Honeypot Network Configuration through Cyberattack Patterns
Abstract:
This article analyzes the possible vulnerabilities and insecurities present in the data networks and computer systems of an academic network, implementing a technology known as Honeypot, a tool that simulates vulnerable services and applications in a trap network called Honeynet. This type of technology is known as Intrusion Detection Systems, used to monitor the events that occur in a computer system in search of intrusion attempts in the data network; all the traffic in the network analyzed, allows us to evaluate and increase computer security rules between internal and external users of the network. of data. Also in this work have been analyzed the results of the Honeypot as activities of a hacker or attacker accessing the network, from these alerts the system administrator can take preventive measures.
Año de publicación:
2019
Keywords:
- Network security
- HONEYPOT
- Intrusion Detection Systems
Fuente:
Tipo de documento:
Conference Object
Estado:
Acceso restringido
Áreas de conocimiento:
- Ciencias de la computación
Áreas temáticas:
- Ciencias de la computación
- Criminología
- Programación informática, programas, datos, seguridad