dc.contributorNunes, Raul Ceretta
dc.contributorhttp://lattes.cnpq.br/7947423722511295
dc.contributorTurchetti, Rogerio Correa
dc.contributorXXXXXXXXXXXXXXX
dc.contributorAmaral, Érico Marcelo Hoff do
dc.contributorXXXXXXXXXXXXXXXXXX
dc.creatorLucion, Everson Luis Rosa
dc.date.accessioned2021-04-29T20:39:08Z
dc.date.accessioned2022-10-07T23:11:41Z
dc.date.available2021-04-29T20:39:08Z
dc.date.available2022-10-07T23:11:41Z
dc.date.created2021-04-29T20:39:08Z
dc.date.issued2018-12-14
dc.identifierhttp://repositorio.ufsm.br/handle/1/20734
dc.identifier.urihttp://repositorioslatinoamericanos.uchile.cl/handle/2250/4039662
dc.description.abstractThe traditional firewall-based network perimeter model enables communication between devices before they authenticate, resulting in vulnerabilities that facilitate different types of attacks/intrusions. To mitigate this vulnerability, the Cloud Security Alliance (CSA) proposed the Software Defined Perimeter (SDP), a new approach to authenticate before the first communication occurs. In SDP, the use of Single Packet Authorization (SPA) is critical for first access to occur only after device authentication. Through the analysis of the SDP protocol there were security issues that need to be improved or addressed in the creation of the SPA. It is also observed that some vulnerabilities still persist, having seen failures in the TCP/IP model when the identity of a device is bound to its IP address. This work recommends adaptations in the SDP architecture and definition of a new pattern of creation and sending of the SPA. It was designed under modular aspects that are incorporated into the SDP architecture. In addition, they propose to include in the SPA structure a device fingerprint field, as well as present a method to construct and use the new field in order to solve the temporal gap between SPA authentication and connection for user authentication. The results demonstrate that the proposed solution fights improper access and considerably increases the degree of difficulty in detecting, replicating or reading SPA data. Through the experiments it has been demonstrated that the increase of the processing time of the new SPA and the generation of the fingerprint do not compromise the solution and are justified by the gains in the levels of protection.
dc.publisherUniversidade Federal de Santa Maria
dc.publisherBrasil
dc.publisherCiência da Computação
dc.publisherUFSM
dc.publisherPrograma de Pós-Graduação em Ciência da Computação
dc.publisherCentro de Tecnologia
dc.rightshttp://creativecommons.org/licenses/by-nc-nd/4.0/
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 International
dc.subjectPerímetro definido por software
dc.subjectAutenticação
dc.subjectAutorização por um único pacote
dc.subjectFingerprinting de dispositivo
dc.subjectSoftware defined perimeter
dc.subjectAuthentication
dc.subjectSingle packet authorization
dc.subjectDevice fingerprinting
dc.titlePerímetro definido por software: aumentando os níveis de segurança na autenticação com Single Packet Authorization e Device Fingerprinting
dc.typeDissertação


Este ítem pertenece a la siguiente institución