Simulation of IP Network Attacks in a Controlled Environment Using Packet Generation and Manipulation Tools

Main Article Content

Steven Pozo Analuisa
Marley Morales Sosa
Erick Ramírez Ortíz

Abstract

The simulation of attacks on IP networks allows us to learn about security and evaluate the network infrastructure. It should be noted that these attacks are conducted in a controlled environment, as such activities are illegal. The simulated attacks include DDos, spoofing, and sniffing, using tools such as Scapy and hping. During the simulation of the attacks, methods were implemented to avoid or mitigate these types of attacks, such as the creation of a Python program using Scapy to block IPs, data encryption with a C program to prevent sniffing attacks, and configurations to prevent identity theft.

Downloads

Download data is not yet available.

Article Details

How to Cite
Simulation of IP Network Attacks in a Controlled Environment Using Packet Generation and Manipulation Tools. (2025). Revista De Ciencias De Seguridad Y Defensa, 9(02), 16. https://doi.org/10.24133/RCSD.VOL09.N02.2024.03
Section
Artículos

How to Cite

Simulation of IP Network Attacks in a Controlled Environment Using Packet Generation and Manipulation Tools. (2025). Revista De Ciencias De Seguridad Y Defensa, 9(02), 16. https://doi.org/10.24133/RCSD.VOL09.N02.2024.03

Similar Articles

You may also start an advanced similarity search for this article.