dc.contributorNovillo Vicuña, Johnny Paul
dc.creatorAuz Cadena, Fabiola Cecilia
dc.date.accessioned2019-02-13T15:33:28Z
dc.date.accessioned2022-10-21T19:44:39Z
dc.date.available2019-02-13T15:33:28Z
dc.date.available2022-10-21T19:44:39Z
dc.date.created2019-02-13T15:33:28Z
dc.date.issued2019
dc.identifierECUAIC-2019-SIS-DE00003
dc.identifierhttp://repositorio.utmachala.edu.ec/handle/48000/13595
dc.identifier.urihttps://repositorioslatinoamericanos.uchile.cl/handle/2250/4646200
dc.description.abstractThe Dynamic Host Configuration Protocol (DHCP) is a client-server type. The server is configured with network parameters and a range of available IP addresses to be automatically assigned to clients, which allows easy administration of the network. The server can be a victim of attacks such as non-compliance with DHCP; where a hacker uses fake MAC addresses to make requests to the server getting the IP addresses to run out and none is available to assign them to the legitimate clients of the network. Another attack is the impersonation of the DHCP server, where a false server is implemented to trick the clients and configure parameters different from those of the legitimate server and to spy on the network traffic and obtain information. The objective of this work is to identify the vulnerabilities to which the DHCP protocol is exposed, and investigate the necessary controls to be implemented to guarantee security within the network. The GNS3 tool was used to emulate the network scenario, the Kali Linux operating system where the yersinia tools operate, and ettercap to execute the attacks. Implemented controls such as port security and dhcp snooping known as DHCP inspection; checking in this way that the network is secure, the server correctly provides the configuration to the clients and that no hacker could analyze our data or all the traffic that is in the network.
dc.languagees
dc.rightshttps://creativecommons.org/licenses/by-nc-sa/3.0/ec/
dc.rightsopenAccess
dc.subjectDHCP SPOOFING
dc.subjectDHCP STARVATION
dc.subjectSEGURIDAD DE PUERTO
dc.subjectDHCP SNOOPING
dc.titleImplementación de controles en una lan para mitigar los ataques del dhcp utilizando las mejores prácticas del diseño de redes
dc.typeOtros


Este ítem pertenece a la siguiente institución