/04/10/the-human- factor-in-cybersecurity-understanding-social-engineering/ . | |
| dc.relation.references | P. Singer y A. H. Friedman, Cybersecurity and cyberwar . Oxford University Press, 2014. | |
| dc.relation.references | C. Hadnagy, Social engineering: The science of human hacking . John Wiley & Sons, 2018. | |
| dc.relation.references | Cambridge Dictionary, Psychology , 2023. dirección: https://dictionary.cambridge.org/ dictionary/english/psychology . | |
| dc.relation.references | P. O. Gray y D. Bjorklund, Psychology , 8. a ed. Worth Publishers, 2018. | |
| dc.relation.references | B. K. Wiederhold, “The role of psychology in enhancing cybersecurity,” Cyberpsychology, Beha- vior, and Social Networking , vol. 17, n. o 3, págs. 131-132, 2014. | |
| dc.relation.references | A. Torres, Cognición: definición, procesos principales y funcionamiento , oct. de 2022. dirección: https://psicologiaymente.com/inteligencia/cognicion-definicion-procesos . | |
| dc.relation.references | K. Cherry, Cognition in psychology , abr. de 2023. dirección: https://www.verywellmind. com/what-is-cognition-2794982 . | |
| dc.relation.references | T. Kvaran, S. Nichols y A. G. Sanfey, “The e ! ect of analytic and experiential modes of thought on moral judgment,” en Progress in Brain Research , Elsevier, 2013, págs. 187-196. doi : 10. 1016/b978-0-444-62604-2.00011-3 . | |
| dc.relation.references | D. Kahneman, Thinking, fast and slow . Farrar, Straus y Giroux, 2011. | |
| dc.relation.references | A. Groenewegen, Kahneman fast and slow thinking explained , abr. de 2022. dirección: https: //suebehaviouraldesign.com/kahneman-fast-slow-thinking/ . | |
| dc.relation.references | D. Pucicov, Do cognitive biases have an impact on cyber security? 2020. dirección: https: / / manazerskainformatika . sk / do - cognitive - biases - have - an - impact - on - cyber - security/ | |
| dc.relation.references | Santander, The ostrich e ! ect: when we hide from our finances , 2022. dirección: https://www. santander.com/en/stories/the-ostrich-effect-when-we-hide-from-our-finances . | |
| dc.relation.references | The Decision Lab, Optimism bias , n.d. dirección: https://thedecisionlab.com/biases/ optimism-bias . | |
| dc.relation.references | O. Lystrup, Cisco Umbrella releases free top 1 million sites list , mayo de 2018. dirección: https://medium.com/cisco-shifted/cisco-umbrella-releases-free-top-1-million- sites-list-8497fba58efe . | |
| dc.relation.references | A. R, How does BERT NLP optimization model work? Turing, nov. de 2022. dirección: https: //www.turing.com/kb/how-bert-nlp-optimization-model-works . | |
| dc.relation.references | Meta AI, Introducing LLaMA: A foundational, 65-billion-parameter large language model , feb. de 2023. dirección: https : / / ai . meta . com / blog / large - language - model - llama - meta-ai/ | |
| dc.relation.references | Technology Innovation Institute, Falcon , 2023. dirección: https : / / falconllm . tii . ae / falcon.html . | |
| dc.relation.references | M. Mitchell y D. C. Krakauer, “The debate over understanding in AI’s large language models,” Proceedings of the National Academy of Sciences , vol. 120, n. o 13, mar. de 2023. doi : 10.1073/ pnas.2215907120 . dirección: https://doi.org/10.1073/pnas.2215907120 . | |
| dc.relation.references | Cambridge Dictionary, Fine-tuning , sep. de 2023. dirección: https://dictionary.cambridge. org/dictionary/english/fine-tuning . | |
| dc.relation.references | OpenAI, Fine-tuning guide . dirección: https://platform.openai.com/docs/guides/fine- tuning/preparing-your-dataset . | |
| dc.relation.references | J. Brownlee, A gentle introduction to imbalanced classification , ene. de 2020. dirección: https: //machinelearningmastery.com/what-is-imbalanced-classification/ . | |
| dc.relation.references | D. Hara, K. Sakurai e Y. Musashi, “Classification of malicious domains by their LIFETIME,” en Lecture Notes on Data Engineering and Communications Technologies , Springer, ene. de 2020. doi : 10.1007/978-3-030-39746-3_35 . | |
| dc.relation.references | Palo Alto Networks, What are malicious newly registered domains? n.d. dirección: https : / / www . paloaltonetworks . com / cyberpedia / what - are - malicious - newly - registered - domains . | |
| dc.relation.references | P. A. Méndez Morales, Implementación de una aplicación Android para educar sobre ciber- seguridad, intercepción de tráfico de red malicioso e identificación de malware basado en los permisos solicitados por las aplicaciones , Tesis de Licenciatura, 2023. | |
| dc.relation.references | [71] SpamHaus, URLhaus - Malware URL exchange , n.d. dirección: https://urlhaus.abuse.ch/ . | |
| dc.rights.accessrights | info:eu-repo/semantics/openAccess | |
| dc.rights.coar | http://purl.org/coar/access_right/c_abf2 | |
| dc.rights.license | Atribución-NoComercial-SinDerivadas 4.0 Internacional (CC BY-NC-ND 4.0) | |
| dc.rights.uri | https://creativecommons.org/licenses/by-nc-nd/4.0/ | |
| dc.subject.ddc | 000 - Ciencias de la computación, información y obras generales::005 - Programación, programas, datos de computación | |
| dc.subject.ocde | 2. Ingeniería y Tecnología::2B. Ingenierías Eléctrica, Electrónica e Informática | |
| dc.subject.ods | ODS 9: Industria, innovación e infraestructura. Construir infraestructuras resilientes, promover la industrialización inclusiva y sostenible y fomentar la innovación | |
| dc.subject.ods | ODS 16: Paz, justicia e instituciones sólidas. Promover sociedades pacíficas e inclusivas para el desarrollo sostenible, facilitar el acceso a la justicia para todos y construir a todos los niveles instituciones eficaces e inclusivas que rindan cuentas | |
| dc.title | Desarrollo de asistente virtual para el acompañamiento en la navegación de sitios web o descarga de aplicaciones de forma segura | spa |
| dc.title.translated | Development of a virtual assistant for safe web browsing and secure application downloads | |
| dc.type | Trabajo de grado - Pregrado | |
| dc.type.coar | http://purl.org/coar/resource_type/c_7a1f | |
| dc.type.coarversion | http://purl.org/coar/version/c_970fb48d4fbd8a85 | |
| dc.type.content | Text | |
| dc.type.driver | info:eu-repo/semantics/bachelorThesis | |
| dc.type.version | info:eu-repo/semantics/publishedVersion | |
| dc.type.visibility | Public Thesis | |
| dspace.entity.type | Publication |
