Aguilar Célleri, Jessica LizzeteAnálisis e identificación de herramientas open source para detectar ataques Watering Hole sobre una red simulada en GNS3 utilizando el protocolo Netflow de Cisco.
Technology has been evolving over the years, nowadays both public and private companies take the risk of being attacked, which leads to the stealing information from servers and even having control of the equipment. The present university degree project explains the definitions related to the cyber...
Autor Principal: | Aguilar Célleri, Jéssica Lizzete |
---|---|
Otros Autores: | Almeida Vinueza, Diego Santiago |
Formato: | bachelorThesis |
Idioma: | spa |
Publicado: |
2018
|
Materias: | |
Acceso en línea: |
http://dspace.ups.edu.ec/handle/123456789/16032 |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
Sumario: |
Technology has been evolving over the years, nowadays both public and private companies take the risk of being attacked, which leads to the stealing information from servers and even having control of the equipment.
The present university degree project explains the definitions related to the cyber-attack, among them threats, vulnerabilities, computer viruses and security tools, which provide a necessary guide to reduce the risk to the network and to the computer equipment before a possible attack.
It is important that companies dedicated to provide services through the web, have a set of security tools, which guarantees the continuity of them and the protection of IT assets. For this, it has been necessary to identify Open Source tools to detect any type of attack that enters the network of a company.
As a first instance, a business network simulation is carried out, which is comprised of basic securities, this leads to the company being exposed to the WATERING HOLE attack. For this, security tools are installed to help mitigate this type of problem.
Finally, an analysis of the tools is performed to find out which is the most appropriate at the time when the network is being attacked, in addition to this, another type of network security was implemented, such as antivirus, ACLs, and advanced security in the ASA. |
---|