Análisis de ataques informáticos mediante Honeypots para el apoyo de actividades académicas en la Universidad Distrital Francisco José de Caldas
Fecha
Autor corporativo
Título de la revista
ISSN de la revista
Título del volumen
Editor
Compartir
Director
Altmetric
Resumen
The objective of the developed work is to present a complementary alternative to the security scheme implemented in the network of the Francisco José de Caldas District University, which supports the learning processes in the area of computer security to the different curricular projects that contemplate this subject within training topics. For this, a theoretical content is presented that allows the reader to be contextualized in the areas of computer security, attacks and everything related to trap servers, better known as Honeypots. On these, a definition is presented, advantages and disadvantages of its use, references on its implementation and configuration, among others.
In the analysis area is presented information about the characterization and distribution of the university network, as well different reports that allow determining the amount of information that is handled through different means, such as the use of institutional mail from the different domains and the security applied to it. Reports on the attacks registered in the antivirus and other analysis tools used by the area in charge of the network administration are presented. Finally, an analysis of the results of a survey applied to students and teachers whose objective was to identify their perception about the security of their information in the university and the acceptance of implement tools that contribute to the analysis of computer attacks.
At the end, an infrastructure design is presented with the inclusion of two teams that allow Honeypots to be implemented to gather information about attacks. It presents the configuration and steps for its installation, as well images that allow to validate its installation and the information collected, to later exemplify one of the actions taken against these vulnerabilities to increase security according to the attack patterns found.