SciELO - Scientific Electronic Library Online

 
vol.22 número2Análisis del sector reciclador en ciudades intermedias. Estudio de caso municipio de Neiva, ColombiaAnálisis por elementos finitos de una prótesis transtibial para un ciclista paralímpico índice de autoresíndice de materiabúsqueda de artículos
Home Pagelista alfabética de revistas  

Servicios Personalizados

Revista

Articulo

Indicadores

Links relacionados

  • En proceso de indezaciónCitado por Google
  • No hay articulos similaresSimilares en SciELO
  • En proceso de indezaciónSimilares en Google

Compartir


Ingeniería y competitividad

versión impresa ISSN 0123-3033versión On-line ISSN 2027-8284

Resumen

LEGUIZAMON-PAEZ, Miguel A.; BONILLA-DIAZ, María A.  y  LEON-CUERVO, Camilo A.. Analysis of computer attacks through Honeypots in the District University Francisco José de Caldas. Ing. compet. [online]. 2020, vol.22, n.2, 8483.  Epub 30-Nov-2020. ISSN 0123-3033.  https://doi.org/10.25100/iyc.v22i2.8483.

This article is the result of the work developed for the design and implementation of Honeypots as a complementary alternative to the existing computer security scheme at Universidad Distrital Francisco José de Caldas as a project that also contributes to the analysis and detection of attacks to the network security and the elements of computer type in the institution.

For the development of this article, we worked using the PDCA cycle (Plan - Do - Check - Act). It is a model based on process management and continuous improvement of them, with a simple application and used properly, can help a lot in the realization of activities, both productive and administrative, in a more organized and effective way. Therefore, adopting the PDCA cycle provides a simple guide for the management of activities and processes, the basic structure of a system and it is applicable to any organization.

After the implementation of Cowrie and HoneyPy, it was possible to identify different patterns and ways to attack, guiding the configuration of a script in the IDS (Intrusion Detection System) server, allowing with the stored logs to create rules and implement it over Iptables. This fact allows become the IDS Server a node into a network of sensors feeding the database globally for an investigation of the attacks on all connected and configured computers, obtaining information to make a major analysis for the final user.

The design of infrastructure with honeypots, implemented at the District University Francisco José de Caldas allows finding security failures belonging to university's servers due to computing attacks. A new network distribution was designed for registering information about the different attacks and enabling effective solutions to be apply to the university.

Palabras clave : Cyberattack; Cybersecurity; Honeypots; Vulnerabilities.

        · resumen en Español     · texto en Español     · Español ( pdf )