Main Article Content

Authors

This article is the result of the work developed for the design and implementation of Honeypots as a complementary alternative to the existing computer security scheme at Universidad Distrital Francisco José de Caldas as a project that also contributes to the analysis and detection of attacks to the network security and the elements of computer type in the institution.
For the development of this article, we worked using the PDCA cycle (Plan - Do - Check - Act). It is a model based
on process management and continuous improvement of them, with a simple application and used properly, can help
a lot in the realization of activities, both productive and administrative, in a more organized and effective way.
Therefore, adopting the PDCA cycle provides a simple guide for the management of activities and processes, the
basic structure of a system and it is applicable to any organization. After the implementation of Cowrie and HoneyPy, it was possible to identify different patterns and ways to attack, guiding the configuration of a script in the IDS (Intrusion Detection System) server, allowing with the stored logs to create rules and implement it over Iptables. This fact allows become the IDS Server a node into a network of sensors feeding the database globally for an investigation of the attacks on all connected and configured computers, obtaining information to make a major analysis for the final user.
The design of infrastructure with honeypots, implemented at the District University Francisco José de Caldas allows
finding security failures belonging to university's servers due to computing attacks. A new network distribution was
designed for registering information about the different attacks and enabling effective solutions to be apply to the
university.

1.
Leguizamón Páez MA, Bonilla-Díaz MA, León-Cuervo CA. Analysis of computer attacks through Honeypots in the District University Francisco José de Caldas. inycomp [Internet]. 2020 Jul. 1 [cited 2024 Nov. 18];22(2):1-13. Available from: https://revistaingenieria.univalle.edu.co/index.php/ingenieria_y_competitividad/article/view/8483

(1) Mora PA. Seguridad informática – Honeypots [master’s thesis]. Pichincha: Universidad de las Fuerzas Armadas de Ecuador ESPE; 2008.

(2) La norma ISO 9001-2015 ¿En que se basa el ciclo PHVA? [Internet]. Bogotá: ISOTools Excellence Colombia; 2017 [Consulted 2018 Nov 14]. Available in: https://www.isotools.com.co/la-norma-iso-9001-2015-se-basa-ciclo-phva/.

(3) El ciclo PHVA Planear – Hacer – Verificar – Actuar [Internet]. Blog – Top Punto Com; 2007 [Consulted 2018 Nov 14]. Available in: http://www.blog-top.com/el-ciclo-phva-planear-hacer-verificar-actuar/.

(4) Sedes Universidad Distrital Francisco José de Caldas [Internet]. Bogotá: 2017. Universidad Distrital Francisco José de Caldas. [Consulted 2018 Nov 14]. Available in: http://www.udistrital.edu.co/sedes.

(5) Red de datos UDNET [Internet]. Bogotá: 2018. Universidad Distrital Francisco José de Caldas. [Consulted 2018 Nov 14]. Available in: http://udnet.udistrital.edu.co:8080/documents/11177/457497/topologia+red+2017.

(6) BBC Mundo. “12 ataques por segundo”: cuáles son los países de América Latina más amenazados por "malware" [Internet]. BBC. 6 Sept 2016. [Consulted 2018 Nov 20]. Available in: http://www.bbc.com/mundo/noticias-37286420.

(7) Gómez A. Seguridad en equipos informáticos. 1st Ed. Madrid: RA-MA, S.A; 2014.

(8) León H. Ingeniería Telemática, nueva carrera del ICESI. [Internet]. El Tiempo. 9 Mar 1998. [Consulted 2018 Nov 27]. Available from: http://www.eltiempo.com/archivo/documento/MAM-780886.

(9) Baumann R. Plattner C. White paper: Honeypot [Internet] 2002. [Consulted 2018 Nov 27]. Available in: https://pdfs.semanticscholar.org/ab89/78bb9b0fe61820d8b2f2a06bd4f3ac746128.pdf.

(10) Informe de Gestión por Resultados [Internet]. Bogotá: Oficina asesora de planeación y control - Universidad Distrital Francisco José de Caldas; 2012. [Consulted 2018 Nov 27]. Available in: http://comunidad.udistrital.edu.co/jruiz/files/2015/07/Informe-de-Gesti%C2%A2n-por-Resultados-2012.pdf.

(11) Castillo P. Despliegue de honeypots de forma ágil y económica con SmartHive [Internet blog]. SecurityInside. 2016 [Consulted 2018 Dec 03]. Available in: https://securityinside.info/despliegue-de-honeypots-con-smarthive/.

(12) Welcome to HoneyPy Docs! [Internet]. 2017. [Consulted 2018 Nov 27]. Available in: https://honeypy.readthedocs.io/en/latest/?badge=latest.