Analysis of centralized computer security systems through the alienvault ossim tool
Abstract
An analysis is made on the use and effectiveness of centralized systems in computer security in order to show that with this free tool we can monitor threats, for this purpose a general study of the computer tool used to protect information called ALIENVAULT OSSIM, is open source and is focused on evaluating the vulnerabilities of information systems and intrusion detection, analyzing each of these events to be able to offer a detailed report of all monitored operations, such as collection functions, normalization and event correlation. In order to protect their data and equipment, users use SIEM (Security Information and Event Management) in network security to protect data accessible through it and that may be subject to modification, stolen or misused, as a solution and is implemented for threat management and incident response management. Fortunately, there is a way to make use of SIEM management, by implementing AlienVault's OSSIM (Open Source SIEM).
Downloads
Metrics
References
Bau, S. (2016). Kismet . https://www.kismetwireless.net/
Belliard, D. (2017). OCS Inventory NG. https://ocsinventory-ng.org/?lang=fr
Ellis, S., & Brown, M. (2018). El Método Hacking Growth. Conecta.
Foster, G. (2017). Alien Vault. https://cybersecurity.att.com/products/ossim
Franklin, B. (2018). ntop – High Performance Network Monitoring Solutions based on Open Source and Commodity Hardware. https://www.ntop.org/
Galindo, C., Mena, A., Santizo, W., Mendoza, S., & García, M. (2016). Seguridad de la Información. Guatemala. Editorial Universidad de San Carlos de Guatemala
Lizama Mendoza, J. (2015). Hackers: de piratas a defensores del software libre. Revista Mexicana de Ciencias Políticas y Sociales; Vol 45, No 185 (2002). http://www.revistas.unam.mx/index.php/rmcpys/article/view/48321
López, P. A. (2010). Seguridad informática. Editex.
Nagios. (2017). Nagios . https://www.nagios.org/
OpenVAS. (2016). OpenVAS - Open Vulnerability Assessment Scanner. https://www.openvas.org/
Perez, C., & Muñoz, A. L. (2006). Teledetección: nociones y aplicaciones. carlos perez.
Ramirez, F. (2015). ¿Podremos alcanzar la seguridad informática? . https://www.estamosenlinea.com.ve/2015/04/01/podremos-alcanzar-la-seguridad-informatica/
Snort. (2017). Snort - Network Intrusion Detection & Prevention System. https://www.snort.org/
sourceforge. (2017). sourceforge-NfSen. http://nfsen.sourceforge.net/
Urbina, G. B. (2016). Introducción a la seguridad informática. Grupo editorial PATRIA.
PDF (Español (España)) 260
Copyright (c) 2022 Enrique Colon Ferruzola Gómez, Oscar Xavier Bermeo Almeida, Lissett Margarita Arévalo Gamboa
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Authors maintain the rights to the articles and are therefore free to share, copy, distribute, execute, and publicly communicate the work on their personal websites or in institutional deposits, after its publication in this journal, as long as they provide bibliographic information that certifies its publication in this journal.
The works are under one https://creativecommons.org/licenses/by-nc-nd/4.0/