Honeypot Network Configuration through Cyberattack Patterns


Abstract:

This article analyzes the possible vulnerabilities and insecurities present in the data networks and computer systems of an academic network, implementing a technology known as Honeypot, a tool that simulates vulnerable services and applications in a trap network called Honeynet. This type of technology is known as Intrusion Detection Systems, used to monitor the events that occur in a computer system in search of intrusion attempts in the data network; all the traffic in the network analyzed, allows us to evaluate and increase computer security rules between internal and external users of the network. of data. Also in this work have been analyzed the results of the Honeypot as activities of a hacker or attacker accessing the network, from these alerts the system administrator can take preventive measures.

Año de publicación:

2019

Keywords:

  • Network security
  • HONEYPOT
  • Intrusion Detection Systems

Fuente:

scopusscopus

Tipo de documento:

Conference Object

Estado:

Acceso restringido

Áreas de conocimiento:

  • Ciencias de la computación

Áreas temáticas:

  • Ciencias de la computación
  • Criminología
  • Programación informática, programas, datos, seguridad