SciELO - Scientific Electronic Library Online

 
vol.22 número2Analysis of the Recycling Sector in Intermediate Cities, Study Case - Neiva, ColombiaFinite Element Analysis of a Transtibial Prosthesis for a Paralympic Cyclist índice de autoresíndice de assuntospesquisa de artigos
Home Pagelista alfabética de periódicos  

Serviços Personalizados

Journal

Artigo

Indicadores

Links relacionados

  • Em processo de indexaçãoCitado por Google
  • Não possue artigos similaresSimilares em SciELO
  • Em processo de indexaçãoSimilares em Google

Compartilhar


Ingeniería y competitividad

versão impressa ISSN 0123-3033versão On-line ISSN 2027-8284

Resumo

LEGUIZAMON-PAEZ, Miguel A.; BONILLA-DIAZ, María A.  e  LEON-CUERVO, Camilo A.. Analysis of computer attacks through Honeypots in the District University Francisco José de Caldas. Ing. compet. [online]. 2020, vol.22, n.2, 8483.  Epub 30-Nov-2020. ISSN 0123-3033.  https://doi.org/10.25100/iyc.v22i2.8483.

This article is the result of the work developed for the design and implementation of Honeypots as a complementary alternative to the existing computer security scheme at Universidad Distrital Francisco José de Caldas as a project that also contributes to the analysis and detection of attacks to the network security and the elements of computer type in the institution.

For the development of this article, we worked using the PDCA cycle (Plan - Do - Check - Act). It is a model based on process management and continuous improvement of them, with a simple application and used properly, can help a lot in the realization of activities, both productive and administrative, in a more organized and effective way. Therefore, adopting the PDCA cycle provides a simple guide for the management of activities and processes, the basic structure of a system and it is applicable to any organization.

After the implementation of Cowrie and HoneyPy, it was possible to identify different patterns and ways to attack, guiding the configuration of a script in the IDS (Intrusion Detection System) server, allowing with the stored logs to create rules and implement it over Iptables. This fact allows become the IDS Server a node into a network of sensors feeding the database globally for an investigation of the attacks on all connected and configured computers, obtaining information to make a major analysis for the final user.

The design of infrastructure with honeypots, implemented at the District University Francisco José de Caldas allows finding security failures belonging to university's servers due to computing attacks. A new network distribution was designed for registering information about the different attacks and enabling effective solutions to be apply to the university.

Palavras-chave : Cyberattack; Cybersecurity; Honeypots; Vulnerabilities.

        · resumo em Espanhol     · texto em Espanhol     · Espanhol ( pdf )