{"id":167,"date":"2009-10-13T00:00:00","date_gmt":"2009-10-13T00:00:00","guid":{"rendered":"http:\/\/ijandev-test.fi.uncoma.edu.ar\/Wordpress\/index.php\/2009\/10\/13\/fernandez-deteccion-y-limitaciones-de-ataques-clasicos-con-honeynets-virtuales-octubre-2009\/"},"modified":"2022-02-15T03:12:52","modified_gmt":"2022-02-15T06:12:52","slug":"96-fernandez-deteccion-y-limitaciones-de-ataques-clasicos-con-honeynets-virtuales-octubre-2009","status":"publish","type":"post","link":"https:\/\/www.fi.uncoma.edu.ar\/index.php\/nuevos-lic-lcc\/96-fernandez-deteccion-y-limitaciones-de-ataques-clasicos-con-honeynets-virtuales-octubre-2009\/","title":{"rendered":"Fern\u00e1ndez, Hugo: Detecci\u00f3n y limitaciones de ataques cl\u00e1sicos con Honeynets virtuales, Octubre 2009"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"167\" class=\"elementor elementor-167\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2d7c4468 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2d7c4468\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5ea075ab\" data-id=\"5ea075ab\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-27ebe991 elementor-widget elementor-widget-text-editor\" data-id=\"27ebe991\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.6.7 - 03-07-2022 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#818a91;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#818a91;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p><strong>T\u00edtulo<\/strong>: Detecci\u00f3n y limitaciones de ataques cl\u00e1sicos con Honeynets virtuales<\/p><p><strong>Autor<\/strong>: Hugo H\u00e9ctor Fern\u00e1ndez<\/p><p><strong>Directores<\/strong>: CC. Jorge Eduardo Sznek y Lic. Eduardo Grosclaude<\/p><p><strong>Carrera<\/strong>: Licenciatura en Ciencias de la Computaci\u00f3n<\/p><p><strong>Fecha de defensa<\/strong>: 13 de Octubre de 2009<\/p><p style=\"text-align: justify;\"><strong>Resumen<\/strong><\/p><p style=\"text-align: justify;\">Las Honeynets surgen como una herramienta de seguridad dise\u00f1ada para ser sondeada, atacada y comprometida por hipot\u00e9ticos intrusos. Se componen de entornos de redes, conjuntos de aplicaciones de an\u00e1lisis y monitoreo, y dispositivos de almacenamiento de eventos. Luego de realizada la instalaci\u00f3n y configuraci\u00f3n de todos estos componentes, la Honeynet queda dispuesta para recibir ataques con la intenci\u00f3n de mantener un ambiente controlado para el estudio de los eventos ocurridos. Luego, mediante el an\u00e1lisis de esos eventos, es posible comprender los objetivos, t\u00e1cticas e intereses que tienen los atacantes para el entorno propuesto.<br \/>En el presente trabajo, se han implementado dos Honeynets virtuales con sus correspondientes\u00a0 herramientas de seguridad sobre diferentes topolog\u00edas de red, a los efectos de estudiar en cada caso un conjunto de ataques previamente seleccionado. Como resultado de la experimentaci\u00f3n, se ha logrado estudiar el impacto de cada uno de los ataques en cada una de las Honeynets desplegadas y se analiz\u00f3 lo ocurrido para finalmente proponer metodolog\u00edas de prevenci\u00f3n o mitigaci\u00f3n de las vulnerabilidades encontradas.<\/p><p><strong>Abstract<\/strong><\/p><p>Honeynets emerge as a security tool designed to be surveyed, attacked and compromised by hypothetical intruders. They consist of network environments, sets of analysis applications and monitoring as well as events storage devices. After the installation and configuration of all these components are completed, the Honeynet is ready for receiving attacks aiming to maintain a controlled environment that will allow studying the occurred events. Then, by analyzing these events, it is possible to understand the goals, tactics and interests the attackers have for the environment set.<br \/>In the present research, two virtual Honeynets have been implemented with its corresponding security tools on different network topologies in order to study a set of attacks formerly selected in each case. As a result of the experimentation, it has been possible to study the impact of every attack in each of the Honeynets deployed and to analyze the results to finally propose methods to prevent or mitigate the vulnerabilities found.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-49b3a90d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"49b3a90d\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3b4fee6c\" data-id=\"3b4fee6c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6b3e3584 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"6b3e3584\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a href=\"https:\/\/www.fi.uncoma.edu.ar\/index.php\/nuevos-lic-lcc\/\" class=\"elementor-button-link elementor-button elementor-size-sm\" role=\"button\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-text\">Ver otras tesis LCC FaI<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>T\u00edtulo: Detecci\u00f3n y limitaciones de ataques cl\u00e1sicos con Honeynets virtuales Autor: Hugo H\u00e9ctor Fern\u00e1ndez Directores: CC. Jorge Eduardo Sznek y Lic. Eduardo Grosclaude Carrera: Licenciatura en Ciencias de la Computaci\u00f3n Fecha de defensa: 13 de Octubre de 2009 Resumen Las Honeynets surgen como una herramienta de seguridad dise\u00f1ada para ser sondeada, atacada y comprometida por &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/www.fi.uncoma.edu.ar\/index.php\/nuevos-lic-lcc\/96-fernandez-deteccion-y-limitaciones-de-ataques-clasicos-con-honeynets-virtuales-octubre-2009\/\"> <span class=\"screen-reader-text\">Fern\u00e1ndez, Hugo: Detecci\u00f3n y limitaciones de ataques cl\u00e1sicos con Honeynets virtuales, Octubre 2009<\/span> Leer m\u00e1s &raquo;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-global-header-display":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":""},"categories":[14],"tags":[],"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false},"uagb_author_info":{"display_name":"ufai","author_link":"https:\/\/www.fi.uncoma.edu.ar\/index.php\/author\/ufai\/"},"uagb_comment_info":0,"uagb_excerpt":"T\u00edtulo: Detecci\u00f3n y limitaciones de ataques cl\u00e1sicos con Honeynets virtuales Autor: Hugo H\u00e9ctor Fern\u00e1ndez Directores: CC. Jorge Eduardo Sznek y Lic. Eduardo Grosclaude Carrera: Licenciatura en Ciencias de la Computaci\u00f3n Fecha de defensa: 13 de Octubre de 2009 Resumen Las Honeynets surgen como una herramienta de seguridad dise\u00f1ada para ser sondeada, atacada y comprometida por&hellip;","_links":{"self":[{"href":"https:\/\/www.fi.uncoma.edu.ar\/index.php\/wp-json\/wp\/v2\/posts\/167"}],"collection":[{"href":"https:\/\/www.fi.uncoma.edu.ar\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fi.uncoma.edu.ar\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fi.uncoma.edu.ar\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fi.uncoma.edu.ar\/index.php\/wp-json\/wp\/v2\/comments?post=167"}],"version-history":[{"count":5,"href":"https:\/\/www.fi.uncoma.edu.ar\/index.php\/wp-json\/wp\/v2\/posts\/167\/revisions"}],"predecessor-version":[{"id":9568,"href":"https:\/\/www.fi.uncoma.edu.ar\/index.php\/wp-json\/wp\/v2\/posts\/167\/revisions\/9568"}],"wp:attachment":[{"href":"https:\/\/www.fi.uncoma.edu.ar\/index.php\/wp-json\/wp\/v2\/media?parent=167"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fi.uncoma.edu.ar\/index.php\/wp-json\/wp\/v2\/categories?post=167"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fi.uncoma.edu.ar\/index.php\/wp-json\/wp\/v2\/tags?post=167"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}