Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ Recolector de Cienci...arrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
versions View all 2 versions
addClaim

Seguridad en conmutadores de red y puntos de acceso. Clasificación y realización práctica de ataques

Authors: García Clavero, Javier;

Seguridad en conmutadores de red y puntos de acceso. Clasificación y realización práctica de ataques

Abstract

En un mundo cada vez más informatizado (o digitalizado), los ciberataques son cada vez más frecuentes. Es imprescindible para cualquier institución o empresa el conocerlos, analizarlos y estar preparados ante las potenciales amenazas provenientes tanto del exterior como desde el interior. Las redes de área local, pese a estar más protegidas al estar apartadas de Internet, resultan muy sensibles a los ataques. Aprovechando una brecha de seguridad — generalmente, provocada por el factor humano — los ataques a estas redes pueden ser devastadores, ya que los dispositivos se encuentran prácticamente conectados unos a otros, fomentando la propagación y/o el acceso a contenido delicado. Estos nodos normalmente suelen estar interconectados mediante conmutadores, y son la primera línea de defensa ante los ataques desde dentro de la red privada. Este proyecto se centra, precisamente, en las defensas que se pueden establecer en los conmutadores de red o puntos de acceso en el caso de redes inalámbricas. Las fortificaciones planteadas están limitadas a funcionalidades de protección a nivel de enlace (L2). Este documento recopila las vulnerabilidades de diversos protocolos, desde la capa de enlace hasta la de aplicación, y plantea escenarios donde replicar paso a paso los ataques que cumplan los requisitos previamente mencionados.

In an increasingly computerized world, cyberattacks are more and more frequent. It is essential for institutions and enterprises to know, analyse and be prepared for these threats that come from both inside and outside. Local Area Networks (LAN), despite being more protected as they are isolated from the Internet, are very fragile to attacks. Taking advantage of security breaches — generally, caused by the human factor— LAN attacks might be devastating, since devices are practically directly connected, enhancing propagation and/or access to sensitive information. These nodes are normally interconnected using switches, which are the first line of defence in LANs. This Project focuses, precisely, in defence mechanisms that can be established at switches or Access Points (APs) in wireless networks scenarios. Proposed fortifications are limited to link-layer (L2) functionality protections. This document collects the vulnerabilities of diverse protocols, from L2 to application-layer, and presents scenarios for step-by-step replication of the attacks that satisfy the aforementioned requirements.

Universidad de Sevilla. Grado en Ingeniería de las Tecnologías de Telecomunicación

Country
Spain
Related Organizations
  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average
Green