Please use this identifier to cite or link to this item:
http://hdl.handle.net/2445/200510
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | Roca Cánovas, Raúl | - |
dc.contributor.author | Bujaldón Devesa, Jordi | - |
dc.date.accessioned | 2023-07-11T07:00:42Z | - |
dc.date.available | 2023-07-11T07:00:42Z | - |
dc.date.issued | 2023-06-12 | - |
dc.identifier.uri | http://hdl.handle.net/2445/200510 | - |
dc.description | Treballs Finals de Grau d'Enginyeria Informàtica, Facultat de Matemàtiques, Universitat de Barcelona, Any: 2023, Director: Raúl Roca Cánovas | ca |
dc.description.abstract | [en] In this project, I have developed a system to collect, analyze, and store data on real attacks captured from different honeypots. The work has been divided into three parts: the data source (honeypots), the database, and an integration program for these two platforms. For the data source, I have used the T-Pot tool, which allows for the collection of a large volume of data of various types. Then, I installed the MISP platform, which is a specialized database for storing all kinds of incidents and threats. MISP was also installed alongside Cortex, which is a malware analyzer that detects malicious data. Once these tools were installed, I searched for a way to integrate them and make them work together. Therefore, I developed a Python program that connects to them through their respective REST API. The integration program has been developed following good code design practices and applying different design patterns. Additionally, I have ensured to implement it in the most secure way to handle user credentials. The combined work of these tools provides a solid platform for detecting, analy- zing, and responding to threats, enabling more effective management of the collected information and the different tactics used by attackers. | ca |
dc.format.extent | 52 p. | - |
dc.format.mimetype | application/pdf | - |
dc.language.iso | cat | ca |
dc.rights | memòria: cc-nc-nd (c) Jordi Bujaldón Devesa, 2023 | - |
dc.rights | codi: Apache 2.0 (c) Jordi Bujaldón Devesa, 2023 | - |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/es/l | - |
dc.rights.uri | https://www.apache.org/licenses/LICENSE-2.0 | * |
dc.source | Treballs Finals de Grau (TFG) - Enginyeria Informàtica | - |
dc.subject.classification | Seguretat informàtica | ca |
dc.subject.classification | Disseny de bases de dades | ca |
dc.subject.classification | Programari | ca |
dc.subject.classification | Treballs de fi de grau | ca |
dc.subject.classification | Seguretat de les xarxes d'ordinadors | ca |
dc.subject.other | Computer security | en |
dc.subject.other | Database design | en |
dc.subject.other | Computer software | en |
dc.subject.other | Computer network security | en |
dc.subject.other | Bachelor's theses | en |
dc.title | Generació d'intel·ligència a partir de la recopilació d'atacs informàtics | ca |
dc.type | info:eu-repo/semantics/bachelorThesis | ca |
dc.rights.accessRights | info:eu-repo/semantics/openAccess | ca |
Appears in Collections: | Programari - Treballs de l'alumnat Treballs Finals de Grau (TFG) - Enginyeria Informàtica |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
tfg_bujaldon_devesa_jordi.pdf | Memòria | 2.76 MB | Adobe PDF | View/Open |
codi.zip | Codi font | 10.64 kB | zip | View/Open |
This item is licensed under a
Creative Commons License