02404nas a2200289 4500000000100000000000100001008004100002260001200043653001100055653001500066653001800081653002100099653000800120100002300128700002500151700001700176700002300193700001900216700002600235700002600261245009600287856008000383300001000463490000600473520162100479022001402100 2020 d c09/202010aAttack10aBlockchain10aCybersecurity10aMachine Learning10aSME1 aMiguel Angel Lopez1 aJuan Manuel Lombardo1 aMabel López1 aCarmen María Alba1 aSusana Velasco1 aManuel Alonso Braojos1 aMarta Fuentes-García00aIntelligent Detection and Recovery from Cyberattacks for Small and Medium-Sized Enterprises uhttps://www.ijimai.org/journal/sites/default/files/2020-08/ijimai_6_3_7.pdf a55-620 v63 aCyberattacks threaten continuously computer security in companies. These attacks evolve everyday, being more and more sophisticated and robust. In addition, they take advantage of security breaches in organizations and companies, both public and private. Small and Medium-sized Enterprises (SME), due to their structure and economic characteristics, are particularly damaged when a cyberattack takes place. Although organizations and companies put lots of efforts in implementing security solutions, they are not always effective. This is specially relevant for SMEs, which do not have enough economic resources to introduce such solutions. Thus, there is a need of providing SMEs with affordable, intelligent security systems with the ability of detecting and recovering from the most detrimental attacks. In this paper, we propose an intelligent cybersecurity platform, which has been designed with the objective of helping SMEs to make their systems and network more secure. The aim of this platform is to provide a solution optimizing detection and recovery from attacks. To do this, we propose the application of proactive security techniques in combination with both Machine Learning (ML) and blockchain. Our proposal is enclosed in the IASEC project, which allows providing security in each of the phases of an attack. Like this, we help SMEs in prevention, avoiding systems and network from being attacked; detection, identifying when there is something potentially harmful for the systems; containment, trying to stop the effects of an attack; and response, helping to recover the systems to a normal state. a1989-1660