dc.contributor | Pérez Estévez, Ernesto | |
dc.contributor | Altamirano Santillán, Edwin Vinicio | |
dc.contributor | Macas Espinosa, Vinicio Javier | |
dc.creator | Guajala Cajiao, Edwin Fabricio | |
dc.date.accessioned | 2018-03-14T13:34:33Z | |
dc.date.accessioned | 2022-10-20T19:10:36Z | |
dc.date.available | 2018-03-14T13:34:33Z | |
dc.date.available | 2022-10-20T19:10:36Z | |
dc.date.created | 2018-03-14T13:34:33Z | |
dc.date.issued | 2018-02 | |
dc.identifier | Guajala Cajiao, Edwin Fabricio . (2018). Método para la detección y prevención de ataques web mediante la parametrización de un proxy reverso basado en software libre. Escuela Superior Politécnica de Chimborazo. Riobamba. | |
dc.identifier | http://dspace.espoch.edu.ec/handle/123456789/8110 | |
dc.identifier.uri | https://repositorioslatinoamericanos.uchile.cl/handle/2250/4586501 | |
dc.description.abstract | The aim was to propose a method to detect and prevent the more common web attacks
through parameterizing directives and rules on a web server to function as a reverse proxy based
on free software. The infrastructures used as a reverse proxy were; Apache+Mod_Security,
Nginx+Naxsi and Hiawatha, these have characteristics of security that were studied, analysed
and validated through laboratory tests in different scenarios. When comparing the three
protected infrastructures, it was observed that the Apache+Mood_security tool is the one that
offers a greater capacity of detection and prevention to the types of web attacks carried out such
as; SQLi, XSS, brute force, command injection, CSRF, among others, since it detected the 90%
of the attacks and neutralized the 80% of them. Unlike the Nginx+Naxsi tool detects and
corrects 60% of attacks and Hiawatha that does so in 70% of cases. It was concluded that the
reverse proxy was based on infrastructure Apache+Mod_security provided greater benefits for
the detection and prevention of the most critical risks in web applications according to the top
10 of the OWASP principle, therefore, it was created a package that contains the
parameterization of the mentioned tool based on free software, and thus provide to the computer
security immersed staff a method that serves to improve the defence of dynamic sites against
web attacks. The use of the reverse proxy is recommended as complementary security, but not
as a main security in front of a web application. The main security must be approached in the
development phase of a web application. | |
dc.language | spa | |
dc.publisher | Escuela Superior Politécnica de Chimborazo | |
dc.relation | UDCTIPEC;20T00980 | |
dc.rights | https://creativecommons.org.//licenses/by-nc-sa/3.0/ec/ | |
dc.rights | info:eu-repo/semantics/openAccess | |
dc.subject | TECNOLOGÍA Y CIENCIAS DE LA INGENIERÍA | |
dc.subject | SEGURIDAD TELEMÁTICA | |
dc.subject | APLICACIONES WEB | |
dc.subject | PROXY REVERSO | |
dc.subject | ATAQUES WEB | |
dc.title | Método para la detección y prevención de ataques web mediante la parametrización de un proxy reverso basado en software libre. | |
dc.type | Tesis | |