Analysis and development of improvements to a system honeypot to mitigate attacks on VoIP services
Análisis y desarrollo de mejoras a un sistema honeypot para mitigar ataques en servicios de VoIP
2015 | |
Honeypot Flooding Telefonía IP Ataques Seguridad informática Honeypot Flooding IP telephony Attacks Computer security |
|
Español | |
Universidad de Montevideo | |
REDUM | |
http://revistas.um.edu.uy/index.php/ingenieria/article/view/342 | |
Acceso abierto | |
Atribución 4.0 Internacional |
_version_ | 1811886514917867520 |
---|---|
author | Koller, Juan Matías |
author2 | Bísaro, Mauricio Gabriel |
author2_role | author |
author_facet | Koller, Juan Matías Bísaro, Mauricio Gabriel |
author_role | author |
collection | REDUM |
dc.creator.none.fl_str_mv | Koller, Juan Matías Bísaro, Mauricio Gabriel |
dc.date.none.fl_str_mv | 2015-11-02 |
dc.description.en-US.fl_txt_mv | The adoption of telephone communications over IP data networks by public and private companies, implemented either by means of proprietary solutions or by free software, it was a fact over the last decae as it is today. On the other hand, it is known that there are many threats in a data network carrying IP-based services that can infringe almost any service and make it not available. In order to mitigate these threats, an attack detection and control system it is required. Acquiring a product of this type can be unaffordable for many companies, especially for state government agencies as, in general, that kind of systems are too expensive. Therefore, because of the importance of having a vulnerability detection system at a reasonable cost, it was proceeded to install and analyze the performance and operation of a honeypot3 system developed at Universidad Blas Pascal, called "Artemisa”. Such a system was sniffing on the Córdoba State Government data network, for collecting andanalyzing the attacks against IP telephony system. After some study and development, a feature for interacting with the perimetral firewall was added to the Artemisa honeypot system, providing an immediate point of defense, allowing the early and immediate blocking of flooding type attacks. |
dc.description.es-ES.fl_txt_mv | La adopción por parte de empresas públicas y privadas de servicios de comunicaciones telefónicas sobre redes de datos IP, ya sea a través de la implementación de soluciones propietarias o de software libre, es un hecho en esta última década. Ahora bien, se sabe que sobre una red de datos que transporta servicios basados en IP existen muchas amenazas que pueden vulnerar y volver no disponible cualquier servicio. Para mitigar estas amenazas se requiere de un sistema de detección y control de ataques de firmas especializadas en el mercado de IT. Adquirir un producto de este tipo puede resultar inaccesible para muchas empresas, sobre todo para organismos públicos estatales, por su elevado costo. Debido a la importancia de contar con un sistema de detección de vulnerabilidades de costo razonable, es que se procedió a instalar y analizar la performance y operación del sistema honeypot3 desarrollado en la Universidad Blas Pascal denominado “Artemisa4”. Este sistema se instaló en la red de datos del gobierno de Córdoba para recolectar y analizar los ataques sufridos al servicio de telefonía IP. Después de clasificar y analizar los ataques, se añadió al sistema honeypot Artemisa la funcionalidad de interactuar con el firewall de perímetro del gobierno de Córdoba, proporcionando de esta manera un punto inmediato de defensa, permitiendo el bloqueo temprano e inmediato de los ataques del tipo flooding. |
dc.format.none.fl_str_mv | application/pdf |
dc.identifier.none.fl_str_mv | http://revistas.um.edu.uy/index.php/ingenieria/article/view/342 |
dc.language.iso.none.fl_str_mv | spa |
dc.publisher.es-ES.fl_str_mv | Universidad de Montevideo |
dc.relation.none.fl_str_mv | http://revistas.um.edu.uy/index.php/ingenieria/article/view/342/412 |
dc.rights.es-ES.fl_str_mv | Derechos de autor 2019 Juan Matías Koller, Mauricio Gabriel Bísaro http://creativecommons.org/licenses/by/4.0 |
dc.rights.license.none.fl_str_mv | Atribución 4.0 Internacional |
dc.rights.none.fl_str_mv | info:eu-repo/semantics/openAccess |
dc.source.en-US.fl_str_mv | Memoria Investigaciones en Ingeniería; No. 13 (2015); 63-78 |
dc.source.es-ES.fl_str_mv | Memoria Investigaciones en Ingeniería; Núm. 13 (2015); 63-78 |
dc.source.none.fl_str_mv | 2301-1106 2301-1092 reponame:REDUM instname:Universidad de Montevideo instacron:Universidad de Montevideo |
dc.source.pt-BR.fl_str_mv | Memoria Investigaciones en Ingenieria; n. 13 (2015); 63-78 |
dc.subject.en-US.fl_str_mv | Honeypot Flooding IP telephony Attacks Computer security |
dc.subject.es-ES.fl_str_mv | Honeypot Flooding Telefonía IP Ataques Seguridad informática |
dc.title.none.fl_str_mv | Analysis and development of improvements to a system honeypot to mitigate attacks on VoIP services Análisis y desarrollo de mejoras a un sistema honeypot para mitigar ataques en servicios de VoIP |
dc.type.en-US.fl_str_mv | Peer reviewed articles |
dc.type.es-ES.fl_str_mv | Artículos evaluados por pares |
dc.type.none.fl_str_mv | info:eu-repo/semantics/article info:eu-repo/semantics/publishedVersion |
dc.type.pt-BR.fl_str_mv | Artigos revistos por pares |
dc.type.version.none.fl_str_mv | publishedVersion info:eu-repo/semantics/publishedVersion |
description | The adoption of telephone communications over IP data networks by public and private companies, implemented either by means of proprietary solutions or by free software, it was a fact over the last decae as it is today. On the other hand, it is known that there are many threats in a data network carrying IP-based services that can infringe almost any service and make it not available. In order to mitigate these threats, an attack detection and control system it is required. Acquiring a product of this type can be unaffordable for many companies, especially for state government agencies as, in general, that kind of systems are too expensive. Therefore, because of the importance of having a vulnerability detection system at a reasonable cost, it was proceeded to install and analyze the performance and operation of a honeypot3 system developed at Universidad Blas Pascal, called "Artemisa”. Such a system was sniffing on the Córdoba State Government data network, for collecting andanalyzing the attacks against IP telephony system. After some study and development, a feature for interacting with the perimetral firewall was added to the Artemisa honeypot system, providing an immediate point of defense, allowing the early and immediate blocking of flooding type attacks. |
eu_rights_str_mv | openAccess |
format | article |
id | REDUM_c85d58e930bc99d05c4bb5d241e97e90 |
instacron_str | Universidad de Montevideo |
institution | Universidad de Montevideo |
instname_str | Universidad de Montevideo |
language | spa |
network_acronym_str | REDUM |
network_name_str | REDUM |
oai_identifier_str | oai:redum.um.edu.uy:20.500.12806/2497 |
publishDate | 2015 |
reponame_str | REDUM |
repository.mail.fl_str_mv | nolascoaga@um.edu.uy |
repository.name.fl_str_mv | REDUM - Universidad de Montevideo |
repository_id_str | 10501 |
rights_invalid_str_mv | Derechos de autor 2019 Juan Matías Koller, Mauricio Gabriel Bísaro http://creativecommons.org/licenses/by/4.0 Atribución 4.0 Internacional |
spelling | Koller, Juan MatíasBísaro, Mauricio Gabriel2015-11-02http://revistas.um.edu.uy/index.php/ingenieria/article/view/342The adoption of telephone communications over IP data networks by public and private companies, implemented either by means of proprietary solutions or by free software, it was a fact over the last decae as it is today. On the other hand, it is known that there are many threats in a data network carrying IP-based services that can infringe almost any service and make it not available. In order to mitigate these threats, an attack detection and control system it is required. Acquiring a product of this type can be unaffordable for many companies, especially for state government agencies as, in general, that kind of systems are too expensive. Therefore, because of the importance of having a vulnerability detection system at a reasonable cost, it was proceeded to install and analyze the performance and operation of a honeypot3 system developed at Universidad Blas Pascal, called "Artemisa”. Such a system was sniffing on the Córdoba State Government data network, for collecting andanalyzing the attacks against IP telephony system. After some study and development, a feature for interacting with the perimetral firewall was added to the Artemisa honeypot system, providing an immediate point of defense, allowing the early and immediate blocking of flooding type attacks.La adopción por parte de empresas públicas y privadas de servicios de comunicaciones telefónicas sobre redes de datos IP, ya sea a través de la implementación de soluciones propietarias o de software libre, es un hecho en esta última década. Ahora bien, se sabe que sobre una red de datos que transporta servicios basados en IP existen muchas amenazas que pueden vulnerar y volver no disponible cualquier servicio. Para mitigar estas amenazas se requiere de un sistema de detección y control de ataques de firmas especializadas en el mercado de IT. Adquirir un producto de este tipo puede resultar inaccesible para muchas empresas, sobre todo para organismos públicos estatales, por su elevado costo. Debido a la importancia de contar con un sistema de detección de vulnerabilidades de costo razonable, es que se procedió a instalar y analizar la performance y operación del sistema honeypot3 desarrollado en la Universidad Blas Pascal denominado “Artemisa4”. Este sistema se instaló en la red de datos del gobierno de Córdoba para recolectar y analizar los ataques sufridos al servicio de telefonía IP. Después de clasificar y analizar los ataques, se añadió al sistema honeypot Artemisa la funcionalidad de interactuar con el firewall de perímetro del gobierno de Córdoba, proporcionando de esta manera un punto inmediato de defensa, permitiendo el bloqueo temprano e inmediato de los ataques del tipo flooding.application/pdfspaUniversidad de Montevideohttp://revistas.um.edu.uy/index.php/ingenieria/article/view/342/412Derechos de autor 2019 Juan Matías Koller, Mauricio Gabriel Bísarohttp://creativecommons.org/licenses/by/4.0info:eu-repo/semantics/openAccessAtribución 4.0 InternacionalMemoria Investigaciones en Ingeniería; No. 13 (2015); 63-78Memoria Investigaciones en Ingeniería; Núm. 13 (2015); 63-78Memoria Investigaciones en Ingenieria; n. 13 (2015); 63-782301-11062301-1092reponame:REDUMinstname:Universidad de Montevideoinstacron:Universidad de MontevideoHoneypotFloodingTelefonía IPAtaquesSeguridad informáticaHoneypotFloodingIP telephonyAttacksComputer securityAnalysis and development of improvements to a system honeypot to mitigate attacks on VoIP servicesAnálisis y desarrollo de mejoras a un sistema honeypot para mitigar ataques en servicios de VoIPinfo:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionPeer reviewed articlesArtículos evaluados por paresArtigos revistos por parespublishedVersioninfo:eu-repo/semantics/publishedVersion20.500.12806/24972024-10-01 12:10:10.761oai:redum.um.edu.uy:20.500.12806/2497Universidadhttps://um.edu.uy/https://redum.um.edu.uy/oai/requestnolascoaga@um.edu.uyUruguayopendoar:105012024-10-01T15:10:10REDUM - Universidad de Montevideofalse |
spellingShingle | Analysis and development of improvements to a system honeypot to mitigate attacks on VoIP services Koller, Juan Matías Honeypot Flooding Telefonía IP Ataques Seguridad informática Honeypot Flooding IP telephony Attacks Computer security |
status_str | publishedVersion |
title | Analysis and development of improvements to a system honeypot to mitigate attacks on VoIP services |
title_full | Analysis and development of improvements to a system honeypot to mitigate attacks on VoIP services |
title_fullStr | Analysis and development of improvements to a system honeypot to mitigate attacks on VoIP services |
title_full_unstemmed | Analysis and development of improvements to a system honeypot to mitigate attacks on VoIP services |
title_short | Analysis and development of improvements to a system honeypot to mitigate attacks on VoIP services |
title_sort | Analysis and development of improvements to a system honeypot to mitigate attacks on VoIP services |
topic | Honeypot Flooding Telefonía IP Ataques Seguridad informática Honeypot Flooding IP telephony Attacks Computer security |
url | http://revistas.um.edu.uy/index.php/ingenieria/article/view/342 |