Publicación: Aplicación de técnicas de análisis forense en paquetes de redes domésticas sospechosos para confirmar la presencia de intrusos
| dc.contributor.author | Archila Morán, Manuel Alejandro | |
| dc.contributor.educationalvalidator | Cáceres López, Juan Pedro | |
| dc.date.accessioned | 2025-11-07T18:49:15Z | |
| dc.date.issued | 2024 | |
| dc.description | Formato PDF digital — 51 páginas — incluye gráficos, tablas y referencias bibliográficas. | |
| dc.description.abstract | Este proyecto, titulado “Aplicación de técnicas de análisis forense en paquetes de redes domésticas sospechosos para confirmar la presencia de intrusos”, aborda la creciente necesidad de proteger las redes domésticas utilizadas en entornos de teletrabajo. Se enfoca en la aplicación de técnicas avanzadas de análisis forense para detectar patrones de tráfico anómalos que podrían indicar intrusiones maliciosas. El proyecto emplea herramientas como Wireshark para inspección y visualización detallada de los paquetes capturados, así como Python y la biblioteca dpkt para procesar archivos PCAP de forma programática. La metodología incluye la detección de actividades sospechosas como beaconing, escaneo de puertos, spoofing de ARP, y exfiltración de datos. Las visualizaciones juegan un papel importante al facilitar la interpretación de los resultados mediante gráficos de tráfico por IP, solicitudes DNS, y transferencias de datos. Esta investigación subraya la relevancia de implementar medidas preventivas para mitigar vulnerabilidades en redes domésticas y fortalecer la seguridad en entornos de teletrabajo. Se documentan patrones maliciosos y se generan recomendaciones para optimizar la ciberseguridad, beneficiando tanto a individuos como a organizaciones. | spa |
| dc.description.abstract | This project, titled “Application of Forensic Analysis Techniques in Suspicious Home Network Packets to Confirm the Presence of Intruders”, investigates the forensic analysis of network traffic in home networks, focusing on those used for remote work environments. Advanced techniques are applied to detect and confirm intrusions by identifying suspicious patterns such as beaconing, port scanning, ARP spoofing, and data exfiltration. The research utilizes Wireshark for detailed inspection and visualization of captured network packets, alongside Python and the dpkt library to process PCAP files programmatically. Data visualizations assist in interpreting findings through traffic flow charts, DNS requests, and large data transfers. The results highlight the importance of implementing preventive measures to mitigate vulnerabili ties in home networks and improve intrusion detection. The study offers actionable recommendations that enhance cybersecurity, contributing valuable insights for individuals and organizations engaged in remote work. | eng |
| dc.description.degreelevel | Pregrado | |
| dc.description.degreename | Licenciado en Ingeniería en Ciencia de la Computación y Tecnologías de la Información | |
| dc.format.extent | 51 p. | |
| dc.format.mimetype | application/pdf | |
| dc.identifier.uri | https://repositorio.uvg.edu.gt/handle/123456789/6252 | |
| dc.language.iso | spa | |
| dc.publisher | Universidad del Valle de Guatemala | |
| dc.publisher.branch | Campus Central | |
| dc.publisher.faculty | Facultad de Ingeniería | |
| dc.publisher.place | Guatemala | |
| dc.publisher.program | Licenciatura en Ingeniería en Ciencia de la Computación y Tecnologías de la Información | |
| dc.relation.references | Seguridad360. (2023, Apr.) Alerta por incremento de ataques a redes domésticas en américa latina - revista seguridad 360. Accessed: 2024-03-24. [Online]. Available: https://revistaseguridad360.com/noticias/ataques-a-redes-domesticas/ | |
| dc.relation.references | Naciones Unidas. (2021, Jul.) Teletrabajo en américa latina: 23 millones de personas trabajaron desde casa durante la pandemia de COVID-19. [Online]. Available: https: //news.un.org/es/story/2021/07/1494012 | |
| dc.relation.references | C. Osborne. (2015, May) Most companies take over six months to detect da ta breaches. Accessed: 2024-05-31. [Online]. Available: https://www.zdnet.com/article/ businesses-take-over-six-months-to-detect-data-breaches/ | |
| dc.relation.references | IBM Newsroom. (2021) IBM report: Cost of a data breach hits record high during pandemic. Accessed: 2024-05-31. [Online]. Available: https://newsroom.ibm.com/ 2021-07-28-IBM-Report-Cost-of-a-Data-Breach-Hits-Record-High-During-Pandemic?wpisrc= nl_cybersecurity202 | |
| dc.relation.references | V. Anant, S. Banerjee, J. Boehm, and K. Li. (2020, Jul.) A dual cybersecurity mindset for the next normal. Accessed: 2024-05-31. [On line]. Available: https://www.mckinsey.com/capabilities/risk-and-resilience/our-insights/ a-dual-cybersecurity-mindset-for-the-next-normal | |
| dc.relation.references | I. Porcius, “The rise of telework and the struggle towards cyber security,” Fiat Iustitia, vol. 1, no. 1, pp. 148–157, 2021, [Online]. Available: https://www.ceeol.com/search/article-detail?id= 981807. | |
| dc.relation.references | M. T. Whitty, N. Moustafa, and M. Grobler, “Cybersecurity when working from home during COVID-19: considering the human factors,” Journal of Cybersecurity, vol. 10, no. 1, Jan. 2024. | |
| dc.relation.references | D. Buil-Gil, S. Kemp, S. Kuenzel, L. Coventry, S. Zakhary, D. Tilley, and J. Nicholson, “The digital harms of smart home devices: A systematic literature review,” Computers in Human Behavior, vol. 145, p. 107770, 2023. [Online]. Available: https://www.sciencedirect. com/science/article/pii/S0747563223001218 | |
| dc.relation.references | B. Knieriem, X. Zhang, P. Levine, F. Breitinger, and I. Baggili, An Overview of the Usage of Default Passwords, 01 2018, pp. 195–203. | |
| dc.relation.references | O. Soluade, “Security breaches, network exploits and vulnerabilities: A conundrum and an analysis,” International Journal of Cyber-Security and Digital Forensics, vol. 3, p | |
| dc.relation.references | B. I. Reddy and V. Srikanth, “Review on wireless security protocols (wep, wpa, wpa2 & wpa3),” International Journal of Scientific Research in Computer Science, Engineering and Information Technology, pp. 28–35, 07 2019. | |
| dc.relation.references | C. Smiliotopoulos, G. Kambourakis, and C. Kolias, “Detecting lateral movement: A systematic survey,” Heliyon, vol. 10, no. 4, p. e26317, 2024. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S240584402402348X | |
| dc.relation.references | M. Vivo, L. Ke, G. Isern, and G. Vivo, “A review of port scanning techniques,” Computer Communication Review, vol. 29, pp. 41–48, 04 1999. | |
| dc.relation.references | M. Alsharif, S. Mishra, and M. Alshehri, “Impact of human vulnerabilities on cybersecurity,” Computer Systems Science and Engineering, vol. 40, 09 2021. | |
| dc.relation.references | A. TechPark. (2023, Apr. 06) Importance of network traffic analysis. Accessed: Nov. 05, 2024. [Online]. Available: https://ai-techpark.com/importance-of-network-traffic-analysis/ | |
| dc.relation.references | R. Soepeno, “Wireshark: An effective tool for network analysis,” 09 2023. | |
| dc.relation.references | R. Das and M. Gündüz, “Analysis of cyber-attacks in IoT-based critical infrastructures,” Inter national Journal of Information Security, vol. 8, pp. 122–133, 12 2019. | |
| dc.relation.references | N. Mangrulkar, A. Bhagat Patil, and A. Pande, “Network attacks and their detection mecha nisms: A review,” International Journal of Computer Applications, vol. 90, 02 2014. | |
| dc.relation.references | E. Harmoush. (2016, Jan. 11) OSI model – practical networking. [Online]. Available: https://www.practicalnetworking.net/series/packet-traveling/osi-model/ | |
| dc.relation.references | C. Parker. (2019, Aug. 28) What is a TCP/IP packet? [Online]. Available: https: //whatismyipaddress.com/tcp-ip | |
| dc.relation.references | A. Wijayanto, I. Riadi, Y. Prayudi, and T. Sudinugraha, “Network forensics against address resolution protocol spoofing attacks using trigger, acquire, analysis, report, action method,” Register Jurnal Ilmiah Teknologi Sistem Informasi, vol. 8, pp. 156–169, 07 2022. | |
| dc.relation.references | L. F. Sikos, “Packet analysis for network forensics: A comprehensive survey,” Forensic Science International: Digital Investigation, vol. 32, p. 200892, 2020. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S1742287619302002 | |
| dc.relation.references | Y. Guo and M. Simon, “Network forensics in manet: Traffic analysis of source spoofed DoS attacks,” in 2010 Fourth International Conference on Network and System Security, 2010, pp. 128–135 | |
| dc.rights.accessrights | info:eu-repo/semantics/openAccess | |
| dc.rights.coar | http://purl.org/coar/access_right/c_abf2 | |
| dc.rights.license | Atribución-NoComercial-SinDerivadas 4.0 Internacional (CC BY-NC-ND 4.0) | |
| dc.rights.uri | https://creativecommons.org/licenses/by-nc-nd/4.0/ | |
| dc.subject.armarc | Informática | |
| dc.subject.armarc | Ciberseguridad | |
| dc.subject.armarc | Electronic evidence | |
| dc.subject.armarc | Seguridad informática | |
| dc.subject.armarc | Inteligencia artificial | |
| dc.subject.armarc | Medición de software | |
| dc.subject.armarc | Digital forensic science | |
| dc.subject.armarc | Computación flexible | |
| dc.subject.armarc | Ingeniería del software | |
| dc.subject.armarc | Computer security -- Guatemala | |
| dc.subject.armarc | Sistemas expertos (Computadores) | |
| dc.subject.armarc | Intrusion detection systems (Computer security) | |
| dc.subject.ddc | 000 - Ciencias de la computación, información y obras generales::005 - Programación, programas, datos de computación | |
| dc.subject.ocde | 2. Ingeniería y Tecnología::2B. Ingenierías Eléctrica, Electrónica e Informática | |
| dc.subject.ods | ODS 9: Industria, innovación e infraestructura. Construir infraestructuras resilientes, promover la industrialización inclusiva y sostenible y fomentar la innovación | |
| dc.title | Aplicación de técnicas de análisis forense en paquetes de redes domésticas sospechosos para confirmar la presencia de intrusos | |
| dc.title.translated | Application of forensic analysis techniques on suspicious home network packets to confirm the presence of intruders | |
| dc.type | Trabajo de grado - Pregrado | |
| dc.type.coar | http://purl.org/coar/resource_type/c_7a1f | |
| dc.type.coarversion | http://purl.org/coar/version/c_970fb48d4fbd8a85 | |
| dc.type.content | Text | |
| dc.type.driver | info:eu-repo/semantics/bachelorThesis | |
| dc.type.version | info:eu-repo/semantics/publishedVersion | |
| dc.type.visibility | Public Thesis | |
| dspace.entity.type | Publication |
