{"id":19494,"date":"2022-11-30T17:32:18","date_gmt":"2022-11-30T17:32:18","guid":{"rendered":"https:\/\/news.lacnic.net\/?p=19494"},"modified":"2022-12-02T17:56:55","modified_gmt":"2022-12-02T17:56:55","slug":"attack-mitigation-with-new-technologies","status":"publish","type":"post","link":"https:\/\/blog.lacnic.net\/en\/attack-mitigation-with-new-technologies\/","title":{"rendered":"Attack Mitigation with New Technologies"},"content":{"rendered":"\n<p>Tecnol\u00f3gico de Monterrey has developed a project to mitigate distributed denial-of-service (DDoS) attacks using emerging technologies and artificial intelligence.<\/p>\n\n\n\n<p>Faced with the notorious increase in DDoS attacks, a group of researchers decided to conduct this study, particularly in software-defined networks (SDN).<\/p>\n\n\n\n<p>This work made it possible to identify the characteristics of the most important attacks on next-generation network architectures and to develop strategies for the rapid deployment of high-level security policies on the network, said project coordinator Jesus Arturo P\u00e9rez.<\/p>\n\n\n\n<p>At the beginning of the year, the number of DDoS attacks had already tripled compared to the same period of 2021 and has continued to grow since the start of the war between Russia and Ukraine. \u201cThese attacks are very easy to launch, as there are simple tools that can be used to do so,\u201d P\u00e9rez observed.<\/p>\n\n\n\n<p>The goal of the project was to test whether there are substantial differences in attacks targeting IoT devices, and one of its first conclusions was that there are none. \u201cWhether an attack targets or originates in an IoT device does not make a substantial difference, as it is merely a device with an IP address,\u201d the Tecnol\u00f3gico de Monterrey expert added.<\/p>\n\n\n\n<p>The study was conducted in virtualized environments. Now, the researchers are working with the University of the Basque Country (Spain) to test the behavior on physical devices.<\/p>\n\n\n\n<p>The initiative has achieved interesting results. \u201cWe identified which models and artificial intelligence techniques are best suited for the identification and mitigation of attacks,\u201d P\u00e9rez said.<\/p>\n\n\n\n<p>Generally speaking, models based on deep learning performed better and were more efficient in identifying DDoS attacks than models based on machine learning.<\/p>\n\n\n\n<p>The research team worked with three datasets, two of which focused on DDos attacks, CIC-2017 and CIC-2019 (high-rate and low-rate attacks), while the third focused on obtaining results for the project and observing the behavior of IoT devices (the BoT-IoT dataset). The experiments varied the number of attackers and the rate of attack connections.<\/p>\n\n\n\n<p>\u201cWe achieved excellent results: by testing the dataset we were able to identify 99% of the attacks,\u201d P\u00e9rez added.<\/p>\n\n\n\n<p>Likewise, the IPS mitigated low-speed DDoS attacks with 100% success for some attackers. \u201cThe results show that the proposed architecture provides effective responses to malicious and legitimate connections,\u201d the expert noted.<\/p>\n\n\n\n<p>Another goal of the project is the autonomy of the global architecture, in other words, allowing decisions to be made automatically, without human intervention. \u201cWe often depend on an administrator to block the traffic of an attack,\u201d P\u00e9rez explained.<\/p>\n\n\n\n<p>If the architecture comprised of the IDS and the IPS can make decisions on its own, there will be autonomy regardless of human intervention.<\/p>\n\n\n\n<p>P\u00e9rez highlighted the project&#8217;s contribution: the creation of an automated architecture that identifies high-rate and low-rate attacks and their scalability.<\/p>\n\n\n\n<p>He confirmed that distributed denial-of-service attacks are difficult to mitigate with existing defense tools, which is why they have attempted to find a new modular, flexible, and scalable solution that can provide effective responses to legitimate and malicious connections.<\/p>\n\n\n\n<p>This project by the Monterrey Institute of Technology and Higher Studies received a <a href=\"https:\/\/programafrida.net\/proyectos\/proyectos-seleccionados-2021\">FRIDA<\/a> grant in 2021.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tecnol\u00f3gico de Monterrey has developed a project to mitigate distributed denial-of-service (DDoS) attacks using emerging technologies and artificial intelligence. Faced with the notorious increase in DDoS attacks, a group of researchers decided to conduct this study, particularly in software-defined networks (SDN). This work made it possible to identify the characteristics of the most important attacks [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":18408,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[916],"tags":[1307],"archivo":[1345],"taxonomy-authors":[],"tipo_autor":[],"class_list":["post-19494","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-frida-program","tag-frida-program","archivo-editions"],"acf":{"author":"","related_notes":[18411,17222]},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LACNIC Blog | Attack Mitigation with New Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.lacnic.net\/en\/attack-mitigation-with-new-technologies\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LACNIC Blog | Attack Mitigation with New Technologies\" \/>\n<meta property=\"og:description\" content=\"Tecnol\u00f3gico de Monterrey has developed a project to mitigate distributed denial-of-service (DDoS) attacks using emerging technologies and artificial intelligence. Faced with the notorious increase in DDoS attacks, a group of researchers decided to conduct this study, particularly in software-defined networks (SDN). This work made it possible to identify the characteristics of the most important attacks [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.lacnic.net\/en\/attack-mitigation-with-new-technologies\/\" \/>\n<meta property=\"og:site_name\" content=\"LACNIC Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/lacnic\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-30T17:32:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-02T17:56:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2022\/07\/thumb-frida-latencia-jul-22.png\" \/>\n\t<meta property=\"og:image:width\" content=\"680\" \/>\n\t<meta property=\"og:image:height\" content=\"330\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Mart\u00edn\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@lacnic\" \/>\n<meta name=\"twitter:site\" content=\"@lacnic\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/attack-mitigation-with-new-technologies\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/attack-mitigation-with-new-technologies\/\"},\"author\":{\"name\":\"Mart\u00edn\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/3f3117e292d71f4166f765368b0760dc\"},\"headline\":\"Attack Mitigation with New Technologies\",\"datePublished\":\"2022-11-30T17:32:18+00:00\",\"dateModified\":\"2022-12-02T17:56:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/attack-mitigation-with-new-technologies\/\"},\"wordCount\":526,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/attack-mitigation-with-new-technologies\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2022\/07\/thumb-frida-latencia-jul-22.png\",\"keywords\":[\"FRIDA Program\"],\"articleSection\":[\"FRIDA Program\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/attack-mitigation-with-new-technologies\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/attack-mitigation-with-new-technologies\/\",\"url\":\"https:\/\/blog.lacnic.net\/en\/attack-mitigation-with-new-technologies\/\",\"name\":\"LACNIC Blog | Attack Mitigation with New Technologies\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/attack-mitigation-with-new-technologies\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/attack-mitigation-with-new-technologies\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2022\/07\/thumb-frida-latencia-jul-22.png\",\"datePublished\":\"2022-11-30T17:32:18+00:00\",\"dateModified\":\"2022-12-02T17:56:55+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/attack-mitigation-with-new-technologies\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/attack-mitigation-with-new-technologies\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/attack-mitigation-with-new-technologies\/#primaryimage\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2022\/07\/thumb-frida-latencia-jul-22.png\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2022\/07\/thumb-frida-latencia-jul-22.png\",\"width\":680,\"height\":330},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/attack-mitigation-with-new-technologies\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/blog.lacnic.net\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Attack Mitigation with New Technologies\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.lacnic.net\/#website\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"name\":\"LACNIC Blog\",\"description\":\"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.\",\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.lacnic.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.lacnic.net\/#organization\",\"name\":\"LACNIC Blog\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"caption\":\"LACNIC Blog\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/lacnic\",\"https:\/\/x.com\/lacnic\",\"https:\/\/www.instagram.com\/lacnic\/?hl=es-la\",\"https:\/\/uy.linkedin.com\/company\/lacnic\",\"https:\/\/www.youtube.com\/user\/lacnicstaff\",\"https:\/\/www.lacnic.net\/podcast\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/3f3117e292d71f4166f765368b0760dc\",\"name\":\"Mart\u00edn\",\"description\":\"Especialista en imagen institucional\",\"url\":\"https:\/\/blog.lacnic.net\/en\/author\/sysmartin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LACNIC Blog | Attack Mitigation with New Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.lacnic.net\/en\/attack-mitigation-with-new-technologies\/","og_locale":"en_US","og_type":"article","og_title":"LACNIC Blog | Attack Mitigation with New Technologies","og_description":"Tecnol\u00f3gico de Monterrey has developed a project to mitigate distributed denial-of-service (DDoS) attacks using emerging technologies and artificial intelligence. Faced with the notorious increase in DDoS attacks, a group of researchers decided to conduct this study, particularly in software-defined networks (SDN). This work made it possible to identify the characteristics of the most important attacks [&hellip;]","og_url":"https:\/\/blog.lacnic.net\/en\/attack-mitigation-with-new-technologies\/","og_site_name":"LACNIC Blog","article_publisher":"https:\/\/facebook.com\/lacnic","article_published_time":"2022-11-30T17:32:18+00:00","article_modified_time":"2022-12-02T17:56:55+00:00","og_image":[{"width":680,"height":330,"url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2022\/07\/thumb-frida-latencia-jul-22.png","type":"image\/png"}],"author":"Mart\u00edn","twitter_card":"summary_large_image","twitter_creator":"@lacnic","twitter_site":"@lacnic","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.lacnic.net\/en\/attack-mitigation-with-new-technologies\/#article","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/en\/attack-mitigation-with-new-technologies\/"},"author":{"name":"Mart\u00edn","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/3f3117e292d71f4166f765368b0760dc"},"headline":"Attack Mitigation with New Technologies","datePublished":"2022-11-30T17:32:18+00:00","dateModified":"2022-12-02T17:56:55+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/attack-mitigation-with-new-technologies\/"},"wordCount":526,"commentCount":0,"publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/attack-mitigation-with-new-technologies\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2022\/07\/thumb-frida-latencia-jul-22.png","keywords":["FRIDA Program"],"articleSection":["FRIDA Program"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.lacnic.net\/en\/attack-mitigation-with-new-technologies\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.lacnic.net\/en\/attack-mitigation-with-new-technologies\/","url":"https:\/\/blog.lacnic.net\/en\/attack-mitigation-with-new-technologies\/","name":"LACNIC Blog | Attack Mitigation with New Technologies","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/attack-mitigation-with-new-technologies\/#primaryimage"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/attack-mitigation-with-new-technologies\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2022\/07\/thumb-frida-latencia-jul-22.png","datePublished":"2022-11-30T17:32:18+00:00","dateModified":"2022-12-02T17:56:55+00:00","breadcrumb":{"@id":"https:\/\/blog.lacnic.net\/en\/attack-mitigation-with-new-technologies\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.lacnic.net\/en\/attack-mitigation-with-new-technologies\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/en\/attack-mitigation-with-new-technologies\/#primaryimage","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2022\/07\/thumb-frida-latencia-jul-22.png","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2022\/07\/thumb-frida-latencia-jul-22.png","width":680,"height":330},{"@type":"BreadcrumbList","@id":"https:\/\/blog.lacnic.net\/en\/attack-mitigation-with-new-technologies\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/blog.lacnic.net\/en\/"},{"@type":"ListItem","position":2,"name":"Attack Mitigation with New Technologies"}]},{"@type":"WebSite","@id":"https:\/\/blog.lacnic.net\/#website","url":"https:\/\/blog.lacnic.net\/","name":"LACNIC Blog","description":"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.","publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.lacnic.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.lacnic.net\/#organization","name":"LACNIC Blog","url":"https:\/\/blog.lacnic.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","caption":"LACNIC Blog"},"image":{"@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/lacnic","https:\/\/x.com\/lacnic","https:\/\/www.instagram.com\/lacnic\/?hl=es-la","https:\/\/uy.linkedin.com\/company\/lacnic","https:\/\/www.youtube.com\/user\/lacnicstaff","https:\/\/www.lacnic.net\/podcast"]},{"@type":"Person","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/3f3117e292d71f4166f765368b0760dc","name":"Mart\u00edn","description":"Especialista en imagen institucional","url":"https:\/\/blog.lacnic.net\/en\/author\/sysmartin\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2022\/07\/thumb-frida-latencia-jul-22.png","jetpack_sharing_enabled":true,"wpml_current_locale":"en_US","wpml_translations":[{"locale":"es_ES","id":19492,"post_title":"Mitigaci\u00f3n de ataques con nuevas tecnolog\u00edas","slug":"mitigacion-de-ataques-con-nuevas-tecnologias","href":"https:\/\/blog.lacnic.net\/mitigacion-de-ataques-con-nuevas-tecnologias\/"},{"locale":"pt_BR","id":19496,"post_title":"Mitiga\u00e7\u00e3o de ataques com novas tecnologias","slug":"mitigacao-de-ataques-com-novas-tecnologias","href":"https:\/\/blog.lacnic.net\/pt-br\/mitigacao-de-ataques-com-novas-tecnologias\/"}],"_links":{"self":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/19494","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/comments?post=19494"}],"version-history":[{"count":2,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/19494\/revisions"}],"predecessor-version":[{"id":19499,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/19494\/revisions\/19499"}],"acf:post":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/17222"},{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/18411"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media\/18408"}],"wp:attachment":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media?parent=19494"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/categories?post=19494"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tags?post=19494"},{"taxonomy":"archivo","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/archivo?post=19494"},{"taxonomy":"taxonomy-authors","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/taxonomy-authors?post=19494"},{"taxonomy":"tipo_autor","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tipo_autor?post=19494"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}