1. "EVALUACIÓN DEL RENDIMIENTO DE HONEYPOT EN REDES TELEMÁTICAS.".
- Author
-
Montiel, Giovanni Carlos Lorusso and Rios, Carlos E. UC
- Subjects
- *
DIGITAL technology , *CYBERTERRORISM , *SECURITY systems , *PERSONALLY identifiable information , *CLASSIFICATION - Abstract
In a globalized society, cybercrime has become a major problem, generating risks of essential information, such as passwords, personal data, among others. Not to mention, the vast sums of money that cyberattacks manage to fetch each year. This situation has taken on such a magnitude that conventional security measures are not enough to provide us with security in a digital environment. For this reason, the need arises to implement new computer protection tools, of which the "Honeypots" have stood out. The latter has become relevant, in addition to protecting, providing security; They are considered "trap" type systems that serve to observe the different behaviors of cyberattacks to later analyze the intrusion, the methods that were used. The general objective of this article is to study the active behavior of a Honeypot to later determine its performance, specify its degree of efficiency in the detection and classification of cyber-attack intruders. For this purpose, a technological methodology will be implemented, consisting of five (5) phases: diagnosis, plan design, resources, monitoring, and evaluation, as proposed by Arias (2016). A study will be carried out involving the use of a Honeypot with constant monitoring in three different types of situations that simulate a cyber-attack, at different degrees of intensity: without any attacks, attacks of less than 5 cycles per minute (light attacks), attacks greater at 10 cycles per minute (Heavy Attacks). The results obtained are highly acceptable; the honeypot obtained 95% efficiency in detecting simulated cyber-attacks with a performance of 95.4%. [ABSTRACT FROM AUTHOR]
- Published
- 2022