dc.contributor | Loja Mora Nancy Magaly, Nancy Magaly | |
dc.creator | Jimenez Pulla, Rosa Lissette | |
dc.date.accessioned | 2019-02-13T18:35:22Z | |
dc.date.accessioned | 2022-10-21T19:37:27Z | |
dc.date.available | 2019-02-13T18:35:22Z | |
dc.date.available | 2022-10-21T19:37:27Z | |
dc.date.created | 2019-02-13T18:35:22Z | |
dc.date.issued | 2019 | |
dc.identifier | ECUAIC-2019-SIS-DE00011 | |
dc.identifier | http://repositorio.utmachala.edu.ec/handle/48000/13609 | |
dc.identifier.uri | https://repositorioslatinoamericanos.uchile.cl/handle/2250/4642208 | |
dc.description.abstract | TCP Transmission Control Protocol is a secure protocol that controls that all transmitted data are free of errors and are received in the same order in which they were sent. If there is a failure in the transmission of data, it uses mechanisms so that they are forwarded and reach their destination. The problem of this work focused on the shortcomings of the TCP protocol in the sending of datagrams from one terminal to another, given that the information is decrypted, being vulnerable to attacks of IP address spoofing, session hijacking, ARP poisoning. , among others. Due to this, two scenarios of simulation of attacks in a virtualized environment were raised using the GNS3 and VirtualBox tools to emulate the creation of virtual hosts and the design of a data network; Then we proceeded to use the Ettercap, Wireshark and Netwox tools to perform blind session seizure attacks, not blind and TCP reset. The controls were implemented at the client's host level through the modification of the ARP table and at the server level, the iptables were configured to eliminate the RST packets that enter the connection, thereby preventing the session from being closed. By implementing the control mechanisms in the network it was evident that these attacks did not affect its operation. | |
dc.language | es | |
dc.rights | https://creativecommons.org/licenses/by-nc-sa/3.0/ec/ | |
dc.rights | openAccess | |
dc.subject | ENVENENAMIENTO ARP | |
dc.subject | MECANISMO DE CONTROL | |
dc.subject | SECUESTRO DE SESION | |
dc.subject | SUPLANTACIÓN DE IP | |
dc.title | Implementación de mecanismos de control aplicables a una red que mitiguen el secuestro de sesiones en el protocolo tcp | |
dc.type | Otros | |