Vulnerability mitigation in an ISP core network: A case study

Ecuadorian Science

View Publication Info
 
 
Field Value
 
Title Vulnerability mitigation in an ISP core network: A case study
Mitigación de vulnerabilidades en la red central de un ISP: Un caso de estudio
 
Creator Palate, Byron Mauricio
Avila-Pesantez, Diego
 
Subject Mikrotik
RouterOS
Attack
Mitigation
ISP
Mikrotik
RouterOS
Ataque
Mitigación
ISP
 
Description Cybersecurity incidents in ISP (Internet Service Provider) infrastructure have grown significantly and it is necessary to identify vulnerabilities that need immediate protection. In this environment, the firewall can filter data packets, analyzing the headers and deciding about the routing of the packet based on the established rules. This device is very essential in an ISP network because it mitigates the vulnerabilities coming from the network, maintaining a higher degree of computer security for your internal network, thus guaranteeing the availability, integrity, and confidentiality of the information. In the case study, a Mikrotik brand infrastructure was selected with a proprietary operating system called RouterOS, which will function as a core router, where the security rules will be applied to your firewall for each type of attack that will be generated against the router. , whether they are internal or external attacks on the network, avoiding causing serious security failures such as being the victim of a DoS (Denial of Service) attack, brute force attacks, etc. As a result, a 50% decrease in CPU consumption was obtained in each attack generated, thus achieving the proper functioning of the network infrastructure and guaranteeing stability and availability of the communications network.
Los incidentes de ciberseguridad en infraestructura de ISP (Internet Service Provider) han crecido de manera significativa y es necesario identificar las vulnerabilidades que necesitan una protección inmediata. En este entorno, el firewall tiene la capacidad de filtrar paquetes de datos, analizando las cabeceras y tomando una decisión del encaminamiento del paquete en base a las reglas establecidas. Este dispositivo es muy indispensable en una red ISP, debido a que mitiga las vulnerabilidades provenientes de la red, manteniendo un mayor grado de seguridad informática para su red interna. En el estudio de caso se seleccionó infraestructura de marca Mikrotik con sistema operativo RouterOS para aplicar reglas de seguridad en cada tipo de ataque que ingresa hacia el router de core, evitando causar graves fallas como la denegación del servicio. Como resultado se obtuvo una disminución del 50% del consumo del CPU en cada ataque generado, garantizando la estabilidad y la disponibilidad de la red de comunicaciones.
 
Publisher GDEON Editorial
 
Date 2021-09-30
 
Type info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
 
Format application/pdf
 
Identifier https://journals.gdeon.org/index.php/esj/article/view/117
10.46480/esj.5.2.117
 
Source Ecuadorian Science Journal; Vol. 5 Núm. 2 (2021): Septiembre; 68-82
Ecuadorian Science Journal; Vol 5 No 2 (2021): September; 68-82
2602-8077
 
Language spa
 
Relation https://journals.gdeon.org/index.php/esj/article/view/117/127
 
Rights Copyright (c) 2021 Diego Avila-Pesantez
https://creativecommons.org/licenses/by-nc-nd/4.0
 

Contact Us

The PKP Index is an initiative of the Public Knowledge Project.

For PKP Publishing Services please use the PKP|PS contact form.

For support with PKP software we encourage users to consult our wiki for documentation and search our support forums.

For any other correspondence feel free to contact us using the PKP contact form.

Find Us

Twitter

Copyright © 2015-2018 Simon Fraser University Library