Analysis of centralized computer security systems through the alienvault ossim tool

  • Enrique Colon Ferruzola Gómez Universidad Agraria del Ecuador, Ecuador
  • Oscar Xavier Bermeo Almeida Universidad Agraria del Ecuador, Ecuador https://orcid.org/0000-0001-6261-5017
  • Lissett Margarita Arévalo Gamboa Universidad Estatal de Milagro, Ecuador

Abstract

An analysis is made on the use and effectiveness of centralized systems in computer security in order to show that with this free tool we can monitor threats, for this purpose a general study of the computer tool used to protect information called ALIENVAULT OSSIM, is open source and is focused on evaluating the vulnerabilities of information systems and intrusion detection, analyzing each of these events to be able to offer a detailed report of all monitored operations, such as collection functions, normalization and event correlation. In order to protect their data and equipment, users use SIEM (Security Information and Event Management) in network security to protect data accessible through it and that may be subject to modification, stolen or misused, as a solution and is implemented for threat management and incident response management. Fortunately, there is a way to make use of SIEM management, by implementing AlienVault's OSSIM (Open Source SIEM).

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

References

Bau, S. (2016). Kismet . https://www.kismetwireless.net/

Belliard, D. (2017). OCS Inventory NG. https://ocsinventory-ng.org/?lang=fr

Ellis, S., & Brown, M. (2018). El Método Hacking Growth. Conecta.

Foster, G. (2017). Alien Vault. https://cybersecurity.att.com/products/ossim

Franklin, B. (2018). ntop – High Performance Network Monitoring Solutions based on Open Source and Commodity Hardware. https://www.ntop.org/

Galindo, C., Mena, A., Santizo, W., Mendoza, S., & García, M. (2016). Seguridad de la Información. Guatemala. Editorial Universidad de San Carlos de Guatemala

Lizama Mendoza, J. (2015). Hackers: de piratas a defensores del software libre. Revista Mexicana de Ciencias Políticas y Sociales; Vol 45, No 185 (2002). http://www.revistas.unam.mx/index.php/rmcpys/article/view/48321

López, P. A. (2010). Seguridad informática. Editex.

Nagios. (2017). Nagios . https://www.nagios.org/

OpenVAS. (2016). OpenVAS - Open Vulnerability Assessment Scanner. https://www.openvas.org/

Perez, C., & Muñoz, A. L. (2006). Teledetección: nociones y aplicaciones. carlos perez.

Ramirez, F. (2015). ¿Podremos alcanzar la seguridad informática? . https://www.estamosenlinea.com.ve/2015/04/01/podremos-alcanzar-la-seguridad-informatica/

Snort. (2017). Snort - Network Intrusion Detection & Prevention System. https://www.snort.org/

sourceforge. (2017). sourceforge-NfSen. http://nfsen.sourceforge.net/

Urbina, G. B. (2016). Introducción a la seguridad informática. Grupo editorial PATRIA.

Published
2022-03-31
Stats
Abstract 136
PDF (Español (España)) 89
How to Cite
Ferruzola Gómez, E. C., Bermeo Almeida, O. X., & Arévalo Gamboa, L. M. (2022). Analysis of centralized computer security systems through the alienvault ossim tool. Ecuadorian Science Journal, 6(1), 23-31. https://doi.org/10.46480/esj.6.1.181
Section
Research Paper
Share |
Citation