Publicación:
Aplicación de técnicas de análisis forense en paquetes de redes domésticas sospechosos para confirmar la presencia de intrusos

dc.contributor.authorArchila Morán, Manuel Alejandro
dc.contributor.educationalvalidatorCáceres López, Juan Pedro
dc.date.accessioned2025-11-07T18:49:15Z
dc.date.issued2024
dc.descriptionFormato PDF digital — 51 páginas — incluye gráficos, tablas y referencias bibliográficas.
dc.description.abstractEste proyecto, titulado “Aplicación de técnicas de análisis forense en paquetes de redes domésticas sospechosos para confirmar la presencia de intrusos”, aborda la creciente necesidad de proteger las redes domésticas utilizadas en entornos de teletrabajo. Se enfoca en la aplicación de técnicas avanzadas de análisis forense para detectar patrones de tráfico anómalos que podrían indicar intrusiones maliciosas. El proyecto emplea herramientas como Wireshark para inspección y visualización detallada de los paquetes capturados, así como Python y la biblioteca dpkt para procesar archivos PCAP de forma programática. La metodología incluye la detección de actividades sospechosas como beaconing, escaneo de puertos, spoofing de ARP, y exfiltración de datos. Las visualizaciones juegan un papel importante al facilitar la interpretación de los resultados mediante gráficos de tráfico por IP, solicitudes DNS, y transferencias de datos. Esta investigación subraya la relevancia de implementar medidas preventivas para mitigar vulnerabilidades en redes domésticas y fortalecer la seguridad en entornos de teletrabajo. Se documentan patrones maliciosos y se generan recomendaciones para optimizar la ciberseguridad, beneficiando tanto a individuos como a organizaciones.spa
dc.description.abstractThis project, titled “Application of Forensic Analysis Techniques in Suspicious Home Network Packets to Confirm the Presence of Intruders”, investigates the forensic analysis of network traffic in home networks, focusing on those used for remote work environments. Advanced techniques are applied to detect and confirm intrusions by identifying suspicious patterns such as beaconing, port scanning, ARP spoofing, and data exfiltration. The research utilizes Wireshark for detailed inspection and visualization of captured network packets, alongside Python and the dpkt library to process PCAP files programmatically. Data visualizations assist in interpreting findings through traffic flow charts, DNS requests, and large data transfers. The results highlight the importance of implementing preventive measures to mitigate vulnerabili ties in home networks and improve intrusion detection. The study offers actionable recommendations that enhance cybersecurity, contributing valuable insights for individuals and organizations engaged in remote work.eng
dc.description.degreelevelPregrado
dc.description.degreenameLicenciado en Ingeniería en Ciencia de la Computación y Tecnologías de la Información
dc.format.extent51 p.
dc.format.mimetypeapplication/pdf
dc.identifier.urihttps://repositorio.uvg.edu.gt/handle/123456789/6252
dc.language.isospa
dc.publisherUniversidad del Valle de Guatemala
dc.publisher.branchCampus Central
dc.publisher.facultyFacultad de Ingeniería
dc.publisher.placeGuatemala
dc.publisher.programLicenciatura en Ingeniería en Ciencia de la Computación y Tecnologías de la Información
dc.relation.referencesSeguridad360. (2023, Apr.) Alerta por incremento de ataques a redes domésticas en américa latina - revista seguridad 360. Accessed: 2024-03-24. [Online]. Available: https://revistaseguridad360.com/noticias/ataques-a-redes-domesticas/
dc.relation.referencesNaciones Unidas. (2021, Jul.) Teletrabajo en américa latina: 23 millones de personas trabajaron desde casa durante la pandemia de COVID-19. [Online]. Available: https: //news.un.org/es/story/2021/07/1494012
dc.relation.referencesC. Osborne. (2015, May) Most companies take over six months to detect da ta breaches. Accessed: 2024-05-31. [Online]. Available: https://www.zdnet.com/article/ businesses-take-over-six-months-to-detect-data-breaches/
dc.relation.referencesIBM Newsroom. (2021) IBM report: Cost of a data breach hits record high during pandemic. Accessed: 2024-05-31. [Online]. Available: https://newsroom.ibm.com/ 2021-07-28-IBM-Report-Cost-of-a-Data-Breach-Hits-Record-High-During-Pandemic?wpisrc= nl_cybersecurity202
dc.relation.referencesV. Anant, S. Banerjee, J. Boehm, and K. Li. (2020, Jul.) A dual cybersecurity mindset for the next normal. Accessed: 2024-05-31. [On line]. Available: https://www.mckinsey.com/capabilities/risk-and-resilience/our-insights/ a-dual-cybersecurity-mindset-for-the-next-normal
dc.relation.referencesI. Porcius, “The rise of telework and the struggle towards cyber security,” Fiat Iustitia, vol. 1, no. 1, pp. 148–157, 2021, [Online]. Available: https://www.ceeol.com/search/article-detail?id= 981807.
dc.relation.referencesM. T. Whitty, N. Moustafa, and M. Grobler, “Cybersecurity when working from home during COVID-19: considering the human factors,” Journal of Cybersecurity, vol. 10, no. 1, Jan. 2024.
dc.relation.referencesD. Buil-Gil, S. Kemp, S. Kuenzel, L. Coventry, S. Zakhary, D. Tilley, and J. Nicholson, “The digital harms of smart home devices: A systematic literature review,” Computers in Human Behavior, vol. 145, p. 107770, 2023. [Online]. Available: https://www.sciencedirect. com/science/article/pii/S0747563223001218
dc.relation.referencesB. Knieriem, X. Zhang, P. Levine, F. Breitinger, and I. Baggili, An Overview of the Usage of Default Passwords, 01 2018, pp. 195–203.
dc.relation.referencesO. Soluade, “Security breaches, network exploits and vulnerabilities: A conundrum and an analysis,” International Journal of Cyber-Security and Digital Forensics, vol. 3, p
dc.relation.referencesB. I. Reddy and V. Srikanth, “Review on wireless security protocols (wep, wpa, wpa2 & wpa3),” International Journal of Scientific Research in Computer Science, Engineering and Information Technology, pp. 28–35, 07 2019.
dc.relation.referencesC. Smiliotopoulos, G. Kambourakis, and C. Kolias, “Detecting lateral movement: A systematic survey,” Heliyon, vol. 10, no. 4, p. e26317, 2024. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S240584402402348X
dc.relation.referencesM. Vivo, L. Ke, G. Isern, and G. Vivo, “A review of port scanning techniques,” Computer Communication Review, vol. 29, pp. 41–48, 04 1999.
dc.relation.referencesM. Alsharif, S. Mishra, and M. Alshehri, “Impact of human vulnerabilities on cybersecurity,” Computer Systems Science and Engineering, vol. 40, 09 2021.
dc.relation.referencesA. TechPark. (2023, Apr. 06) Importance of network traffic analysis. Accessed: Nov. 05, 2024. [Online]. Available: https://ai-techpark.com/importance-of-network-traffic-analysis/
dc.relation.referencesR. Soepeno, “Wireshark: An effective tool for network analysis,” 09 2023.
dc.relation.referencesR. Das and M. Gündüz, “Analysis of cyber-attacks in IoT-based critical infrastructures,” Inter national Journal of Information Security, vol. 8, pp. 122–133, 12 2019.
dc.relation.referencesN. Mangrulkar, A. Bhagat Patil, and A. Pande, “Network attacks and their detection mecha nisms: A review,” International Journal of Computer Applications, vol. 90, 02 2014.
dc.relation.referencesE. Harmoush. (2016, Jan. 11) OSI model – practical networking. [Online]. Available: https://www.practicalnetworking.net/series/packet-traveling/osi-model/
dc.relation.referencesC. Parker. (2019, Aug. 28) What is a TCP/IP packet? [Online]. Available: https: //whatismyipaddress.com/tcp-ip
dc.relation.referencesA. Wijayanto, I. Riadi, Y. Prayudi, and T. Sudinugraha, “Network forensics against address resolution protocol spoofing attacks using trigger, acquire, analysis, report, action method,” Register Jurnal Ilmiah Teknologi Sistem Informasi, vol. 8, pp. 156–169, 07 2022.
dc.relation.referencesL. F. Sikos, “Packet analysis for network forensics: A comprehensive survey,” Forensic Science International: Digital Investigation, vol. 32, p. 200892, 2020. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S1742287619302002
dc.relation.referencesY. Guo and M. Simon, “Network forensics in manet: Traffic analysis of source spoofed DoS attacks,” in 2010 Fourth International Conference on Network and System Security, 2010, pp. 128–135
dc.rights.accessrightsinfo:eu-repo/semantics/openAccess
dc.rights.coarhttp://purl.org/coar/access_right/c_abf2
dc.rights.licenseAtribución-NoComercial-SinDerivadas 4.0 Internacional (CC BY-NC-ND 4.0)
dc.rights.urihttps://creativecommons.org/licenses/by-nc-nd/4.0/
dc.subject.armarcInformática
dc.subject.armarcCiberseguridad
dc.subject.armarcElectronic evidence
dc.subject.armarcSeguridad informática
dc.subject.armarcInteligencia artificial
dc.subject.armarcMedición de software
dc.subject.armarcDigital forensic science
dc.subject.armarcComputación flexible
dc.subject.armarcIngeniería del software
dc.subject.armarcComputer security -- Guatemala
dc.subject.armarcSistemas expertos (Computadores)
dc.subject.armarcIntrusion detection systems (Computer security)
dc.subject.ddc000 - Ciencias de la computación, información y obras generales::005 - Programación, programas, datos de computación
dc.subject.ocde2. Ingeniería y Tecnología::2B. Ingenierías Eléctrica, Electrónica e Informática
dc.subject.odsODS 9: Industria, innovación e infraestructura. Construir infraestructuras resilientes, promover la industrialización inclusiva y sostenible y fomentar la innovación
dc.titleAplicación de técnicas de análisis forense en paquetes de redes domésticas sospechosos para confirmar la presencia de intrusos
dc.title.translatedApplication of forensic analysis techniques on suspicious home network packets to confirm the presence of intruders
dc.typeTrabajo de grado - Pregrado
dc.type.coarhttp://purl.org/coar/resource_type/c_7a1f
dc.type.coarversionhttp://purl.org/coar/version/c_970fb48d4fbd8a85
dc.type.contentText
dc.type.driverinfo:eu-repo/semantics/bachelorThesis
dc.type.versioninfo:eu-repo/semantics/publishedVersion
dc.type.visibilityPublic Thesis
dspace.entity.typePublication

Archivos

Bloque original

Mostrando 1 - 1 de 1
Cargando...
Miniatura
Nombre:
Manuel Alejandro Archila Morán.pdf
Tamaño:
2.17 MB
Formato:
Adobe Portable Document Format

Bloque de licencias

Mostrando 1 - 1 de 1
Cargando...
Miniatura
Nombre:
license.txt
Tamaño:
14.49 KB
Formato:
Item-specific license agreed upon to submission
Descripción: