Use this link to cite:
http://hdl.handle.net/2183/32042 Implementación, despliegue y prueba de un honeypot para entornos industriales
Loading...
Identifiers
Publication date
Authors
Vázquez Villa, Brais
Advisors
Other responsabilities
Universidade da Coruña. Facultade de Informática
Journal Title
Bibliographic citation
Type of academic work
Academic degree
Abstract
[Resumen]: Con la evolución de los métodos de ataque empleados por los ciberdelincuentes, nace la
necesidad de fortificar los sistemas de seguridad informáticos de las organizaciones. Para ello,
no existe una mejor opción que el conocer cuales son los objetivos primordiales de los atacantes.
Por este motivo, nacen las tecnologías de engaño, que buscan permitir el acceso a sistemas
simulados con la finalidad de conocer el comportamiento de los intrusos. En este proyecto se
estudiará la estructura y funcionamiento de estas tecnologías mediante la realización de un
experimento dentro del marco industrial, experimento en el que se realiza el despliegue de un
honeypot en un entorno real mediante la utilización de tecnologías como GasPot. Adicionalmente,
es necesario el manejo de herramientas como Shodan con el propósito de realizar un
estudio previo sobre el entorno industrial seleccionado. Por último, se analizan los resultados
obtenidos llegando a la conclusión de que los ciberdelincuentes actuales atacan con frecuencia
estos sistemas, destacando Estados Unidos como la nación donde se originan la mayoría de los
ataques. Por este motivo, los sistemas industriales deben tener como prioridad la fortificación
de sus sistemas con la finalidad de defenderse de los piratas informáticos.
[Abstract]: With the evolution of attack methods used by cyber criminals, there is a need to strengthen organizations’ computer security systems. For that purpose, there is no better option than knowing the primary targets of the attackers. For this reason, deception technologies were born, which seek to allow access to simulated systems so as to know the behavior of intruders. This project explores the structure and functionality of these technologies through industrial experiments, using tools such as GasPot to set up honeypots in the real world. Additionally, in order to conduct an earlier investigation of the chosen industrial environment, it is required to employ tools like Shodan. Finally, the data are examined, leading to the conclusion that today’s attackers frequently target these systems, with the United States standing out as the nation where the majority of attacks originated. For this reason, industrial systems must prioritize system fortification in order to protect themselves from hackers.
[Abstract]: With the evolution of attack methods used by cyber criminals, there is a need to strengthen organizations’ computer security systems. For that purpose, there is no better option than knowing the primary targets of the attackers. For this reason, deception technologies were born, which seek to allow access to simulated systems so as to know the behavior of intruders. This project explores the structure and functionality of these technologies through industrial experiments, using tools such as GasPot to set up honeypots in the real world. Additionally, in order to conduct an earlier investigation of the chosen industrial environment, it is required to employ tools like Shodan. Finally, the data are examined, leading to the conclusion that today’s attackers frequently target these systems, with the United States standing out as the nation where the majority of attacks originated. For this reason, industrial systems must prioritize system fortification in order to protect themselves from hackers.
Description
Editor version
Rights
Atribución-NoComercial-SinDerivadas 3.0 España








