Estudio y análisis de las violaciones al protocolo IP en redes ATM
| dc.contributor.advisor | Guerrero, Cesar D. | |
| dc.contributor.apolounab | Guerrero, Cesar D. [cesar-dario-guerrero-santander] | spa |
| dc.contributor.author | Diaz Uribe, Jhon Walter | |
| dc.contributor.author | Marín Angulo, Lucia Cristina | |
| dc.contributor.author | Sanguino León, Ruth Johana | |
| dc.contributor.cvlac | Guerrero, Cesar D. [0000809357] | spa |
| dc.contributor.googlescholar | Guerrero, Cesar D. [_YgBOOcAAAAJ] | spa |
| dc.contributor.linkedin | Guerrero, Cesar D. [cguerrer] | spa |
| dc.contributor.orcid | Guerrero, Cesar D. [0000-0002-3286-6226] | spa |
| dc.contributor.researchgate | Guerrero, Cesar D. [Cesar-Guerrero-2] | spa |
| dc.contributor.scopus | Guerrero, Cesar D. [23094317500] | spa |
| dc.coverage.campus | UNAB Campus Bucaramanga | spa |
| dc.coverage.spatial | Bucaramanga (Santander, Colombia) | spa |
| dc.date.accessioned | 2024-08-27T19:56:01Z | |
| dc.date.available | 2024-08-27T19:56:01Z | |
| dc.date.issued | 1998 | |
| dc.degree.name | Ingeniero de Sistemas | spa |
| dc.description.abstract | Una de las necesidades más apremiantes del mundo de hoy es la rapidez en la transferencia de información de todo tipo (datos, vídeo, sonido), ante ello, las organizaciones han actualizado su estructura interna implementando redes de alta velocidad, como ATM, por medio de las cuales las grandes empresas envían información confidencial tal como números de tarjetas de crédito, transacciones financieras, archivos médicos etc., que son de vital importancia para ellas. Esta necesidad de enviar información tan valiosa las lleva a conectar sus redes privadas a redes públicas, lo cual implica que pueden ser accesadas y violadas; esto trae como consecuencia la pérdida de la información y daños internos de los sistemas comprometidos. | spa |
| dc.description.abstractenglish | One of the most pressing needs in today's world is the speed of transfer of information of all kinds (data, video, sound). In response, organizations have updated their internal structure by implementing high-speed networks, such as ATM, through which large companies send confidential information such as credit card numbers, financial transactions, medical records, etc., which are of vital importance to them. This need to send such valuable information leads them to connect their private networks to public networks, which implies that they can be accessed and violated; this results in the loss of information and internal damage to the compromised systems. | spa |
| dc.description.degreelevel | Pregrado | spa |
| dc.description.learningmodality | Modalidad Presencial | spa |
| dc.description.tableofcontents | INTRODUCCION ATM (MODO DE TRANSFERENCIA ASINCRONA) PROTOCOLO INTERNET (IP) IP SOBRE ATM SEGURIDAD EN REDES SPOOFING Y SNIFFING SOLUCIONES A LOS MECANISMOS DE ATAQUE CONCLUSIONES ACRONIMOS BIBLIOGRAFIA | spa |
| dc.format.mimetype | application/pdf | spa |
| dc.identifier.instname | instname:Universidad Autónoma de Bucaramanga - UNAB | spa |
| dc.identifier.reponame | reponame:Repositorio Institucional UNAB | spa |
| dc.identifier.repourl | repourl:https://repository.unab.edu.co | spa |
| dc.identifier.uri | http://hdl.handle.net/20.500.12749/26266 | |
| dc.language.iso | spa | spa |
| dc.publisher.faculty | Facultad Ingeniería | spa |
| dc.publisher.grantor | Universidad Autónoma de Bucaramanga UNAB | spa |
| dc.publisher.program | Pregrado Ingeniería de Sistemas | spa |
| dc.relation.references | AICRAG, Seguridad en Redes Corporativas, http://www.dcc.uchile.cl/-¡piquer/extension/informatica/atmip/atmip.html, 1996. | spa |
| dc.relation.references | ANTONELLI, Eduardo, IP Spoofing, http//www.penta.ufrgs.br/gereseg/unIp/t24home.htm, 1996. | spa |
| dc.relation.references | BLACK, Uyless. ATM Foundation for broadband Networks. New Jersey: Prentice Hall, 1995. 40-58, 98-135, 137-180 p. | spa |
| dc.relation.references | CAPORALI, Javier, Sniffer, http://www.penta.ufrgs.br/gereseg/unlp/t19home.htmi, 1996. | spa |
| dc.relation.references | CERT Advisory, IP Spoofing Attacks and Hijacked Terminal Connections, http://www.cs.berkeley.edu/-daw/cert-adv.txt, 1995, | spa |
| dc.relation.references | CERT dfn, Securing “Classical IP over ATM Networks”, http://cert. dfn.de/eng/team/cb/eng_natm/node2.html. | spa |
| dc.relation.references | CERT, IP Spoofing Attacks and Hijacked Terminal connects, ftp://info.cert.org/pub/cert_advisories/CA-95%3A01.IP.sp, 1995. | spa |
| dc.relation.references | CHUANG, Shaw Cheng, Securing ATM Networks, ftp://ftp.cl.ac.uk/public/papers/ATMl/docs-95-10/12.ps.gz, 1995. | spa |
| dc.relation.references | COMER, Douglas E. Internetworking with TCP/IP: vol. 1. New Jersey: Prentice Hall, 1995. 303-320 p. | spa |
| dc.relation.references | CORTEZON, Conrado, PEREZ, Francisco José, Tecnología ATM, — http://a01- unix.gsyc.inf.uc3m.es/ %7Efperez /1r09798/nivel, 1998, | spa |
| dc.relation.references | DE LA TORRE, Manuel, SNNIFERS, http: 1/ www.¡a.com.mx/manuel/sec/snnifer.html, 1998. | spa |
| dc.relation.references | ETCHEVERRY, Javier, PORRO, Sebastian, Seguridad en INTERNET, http://www.nuia.com.ar/nuia44/SEGURIDAD, html, 1998. | spa |
| dc.relation.references | GINSBURG, David. ATM Solutions for enterprise interworking. Londres: Addison Wesley Longman Limited, 1996. 35-83, 203-209 p. | spa |
| dc.relation.references | GORDO SAEZ, Roberto, IP(Internet Protocol) Versión 4, http://www. geocities.com/Silicon Valley/Bay/8259/parte2.html, 1998. | spa |
| dc.relation.references | Network Working Group, Defending Against Sequence Number Attacks, http://sunsite.auc.dk/RFC/rfc/rfc1948.html, 1996. | spa |
| dc.relation.references | Network Working Group, Hewlwtt-Packard Laboratories, Classical IP and ARP over ATM, http:/finfo.internet.isi.edu:80/in-notes/ric/files/rfc1577.txt, 1994 | spa |
| dc.relation.references | PARKER, Timothy. Aprendiendo TCP/IP en 14 días. México: Prentice Hall, 1995. 64-71 p. | spa |
| dc.relation.references | Phrack Magazine, Guild Productions, IP Spoofing Demystified, http://www.fc.net/prhrack/files/p48/p48-14.html, 1996. | spa |
| dc.relation.references | STALLINGS, William. Network and Internetwork Security. New Jersey: Prentice Hall, 1995. 1-18, 21-68 p. | spa |
| dc.relation.uriapolo | https://apolo.unab.edu.co/en/persons/cesar-dario-guerrero-santander | spa |
| dc.rights.accessrights | info:eu-repo/semantics/openAccess | spa |
| dc.rights.creativecommons | Atribución-NoComercial-SinDerivadas 2.5 Colombia | * |
| dc.rights.local | Abierto (Texto Completo) | spa |
| dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/2.5/co/ | * |
| dc.subject.keywords | Systems engineer | spa |
| dc.subject.keywords | Technological innovations | spa |
| dc.subject.keywords | Asynchronous transfer mode | spa |
| dc.subject.keywords | Internet protocol | spa |
| dc.subject.keywords | Network Security | spa |
| dc.subject.keywords | Computer networks | spa |
| dc.subject.keywords | Computer network protocols | spa |
| dc.subject.keywords | Software development | spa |
| dc.subject.lemb | Ingeniería de sistemas | spa |
| dc.subject.lemb | Innovaciones tecnológicas | spa |
| dc.subject.lemb | Redes de computadores | spa |
| dc.subject.lemb | Protocolos de redes de computadores | spa |
| dc.subject.lemb | Desarrollo de software | spa |
| dc.subject.proposal | Modo de transferencia asíncrona | spa |
| dc.subject.proposal | Protocolo internet | spa |
| dc.subject.proposal | Seguridad en redes | spa |
| dc.title | Estudio y análisis de las violaciones al protocolo IP en redes ATM | spa |
| dc.title.translated | Study and analysis of IP protocol violations in ATM networks | spa |
| dc.type.coar | http://purl.org/coar/resource_type/c_7a1f | |
| dc.type.coarversion | http://purl.org/coar/version/c_ab4af688f83e57aa | spa |
| dc.type.driver | info:eu-repo/semantics/bachelorThesis | |
| dc.type.hasversion | info:eu-repo/semantics/acceptedVersion | |
| dc.type.local | Trabajo de Grado | spa |
| dc.type.redcol | http://purl.org/redcol/resource_type/TP |
Archivos
Bloque original
1 - 1 de 1
Cargando...
- Nombre:
- 1998_Diaz_Uribe_Jhon.pdf
- Tamaño:
- 16.36 MB
- Formato:
- Adobe Portable Document Format
- Descripción:
- Tesis
Bloque de licencias
1 - 1 de 1
Cargando...
- Nombre:
- license.txt
- Tamaño:
- 829 B
- Formato:
- Item-specific license agreed upon to submission
- Descripción:
