Please use this identifier to cite or link to this item: http://hdl.handle.net/2445/200510
Full metadata record
DC FieldValueLanguage
dc.contributor.advisorRoca Cánovas, Raúl-
dc.contributor.authorBujaldón Devesa, Jordi-
dc.date.accessioned2023-07-11T07:00:42Z-
dc.date.available2023-07-11T07:00:42Z-
dc.date.issued2023-06-12-
dc.identifier.urihttp://hdl.handle.net/2445/200510-
dc.descriptionTreballs Finals de Grau d'Enginyeria Informàtica, Facultat de Matemàtiques, Universitat de Barcelona, Any: 2023, Director: Raúl Roca Cánovasca
dc.description.abstract[en] In this project, I have developed a system to collect, analyze, and store data on real attacks captured from different honeypots. The work has been divided into three parts: the data source (honeypots), the database, and an integration program for these two platforms. For the data source, I have used the T-Pot tool, which allows for the collection of a large volume of data of various types. Then, I installed the MISP platform, which is a specialized database for storing all kinds of incidents and threats. MISP was also installed alongside Cortex, which is a malware analyzer that detects malicious data. Once these tools were installed, I searched for a way to integrate them and make them work together. Therefore, I developed a Python program that connects to them through their respective REST API. The integration program has been developed following good code design practices and applying different design patterns. Additionally, I have ensured to implement it in the most secure way to handle user credentials. The combined work of these tools provides a solid platform for detecting, analy- zing, and responding to threats, enabling more effective management of the collected information and the different tactics used by attackers.ca
dc.format.extent52 p.-
dc.format.mimetypeapplication/pdf-
dc.language.isocatca
dc.rightsmemòria: cc-nc-nd (c) Jordi Bujaldón Devesa, 2023-
dc.rightscodi: Apache 2.0 (c) Jordi Bujaldón Devesa, 2023-
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/es/l-
dc.rights.urihttps://www.apache.org/licenses/LICENSE-2.0*
dc.sourceTreballs Finals de Grau (TFG) - Enginyeria Informàtica-
dc.subject.classificationSeguretat informàticaca
dc.subject.classificationDisseny de bases de dadesca
dc.subject.classificationProgramarica
dc.subject.classificationTreballs de fi de grauca
dc.subject.classificationSeguretat de les xarxes d'ordinadorsca
dc.subject.otherComputer securityen
dc.subject.otherDatabase designen
dc.subject.otherComputer softwareen
dc.subject.otherComputer network securityen
dc.subject.otherBachelor's thesesen
dc.titleGeneració d'intel·ligència a partir de la recopilació d'atacs informàticsca
dc.typeinfo:eu-repo/semantics/bachelorThesisca
dc.rights.accessRightsinfo:eu-repo/semantics/openAccessca
Appears in Collections:Programari - Treballs de l'alumnat
Treballs Finals de Grau (TFG) - Enginyeria Informàtica

Files in This Item:
File Description SizeFormat 
tfg_bujaldon_devesa_jordi.pdfMemòria2.76 MBAdobe PDFView/Open
codi.zipCodi font10.64 kBzipView/Open


This item is licensed under a Creative Commons License Creative Commons