TY - GEN
T1 - Automated Implementation of a TCPDUMP Solution for Network Traffic Analysis, Strengthening Digital Security in Cyberspace
AU - Colca-Mendoza, Jhoel
AU - Auccahuasi, Wilver
N1 - Publisher Copyright:
© 2024 IEEE.
PY - 2024
Y1 - 2024
N2 - The advance of information technology gave rise to new information and communication technologies, providing a conjunctural environment to cyberspace (Internet). This constitutes the fifth domain of human interaction and every day it extends more and more, crossing entire nations and making it possible to connect us to the whole world, breaking the paradigm of borders in record time, where at the same time it is possible to host more information and providing more and more services (in the cloud). But as a result, this new interaction space has given rise to the emergence of new threats created by individuals, organizations or states that seek to take advantage of this new virtual way of interacting. Illegal activities in this medium can have very significant effects on the victim and bring substantial benefits to the perpetrator, who often cannot be identified. That is why it is necessary to counteract any type of computer threat, being necessary to analyze network traffic using the TCPDUMP technique, which interacts within a public or private network, to identify who is trying to invade your private computer space, in order to neutralize any unauthorized access. In the present work a strategy for digital security is proposed, to avoid attacks in Cyberspace that can affect an organization today. It should be noted that for this case the implementation of a network will be carried out, which allows the connection in a secure way.
AB - The advance of information technology gave rise to new information and communication technologies, providing a conjunctural environment to cyberspace (Internet). This constitutes the fifth domain of human interaction and every day it extends more and more, crossing entire nations and making it possible to connect us to the whole world, breaking the paradigm of borders in record time, where at the same time it is possible to host more information and providing more and more services (in the cloud). But as a result, this new interaction space has given rise to the emergence of new threats created by individuals, organizations or states that seek to take advantage of this new virtual way of interacting. Illegal activities in this medium can have very significant effects on the victim and bring substantial benefits to the perpetrator, who often cannot be identified. That is why it is necessary to counteract any type of computer threat, being necessary to analyze network traffic using the TCPDUMP technique, which interacts within a public or private network, to identify who is trying to invade your private computer space, in order to neutralize any unauthorized access. In the present work a strategy for digital security is proposed, to avoid attacks in Cyberspace that can affect an organization today. It should be noted that for this case the implementation of a network will be carried out, which allows the connection in a secure way.
KW - Network
KW - attack
KW - defense
KW - information
KW - security
UR - http://www.scopus.com/inward/record.url?scp=85213397118&partnerID=8YFLogxK
U2 - 10.1109/ICSSAS64001.2024.10760421
DO - 10.1109/ICSSAS64001.2024.10760421
M3 - Contribución a la conferencia
AN - SCOPUS:85213397118
T3 - 2nd International Conference on Self Sustainable Artificial Intelligence Systems, ICSSAS 2024 - Proceedings
SP - 1212
EP - 1217
BT - 2nd International Conference on Self Sustainable Artificial Intelligence Systems, ICSSAS 2024 - Proceedings
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2nd International Conference on Self Sustainable Artificial Intelligence Systems, ICSSAS 2024
Y2 - 23 October 2024 through 25 October 2024
ER -