Analysis and development of improvements to a system honeypot to mitigate attacks on VoIP services

Análisis y desarrollo de mejoras a un sistema honeypot para mitigar ataques en servicios de VoIP

Koller, Juan Matías - Bísaro, Mauricio Gabriel
Detalles Bibliográficos
2015
Honeypot
Flooding
Telefonía IP
Ataques
Seguridad informática
Honeypot
Flooding
IP telephony
Attacks
Computer security
Español
Universidad de Montevideo
REDUM
http://revistas.um.edu.uy/index.php/ingenieria/article/view/342
Acceso abierto
Atribución 4.0 Internacional
_version_ 1811886514917867520
author Koller, Juan Matías
author2 Bísaro, Mauricio Gabriel
author2_role author
author_facet Koller, Juan Matías
Bísaro, Mauricio Gabriel
author_role author
collection REDUM
dc.creator.none.fl_str_mv Koller, Juan Matías
Bísaro, Mauricio Gabriel
dc.date.none.fl_str_mv 2015-11-02
dc.description.en-US.fl_txt_mv The adoption of telephone communications over IP data networks by public and private companies, implemented either by means of proprietary solutions or by free software, it was a fact over the last decae as it is today. On the other hand, it is known that there are many threats in a data network carrying IP-based services that can infringe almost any service and make it not available. In order to mitigate these threats, an attack detection and control system it is required. Acquiring a product of this type can be unaffordable for many companies, especially for state government agencies as, in general, that kind of systems are too expensive. Therefore, because of the importance of having a vulnerability detection system at a reasonable cost, it was proceeded to install and analyze the performance and operation of a honeypot3 system developed at Universidad Blas Pascal, called "Artemisa”. Such a system was sniffing on the Córdoba State Government data network, for collecting andanalyzing the attacks against IP telephony system. After some study and development, a feature for interacting with the perimetral firewall was added to the Artemisa honeypot system, providing an immediate point of defense, allowing the early and immediate blocking of flooding type attacks.
dc.description.es-ES.fl_txt_mv La adopción por parte de empresas públicas y privadas de servicios de comunicaciones telefónicas sobre redes de datos IP, ya sea a través de la implementación de soluciones propietarias o de software libre, es un hecho en esta última década. Ahora bien, se sabe que sobre una red de datos que transporta servicios basados en IP existen muchas amenazas que pueden vulnerar y volver no disponible cualquier servicio. Para mitigar estas amenazas se requiere de un sistema de detección y control de ataques de firmas especializadas en el mercado de IT. Adquirir un producto de este tipo puede resultar inaccesible para muchas empresas, sobre todo para organismos públicos estatales, por su elevado costo. Debido a la importancia de contar con un sistema de detección de vulnerabilidades de costo razonable, es que se procedió a instalar y analizar la performance y operación del sistema honeypot3 desarrollado en la Universidad Blas Pascal denominado “Artemisa4”. Este sistema se instaló en la red de datos del gobierno de Córdoba para recolectar y analizar los ataques sufridos al servicio de telefonía IP. Después de clasificar y analizar los ataques, se añadió al sistema honeypot Artemisa la funcionalidad de interactuar con el firewall de perímetro del gobierno de Córdoba,  proporcionando de esta manera un punto inmediato de defensa, permitiendo el bloqueo temprano e inmediato de los ataques del tipo flooding.
dc.format.none.fl_str_mv application/pdf
dc.identifier.none.fl_str_mv http://revistas.um.edu.uy/index.php/ingenieria/article/view/342
dc.language.iso.none.fl_str_mv spa
dc.publisher.es-ES.fl_str_mv Universidad de Montevideo
dc.relation.none.fl_str_mv http://revistas.um.edu.uy/index.php/ingenieria/article/view/342/412
dc.rights.es-ES.fl_str_mv Derechos de autor 2019 Juan Matías Koller, Mauricio Gabriel Bísaro
http://creativecommons.org/licenses/by/4.0
dc.rights.license.none.fl_str_mv Atribución 4.0 Internacional
dc.rights.none.fl_str_mv info:eu-repo/semantics/openAccess
dc.source.en-US.fl_str_mv Memoria Investigaciones en Ingeniería; No. 13 (2015); 63-78
dc.source.es-ES.fl_str_mv Memoria Investigaciones en Ingeniería; Núm. 13 (2015); 63-78
dc.source.none.fl_str_mv 2301-1106
2301-1092
reponame:REDUM
instname:Universidad de Montevideo
instacron:Universidad de Montevideo
dc.source.pt-BR.fl_str_mv Memoria Investigaciones en Ingenieria; n. 13 (2015); 63-78
dc.subject.en-US.fl_str_mv Honeypot
Flooding
IP telephony
Attacks
Computer security
dc.subject.es-ES.fl_str_mv Honeypot
Flooding
Telefonía IP
Ataques
Seguridad informática
dc.title.none.fl_str_mv Analysis and development of improvements to a system honeypot to mitigate attacks on VoIP services
Análisis y desarrollo de mejoras a un sistema honeypot para mitigar ataques en servicios de VoIP
dc.type.en-US.fl_str_mv Peer reviewed articles
dc.type.es-ES.fl_str_mv Artículos evaluados por pares
dc.type.none.fl_str_mv info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
dc.type.pt-BR.fl_str_mv Artigos revistos por pares
dc.type.version.none.fl_str_mv publishedVersion
info:eu-repo/semantics/publishedVersion
description The adoption of telephone communications over IP data networks by public and private companies, implemented either by means of proprietary solutions or by free software, it was a fact over the last decae as it is today. On the other hand, it is known that there are many threats in a data network carrying IP-based services that can infringe almost any service and make it not available. In order to mitigate these threats, an attack detection and control system it is required. Acquiring a product of this type can be unaffordable for many companies, especially for state government agencies as, in general, that kind of systems are too expensive. Therefore, because of the importance of having a vulnerability detection system at a reasonable cost, it was proceeded to install and analyze the performance and operation of a honeypot3 system developed at Universidad Blas Pascal, called "Artemisa”. Such a system was sniffing on the Córdoba State Government data network, for collecting andanalyzing the attacks against IP telephony system. After some study and development, a feature for interacting with the perimetral firewall was added to the Artemisa honeypot system, providing an immediate point of defense, allowing the early and immediate blocking of flooding type attacks.
eu_rights_str_mv openAccess
format article
id REDUM_c85d58e930bc99d05c4bb5d241e97e90
instacron_str Universidad de Montevideo
institution Universidad de Montevideo
instname_str Universidad de Montevideo
language spa
network_acronym_str REDUM
network_name_str REDUM
oai_identifier_str oai:redum.um.edu.uy:20.500.12806/2497
publishDate 2015
reponame_str REDUM
repository.mail.fl_str_mv nolascoaga@um.edu.uy
repository.name.fl_str_mv REDUM - Universidad de Montevideo
repository_id_str 10501
rights_invalid_str_mv Derechos de autor 2019 Juan Matías Koller, Mauricio Gabriel Bísaro
http://creativecommons.org/licenses/by/4.0
Atribución 4.0 Internacional
spelling Koller, Juan MatíasBísaro, Mauricio Gabriel2015-11-02http://revistas.um.edu.uy/index.php/ingenieria/article/view/342The adoption of telephone communications over IP data networks by public and private companies, implemented either by means of proprietary solutions or by free software, it was a fact over the last decae as it is today. On the other hand, it is known that there are many threats in a data network carrying IP-based services that can infringe almost any service and make it not available. In order to mitigate these threats, an attack detection and control system it is required. Acquiring a product of this type can be unaffordable for many companies, especially for state government agencies as, in general, that kind of systems are too expensive. Therefore, because of the importance of having a vulnerability detection system at a reasonable cost, it was proceeded to install and analyze the performance and operation of a honeypot3 system developed at Universidad Blas Pascal, called "Artemisa”. Such a system was sniffing on the Córdoba State Government data network, for collecting andanalyzing the attacks against IP telephony system. After some study and development, a feature for interacting with the perimetral firewall was added to the Artemisa honeypot system, providing an immediate point of defense, allowing the early and immediate blocking of flooding type attacks.La adopción por parte de empresas públicas y privadas de servicios de comunicaciones telefónicas sobre redes de datos IP, ya sea a través de la implementación de soluciones propietarias o de software libre, es un hecho en esta última década. Ahora bien, se sabe que sobre una red de datos que transporta servicios basados en IP existen muchas amenazas que pueden vulnerar y volver no disponible cualquier servicio. Para mitigar estas amenazas se requiere de un sistema de detección y control de ataques de firmas especializadas en el mercado de IT. Adquirir un producto de este tipo puede resultar inaccesible para muchas empresas, sobre todo para organismos públicos estatales, por su elevado costo. Debido a la importancia de contar con un sistema de detección de vulnerabilidades de costo razonable, es que se procedió a instalar y analizar la performance y operación del sistema honeypot3 desarrollado en la Universidad Blas Pascal denominado “Artemisa4”. Este sistema se instaló en la red de datos del gobierno de Córdoba para recolectar y analizar los ataques sufridos al servicio de telefonía IP. Después de clasificar y analizar los ataques, se añadió al sistema honeypot Artemisa la funcionalidad de interactuar con el firewall de perímetro del gobierno de Córdoba,  proporcionando de esta manera un punto inmediato de defensa, permitiendo el bloqueo temprano e inmediato de los ataques del tipo flooding.application/pdfspaUniversidad de Montevideohttp://revistas.um.edu.uy/index.php/ingenieria/article/view/342/412Derechos de autor 2019 Juan Matías Koller, Mauricio Gabriel Bísarohttp://creativecommons.org/licenses/by/4.0info:eu-repo/semantics/openAccessAtribución 4.0 InternacionalMemoria Investigaciones en Ingeniería; No. 13 (2015); 63-78Memoria Investigaciones en Ingeniería; Núm. 13 (2015); 63-78Memoria Investigaciones en Ingenieria; n. 13 (2015); 63-782301-11062301-1092reponame:REDUMinstname:Universidad de Montevideoinstacron:Universidad de MontevideoHoneypotFloodingTelefonía IPAtaquesSeguridad informáticaHoneypotFloodingIP telephonyAttacksComputer securityAnalysis and development of improvements to a system honeypot to mitigate attacks on VoIP servicesAnálisis y desarrollo de mejoras a un sistema honeypot para mitigar ataques en servicios de VoIPinfo:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionPeer reviewed articlesArtículos evaluados por paresArtigos revistos por parespublishedVersioninfo:eu-repo/semantics/publishedVersion20.500.12806/24972024-10-01 12:10:10.761oai:redum.um.edu.uy:20.500.12806/2497Universidadhttps://um.edu.uy/https://redum.um.edu.uy/oai/requestnolascoaga@um.edu.uyUruguayopendoar:105012024-10-01T15:10:10REDUM - Universidad de Montevideofalse
spellingShingle Analysis and development of improvements to a system honeypot to mitigate attacks on VoIP services
Koller, Juan Matías
Honeypot
Flooding
Telefonía IP
Ataques
Seguridad informática
Honeypot
Flooding
IP telephony
Attacks
Computer security
status_str publishedVersion
title Analysis and development of improvements to a system honeypot to mitigate attacks on VoIP services
title_full Analysis and development of improvements to a system honeypot to mitigate attacks on VoIP services
title_fullStr Analysis and development of improvements to a system honeypot to mitigate attacks on VoIP services
title_full_unstemmed Analysis and development of improvements to a system honeypot to mitigate attacks on VoIP services
title_short Analysis and development of improvements to a system honeypot to mitigate attacks on VoIP services
title_sort Analysis and development of improvements to a system honeypot to mitigate attacks on VoIP services
topic Honeypot
Flooding
Telefonía IP
Ataques
Seguridad informática
Honeypot
Flooding
IP telephony
Attacks
Computer security
url http://revistas.um.edu.uy/index.php/ingenieria/article/view/342