SciELO - Scientific Electronic Library Online

 
vol.22 issue2Analysis of the Recycling Sector in Intermediate Cities, Study Case - Neiva, ColombiaFinite Element Analysis of a Transtibial Prosthesis for a Paralympic Cyclist author indexsubject indexarticles search
Home Pagealphabetic serial listing  

Services on Demand

Journal

Article

Indicators

Related links

  • On index processCited by Google
  • Have no similar articlesSimilars in SciELO
  • On index processSimilars in Google

Share


Ingeniería y competitividad

Print version ISSN 0123-3033On-line version ISSN 2027-8284

Abstract

LEGUIZAMON-PAEZ, Miguel A.; BONILLA-DIAZ, María A.  and  LEON-CUERVO, Camilo A.. Analysis of computer attacks through Honeypots in the District University Francisco José de Caldas. Ing. compet. [online]. 2020, vol.22, n.2, 8483.  Epub Nov 30, 2020. ISSN 0123-3033.  https://doi.org/10.25100/iyc.v22i2.8483.

This article is the result of the work developed for the design and implementation of Honeypots as a complementary alternative to the existing computer security scheme at Universidad Distrital Francisco José de Caldas as a project that also contributes to the analysis and detection of attacks to the network security and the elements of computer type in the institution.

For the development of this article, we worked using the PDCA cycle (Plan - Do - Check - Act). It is a model based on process management and continuous improvement of them, with a simple application and used properly, can help a lot in the realization of activities, both productive and administrative, in a more organized and effective way. Therefore, adopting the PDCA cycle provides a simple guide for the management of activities and processes, the basic structure of a system and it is applicable to any organization.

After the implementation of Cowrie and HoneyPy, it was possible to identify different patterns and ways to attack, guiding the configuration of a script in the IDS (Intrusion Detection System) server, allowing with the stored logs to create rules and implement it over Iptables. This fact allows become the IDS Server a node into a network of sensors feeding the database globally for an investigation of the attacks on all connected and configured computers, obtaining information to make a major analysis for the final user.

The design of infrastructure with honeypots, implemented at the District University Francisco José de Caldas allows finding security failures belonging to university's servers due to computing attacks. A new network distribution was designed for registering information about the different attacks and enabling effective solutions to be apply to the university.

Keywords : Cyberattack; Cybersecurity; Honeypots; Vulnerabilities.

        · abstract in Spanish     · text in Spanish     · Spanish ( pdf )