Configuración de una herramienta open source para la detección de intrusos en redes wifi caso de estudio: Suricata IDS.

IDS systems surge as telecommunication technology advances as do attacks on different networks, given that information has become a substantial asset in organizations and businesses, anyone connected to the Internet network is exposed to having their data collected for malicious purposes without an...

תיאור מלא

שמור ב:
מידע ביבליוגרפי
מחבר ראשי: Gutierrez Jimenez, Jimena Gabriela (author)
פורמט: bachelorThesis
שפה:spa
יצא לאור: 2019
נושאים:
גישה מקוונת:http://dspace.unl.edu.ec/jspui/handle/123456789/22835
תגים: הוספת תג
אין תגיות, היה/י הראשונ/ה לתייג את הרשומה!
תיאור
סיכום:IDS systems surge as telecommunication technology advances as do attacks on different networks, given that information has become a substantial asset in organizations and businesses, anyone connected to the Internet network is exposed to having their data collected for malicious purposes without an adequate protection system or tool, generally the information safeguard is limited to the use of antivirus and firewall although these help, they will not always be defending since some attacks and virus are out of their reach, and it is there where to select, implement and configure an IDS to contribute to the protection of information becomes necessary for those who want to add a plus to their network. The present titulation work is oriented to the implementation and configuration of a open source tool for the detection of intruders in a Wi-Fi network. A Literature Systematic Review was carried out using the methodology of Barbara A. Kitchenham, getting relevant data such as advantages, disadvantages, characteristics and common attacks detected by an IDS, concluding that the most common attacks in a WIFI network are: network scan, denial of service (DoS) and man in the middle (MiTM). A virtual testing environment was elaborated in which the design of the network (Wlan), hardware and software was established, where the tool was implemented and configured, making use of monitoring by signature detection and activating the use of an additional defense such as Suricata-update, a recently integrated option in order to optimize the process of downloading and updating the rules with which the IDS worked. The IDS engine was subjected to three attacks using kali linux operating system tools (Nmap, Metasploit and Ettercap), thus checking the functioning of the intrusion detection system by identifying the alerts issued by each threat in the network.