Show simple item record

dc.contributor.advisorRighi, Rodrigo da Rosa
dc.contributor.authorMarostega, Júnior André
dc.date.accessioned2020-08-06T20:52:36Z
dc.date.accessioned2022-09-22T19:39:52Z
dc.date.available2020-08-06T20:52:36Z
dc.date.available2022-09-22T19:39:52Z
dc.date.issued2020-03-27
dc.identifier.urihttps://hdl.handle.net/20.500.12032/63547
dc.description.abstractThe study carried out in this dissertation proposes a security system for mobile intrusion, called Msis (Mobile Security Intrusion System). A prototype was developed to assist authorities in carrying out cyberattacks for investigative purposes, thus collaborating on matters involving scenarios that can be considered critical, such as police investigation, kidnappings and other types of risk situations to society. The Msis system acts scanning wireless networks (Wi-Fi), and capturing authentication password data packets during the handshake process between devices and routers. Among the subjects that are addressed, we highlight, Internet of Things, communication protocols, pentest, and information security. Several papers describe specific attacks, with IoT devices, using individual techniques and methods. Msis system differs by focusing on hash capture. Papers that describe protocols focus on data processing, performance, energy consumption, and bandwidth consumption, but there is a limited number of papers that focus on security, being this is a gap to be filled in the security literature. Msis aims to contribute to the literature in two ways. First, performing two attack techniques in parallel using Threads. Second, the development of a protocol, designed to be executed in an IoT device, that performs data communication prioritizing data security. Msis is divided into three modules, Msis-A, Msis-P, and Msis-C. Msis-A runs on a device with limited resources and aims to scan wireless networks (Wi-Fi) and execute attacks on them. The attacks are projected using two techniques, known as Brute Force and Evil-Twin. The Msis system is different in that it allows both attack techniques to be carried out, in parallel and simultaneously, with the use of Threads. Msis-P is in charge of comparing and breaking a password, a process that is performed after Msis-A has captured the hash of a given network. Msis-C is a communication protocol, developed to ensure safe communication between modules Msis-A and Msis-P. Msis-C is located in the application layer, applying encryption to data, and thus carrying out the communication between modules A and P. Another important component of this dissertation, is the use of a UAV (unmanned aerial vehicles) as a movement mechanism between certain areas to carry out the attacks. The results presented by the prototype validate the effectiveness and time savings in attacks using the techniques of Msis-A in a real environment. As well as the success in the operation of security and communication that Msis-C presented in the tests performed.en
dc.description.sponsorshipNenhumapt_BR
dc.languagept_BRpt_BR
dc.publisherUniversidade do Vale do Rio dos Sinospt_BR
dc.rightsopenAccesspt_BR
dc.subjectInternet das coisaspt_BR
dc.subjectIoTen
dc.titleMSIS: modelo de defesa cibernético utilizando técnicas de ataques em paralelo a redes sem fio em território suspeito com veículo aéreo não tripuladopt_BR
dc.typeDissertaçãopt_BR


Files in this item

FilesSizeFormatView
Júnior André Marostega_.pdf5.945Mbapplication/pdfView/Open

This item appears in the following Collection(s)

Show simple item record


© AUSJAL 2022

Asociación de Universidades Confiadas a la Compañía de Jesús en América Latina, AUSJAL
Av. Santa Teresa de Jesús Edif. Cerpe, Piso 2, Oficina AUSJAL Urb.
La Castellana, Chacao (1060) Caracas - Venezuela
Tel/Fax (+58-212)-266-13-41 /(+58-212)-266-85-62

Nuestras redes sociales

facebook Facebook

twitter Twitter

youtube Youtube

Asociaciones Jesuitas en el mundo
Ausjal en el mundo AJCU AUSJAL JESAM JCEP JCS JCAP