Design of a simulated environment for information security

Authors

  • Julian Camilo Fonseca Romero Fundación Universitaria Juan de Castellanos

DOI:

https://doi.org/10.38017/2390058X.117

Keywords:

Hacking, informatics, networks, simulator, training, internet.

Abstract

This article shows the results of a technological research project, which describes the design and development of a simulator in which an intrusion test is executed, whose purpose is for people to gain, strengthen and expand their knowledge in information security in a fast way without the complications and limitations that some IT professionals have (from students to IT managers), where due to lack of experience could affect their systems in charge. The data network infrastructure of the simulator is described and technological requirements are set so the simulator runs smoothly. The hardware and software used in the simulator are described. In order to analyze the results and evaluate the simulator’s performance, three procedures are performed. These procedures are used in various methodologies to perform a penetration test such as: enumeration, vulnerability analysis and exploitation. With the development of these procedures, the simulator’s stability is analyzed and the knowledge acquired by people performing practices on the simulator is verified. It is concluded that the simulator’s goals are accomplished and the simulator can be adapted to various information security activities like forensics analysis, defense systems implementation and malware development with academic and investigation purposes.

Author Biography

Julian Camilo Fonseca Romero, Fundación Universitaria Juan de Castellanos

Grupo de Investigación MUISCA Facultad de Ingeniería Fundación Universitaria Juan de Castellanos

References

[1] B. A. Forouzan, Transmisión de datos y redes de comunicaciones, 2nd ed. España: McGraw-Hill, 2002, pp. 41-55.

[2] J. A. Restrepo, Introducción al Pentesting– Metodología DragonJar, 2015. [Online]. Available: http://www.dragonjar.education/file/112725

[3] L. Gordon, Nmap (“Network Mapper”) Security Scanner, 2015. [Online]. Available: https://nmap.org/book/man.html

[4] Tenable Network Security, Nessus Vulnerability Assessment Solution, 2015. [Online]. Available: http://static.tenable.com/documentation/nessus_6.4_user_guide.pdf

[5] A. Matthews, T. Giakouminakis, and C. Loder, RAPID7Community, Metasploitable 2 Exploitability Guide, 2013. [Online]. Available: https://community.rapid7.com/docs/DOC-1875

[6] A. Matthews, T. Giakouminakis, and C. Loder, RAPID7 Community, Metasploit Community User Guide, Release 4.9, 2014. [Online]. Available: https://community.rapid7.com/servlet/JiveServlet/downloadBody/1563-102-14-6126/community-user-guide.pdf

[7] E. Borja, Sistemas de Información, 2014. [Online]. Available: http://edwinborjalopez.blogspot.com.co/2014/06/blog-post.html

[8] D. Dawes, and L. Glenn, Xorg – X11R6 X server, 2015. [Online]. Available: ftp://www.x.org/pub/X11R6.8.2/doc/Xorg.1.html

[9] Free Software Fundation, Inc, Screen, the virtual terminal manager, 2003. [Online]. Available: https://www.gnu.org/software/screen/manual/screen.pdf

How to Cite

Fonseca Romero, J. C. (2015). Design of a simulated environment for information security. Science, Innovation and Technology Journal, 2, 115–123. https://doi.org/10.38017/2390058X.117

Downloads

Download data is not yet available.

Published

2015-11-30

Issue

Section

Artículo de Reflexión