Survey: viabilidade e impacto na implantação de um modelo de predição de ataques de redes de computadores

Bibliographic Details
Main Author: Pereira Filho, Cícero Romão Ribeiro
Publication Date: 2023
Format: Bachelor thesis
Language: por
Source: Repositório Institucional da Universidade Federal do Ceará (UFC)
Download full: http://repositorio.ufc.br/handle/riufc/75234
Summary: Information technology is rooted in a large part of society, working in different areas and showing constant evolution, which is mainly due to the computer network that allows users and machines to connect. The network is of vital importance today as a means of obtaining, sharing and storing information that can be of immeasurable value. In view of this, it is noticeable that malicious individuals can target this information, these individuals mostly have the knowledge to invade computer networks and obtain this data, they are also known as hackers. Because these attack techniques to ensure security have been developed over time, most of these methods are correctives being applied during or after episodes of cyber attacks. Thus, the objective is to present the research to enable the implementation of the network attack prediction model and the impact that the model may cause. The research model used was the survey performing the sample selection process using techniques to separate the target population in an effective and concise way, so that the collected data are valid. In view of this, the questionnaire used was constructed aiming at the main points that need validation, such as feasibility, impact, cost and cataloging of the individuals in the sample. Finally some statistical data were obtained as a result of the survey denoting a brief discussion about the peculiarities.
id UFC-7_fb879f342a708e91ab52f8ac2fe09b59
oai_identifier_str oai:repositorio.ufc.br:riufc/75234
network_acronym_str UFC-7
network_name_str Repositório Institucional da Universidade Federal do Ceará (UFC)
repository_id_str
spelling Pereira Filho, Cícero Romão RibeiroMelo, Reuber Regis De2023-12-11T19:20:15Z2023-12-11T19:20:15Z2023http://repositorio.ufc.br/handle/riufc/75234Information technology is rooted in a large part of society, working in different areas and showing constant evolution, which is mainly due to the computer network that allows users and machines to connect. The network is of vital importance today as a means of obtaining, sharing and storing information that can be of immeasurable value. In view of this, it is noticeable that malicious individuals can target this information, these individuals mostly have the knowledge to invade computer networks and obtain this data, they are also known as hackers. Because these attack techniques to ensure security have been developed over time, most of these methods are correctives being applied during or after episodes of cyber attacks. Thus, the objective is to present the research to enable the implementation of the network attack prediction model and the impact that the model may cause. The research model used was the survey performing the sample selection process using techniques to separate the target population in an effective and concise way, so that the collected data are valid. In view of this, the questionnaire used was constructed aiming at the main points that need validation, such as feasibility, impact, cost and cataloging of the individuals in the sample. Finally some statistical data were obtained as a result of the survey denoting a brief discussion about the peculiarities.A tecnologia da informação está enraizada em uma grande parte da sociedade atuando em diferentes áreas e apresentando uma evolução constante, a qual se deve principalmente pela rede de computadores que possibilita que os usuários e máquinas se conectem. A rede é de vital importância na atualidade sendo um meio de obter, compartilhar e armazenar informações essas que podem possuir um valor imensurável. Perante isso é perceptível que indivíduos mal-intencionados podem almejar essas informações esses indivíduos em sua maioria possuem conhecimentos para invadir redes de computadores e obter esses dados, os mesmo também são conhecidos como hackers. Em razão desses ataques técnicas para garantir a segurança foram desenvolvidas com o tempo, em sua maioria esses métodos são corretivos sendo aplicados durante ou depois dos episódios de ataques cibernéticos. Desse modo o objetivo é apresentar a pesquisa para viabilização da implantação do modelo de predição de ataques de rede e o impacto que o modelo poderá causar. O modelo de pesquisa utilizado foi o survey realizando o processo de seleção de amostra utilizando técnicas para separar a população alvo de maneira efetiva e concisa, para que assim os dados coletados sejam válidos. À vista disto o questionário utilizado foi construído objetivando os principais pontos que necessitam de validação como viabilidade, impacto, custo e catalogação dos indivíduos da amostra. Por fim alguns dados estatísticos foram obtidos como resultado do survey denotando uma breve discussão sobre as peculiaridades.Survey: viabilidade e impacto na implantação de um modelo de predição de ataques de redes de computadoresinfo:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/bachelorThesisSurveyCybersegurançaRedes de computadoresSurveyNetwork securityCyber attacksinfo:eu-repo/semantics/openAccessporreponame:Repositório Institucional da Universidade Federal do Ceará (UFC)instname:Universidade Federal do Ceará (UFC)instacron:UFC2023ORIGINAL2023_tcc_cfilho.pdfa.pdf2023_tcc_cfilho.pdfa.pdfapplication/pdf699481http://repositorio.ufc.br/bitstream/riufc/75234/1/2023_tcc_cfilho.pdfa.pdfe2e62240fdb17364cfad569f7a19067aMD51LICENSElicense.txtlicense.txttext/plain; charset=utf-81748http://repositorio.ufc.br/bitstream/riufc/75234/2/license.txt8a4605be74aa9ea9d79846c1fba20a33MD52riufc/752342025-09-16 10:19:01.926oai:repositorio.ufc.br:riufc/75234Tk9URTogUExBQ0UgWU9VUiBPV04gTElDRU5TRSBIRVJFClRoaXMgc2FtcGxlIGxpY2Vuc2UgaXMgcHJvdmlkZWQgZm9yIGluZm9ybWF0aW9uYWwgcHVycG9zZXMgb25seS4KCk5PTi1FWENMVVNJVkUgRElTVFJJQlVUSU9OIExJQ0VOU0UKCkJ5IHNpZ25pbmcgYW5kIHN1Ym1pdHRpbmcgdGhpcyBsaWNlbnNlLCB5b3UgKHRoZSBhdXRob3Iocykgb3IgY29weXJpZ2h0Cm93bmVyKSBncmFudHMgdG8gRFNwYWNlIFVuaXZlcnNpdHkgKERTVSkgdGhlIG5vbi1leGNsdXNpdmUgcmlnaHQgdG8gcmVwcm9kdWNlLAp0cmFuc2xhdGUgKGFzIGRlZmluZWQgYmVsb3cpLCBhbmQvb3IgZGlzdHJpYnV0ZSB5b3VyIHN1Ym1pc3Npb24gKGluY2x1ZGluZwp0aGUgYWJzdHJhY3QpIHdvcmxkd2lkZSBpbiBwcmludCBhbmQgZWxlY3Ryb25pYyBmb3JtYXQgYW5kIGluIGFueSBtZWRpdW0sCmluY2x1ZGluZyBidXQgbm90IGxpbWl0ZWQgdG8gYXVkaW8gb3IgdmlkZW8uCgpZb3UgYWdyZWUgdGhhdCBEU1UgbWF5LCB3aXRob3V0IGNoYW5naW5nIHRoZSBjb250ZW50LCB0cmFuc2xhdGUgdGhlCnN1Ym1pc3Npb24gdG8gYW55IG1lZGl1bSBvciBmb3JtYXQgZm9yIHRoZSBwdXJwb3NlIG9mIHByZXNlcnZhdGlvbi4KCllvdSBhbHNvIGFncmVlIHRoYXQgRFNVIG1heSBrZWVwIG1vcmUgdGhhbiBvbmUgY29weSBvZiB0aGlzIHN1Ym1pc3Npb24gZm9yCnB1cnBvc2VzIG9mIHNlY3VyaXR5LCBiYWNrLXVwIGFuZCBwcmVzZXJ2YXRpb24uCgpZb3UgcmVwcmVzZW50IHRoYXQgdGhlIHN1Ym1pc3Npb24gaXMgeW91ciBvcmlnaW5hbCB3b3JrLCBhbmQgdGhhdCB5b3UgaGF2ZQp0aGUgcmlnaHQgdG8gZ3JhbnQgdGhlIHJpZ2h0cyBjb250YWluZWQgaW4gdGhpcyBsaWNlbnNlLiBZb3UgYWxzbyByZXByZXNlbnQKdGhhdCB5b3VyIHN1Ym1pc3Npb24gZG9lcyBub3QsIHRvIHRoZSBiZXN0IG9mIHlvdXIga25vd2xlZGdlLCBpbmZyaW5nZSB1cG9uCmFueW9uZSdzIGNvcHlyaWdodC4KCklmIHRoZSBzdWJtaXNzaW9uIGNvbnRhaW5zIG1hdGVyaWFsIGZvciB3aGljaCB5b3UgZG8gbm90IGhvbGQgY29weXJpZ2h0LAp5b3UgcmVwcmVzZW50IHRoYXQgeW91IGhhdmUgb2J0YWluZWQgdGhlIHVucmVzdHJpY3RlZCBwZXJtaXNzaW9uIG9mIHRoZQpjb3B5cmlnaHQgb3duZXIgdG8gZ3JhbnQgRFNVIHRoZSByaWdodHMgcmVxdWlyZWQgYnkgdGhpcyBsaWNlbnNlLCBhbmQgdGhhdApzdWNoIHRoaXJkLXBhcnR5IG93bmVkIG1hdGVyaWFsIGlzIGNsZWFybHkgaWRlbnRpZmllZCBhbmQgYWNrbm93bGVkZ2VkCndpdGhpbiB0aGUgdGV4dCBvciBjb250ZW50IG9mIHRoZSBzdWJtaXNzaW9uLgoKSUYgVEhFIFNVQk1JU1NJT04gSVMgQkFTRUQgVVBPTiBXT1JLIFRIQVQgSEFTIEJFRU4gU1BPTlNPUkVEIE9SIFNVUFBPUlRFRApCWSBBTiBBR0VOQ1kgT1IgT1JHQU5JWkFUSU9OIE9USEVSIFRIQU4gRFNVLCBZT1UgUkVQUkVTRU5UIFRIQVQgWU9VIEhBVkUKRlVMRklMTEVEIEFOWSBSSUdIVCBPRiBSRVZJRVcgT1IgT1RIRVIgT0JMSUdBVElPTlMgUkVRVUlSRUQgQlkgU1VDSApDT05UUkFDVCBPUiBBR1JFRU1FTlQuCgpEU1Ugd2lsbCBjbGVhcmx5IGlkZW50aWZ5IHlvdXIgbmFtZShzKSBhcyB0aGUgYXV0aG9yKHMpIG9yIG93bmVyKHMpIG9mIHRoZQpzdWJtaXNzaW9uLCBhbmQgd2lsbCBub3QgbWFrZSBhbnkgYWx0ZXJhdGlvbiwgb3RoZXIgdGhhbiBhcyBhbGxvd2VkIGJ5IHRoaXMKbGljZW5zZSwgdG8geW91ciBzdWJtaXNzaW9uLgo=Repositório InstitucionalPUBhttp://www.repositorio.ufc.br/ri-oai/requestbu@ufc.br || repositorio@ufc.bropendoar:2025-09-16T13:19:01Repositório Institucional da Universidade Federal do Ceará (UFC) - Universidade Federal do Ceará (UFC)false
dc.title.pt_BR.fl_str_mv Survey: viabilidade e impacto na implantação de um modelo de predição de ataques de redes de computadores
title Survey: viabilidade e impacto na implantação de um modelo de predição de ataques de redes de computadores
spellingShingle Survey: viabilidade e impacto na implantação de um modelo de predição de ataques de redes de computadores
Pereira Filho, Cícero Romão Ribeiro
Survey
Cybersegurança
Redes de computadores
Survey
Network security
Cyber attacks
title_short Survey: viabilidade e impacto na implantação de um modelo de predição de ataques de redes de computadores
title_full Survey: viabilidade e impacto na implantação de um modelo de predição de ataques de redes de computadores
title_fullStr Survey: viabilidade e impacto na implantação de um modelo de predição de ataques de redes de computadores
title_full_unstemmed Survey: viabilidade e impacto na implantação de um modelo de predição de ataques de redes de computadores
title_sort Survey: viabilidade e impacto na implantação de um modelo de predição de ataques de redes de computadores
author Pereira Filho, Cícero Romão Ribeiro
author_facet Pereira Filho, Cícero Romão Ribeiro
author_role author
dc.contributor.author.fl_str_mv Pereira Filho, Cícero Romão Ribeiro
dc.contributor.advisor1.fl_str_mv Melo, Reuber Regis De
contributor_str_mv Melo, Reuber Regis De
dc.subject.ptbr.pt_BR.fl_str_mv Survey
Cybersegurança
Redes de computadores
topic Survey
Cybersegurança
Redes de computadores
Survey
Network security
Cyber attacks
dc.subject.en.pt_BR.fl_str_mv Survey
Network security
Cyber attacks
description Information technology is rooted in a large part of society, working in different areas and showing constant evolution, which is mainly due to the computer network that allows users and machines to connect. The network is of vital importance today as a means of obtaining, sharing and storing information that can be of immeasurable value. In view of this, it is noticeable that malicious individuals can target this information, these individuals mostly have the knowledge to invade computer networks and obtain this data, they are also known as hackers. Because these attack techniques to ensure security have been developed over time, most of these methods are correctives being applied during or after episodes of cyber attacks. Thus, the objective is to present the research to enable the implementation of the network attack prediction model and the impact that the model may cause. The research model used was the survey performing the sample selection process using techniques to separate the target population in an effective and concise way, so that the collected data are valid. In view of this, the questionnaire used was constructed aiming at the main points that need validation, such as feasibility, impact, cost and cataloging of the individuals in the sample. Finally some statistical data were obtained as a result of the survey denoting a brief discussion about the peculiarities.
publishDate 2023
dc.date.accessioned.fl_str_mv 2023-12-11T19:20:15Z
dc.date.available.fl_str_mv 2023-12-11T19:20:15Z
dc.date.issued.fl_str_mv 2023
dc.type.status.fl_str_mv info:eu-repo/semantics/publishedVersion
dc.type.driver.fl_str_mv info:eu-repo/semantics/bachelorThesis
format bachelorThesis
status_str publishedVersion
dc.identifier.uri.fl_str_mv http://repositorio.ufc.br/handle/riufc/75234
url http://repositorio.ufc.br/handle/riufc/75234
dc.language.iso.fl_str_mv por
language por
dc.rights.driver.fl_str_mv info:eu-repo/semantics/openAccess
eu_rights_str_mv openAccess
dc.source.none.fl_str_mv reponame:Repositório Institucional da Universidade Federal do Ceará (UFC)
instname:Universidade Federal do Ceará (UFC)
instacron:UFC
instname_str Universidade Federal do Ceará (UFC)
instacron_str UFC
institution UFC
reponame_str Repositório Institucional da Universidade Federal do Ceará (UFC)
collection Repositório Institucional da Universidade Federal do Ceará (UFC)
bitstream.url.fl_str_mv http://repositorio.ufc.br/bitstream/riufc/75234/1/2023_tcc_cfilho.pdfa.pdf
http://repositorio.ufc.br/bitstream/riufc/75234/2/license.txt
bitstream.checksum.fl_str_mv e2e62240fdb17364cfad569f7a19067a
8a4605be74aa9ea9d79846c1fba20a33
bitstream.checksumAlgorithm.fl_str_mv MD5
MD5
repository.name.fl_str_mv Repositório Institucional da Universidade Federal do Ceará (UFC) - Universidade Federal do Ceará (UFC)
repository.mail.fl_str_mv bu@ufc.br || repositorio@ufc.br
_version_ 1847792804847157248