ImpactU Versión 3.11.2 Última actualización: Interfaz de Usuario: 16/10/2025 Base de Datos: 29/08/2025 Hecho en Colombia
Metodología de detección de intrusos para radios que utilizan protocolo radio móvil digital (DMR), que permitirá identificar ataques de denegación de servicios que afectan la disponibilidad en la transmisión de datos para empresas de seguridad privada
In the different business sectors, both private and public, communication platforms must be chosen that support the needs of the medium, but not before prioritizing and evaluating highly relevant variables in the technical, managerial and economic areas. Factors such as cost, brand support, service availability and monitoring become fundamental when choosing the communication platform. After evaluating these variables, in some cases analogous technologies are chosen because they have availability advantages for use in critical infrastructures or the most widespread or economic technologies such as GSM cellular telephony are used in common, without considering that the latter can collapse before natural events or saturation incidents. Specifically, the critical sectors of private and public security appropriate the analogous radio frequency technologies known as RF communications; which have a very high rate of consumption and implementation in the market due to the high availability they offer on different adverse external agents. It should be noted that this type of technology is limited (in most cases) to only receive and deliver voice messages. Within RF technology there are many standards which are gaining strength for digital radios that are currently trending and that allow to support a large number of additional services that increase productivity, divided into a layer of voice and another layer of data on the same infrastructure and transmitted by a single connection string. One of the standards that takes importance and takes the mentioned principles is the Mobile Digital DMR protocol, designed by the ETSI in 2005. The DMR communications support the sending of data inheriting the known vulnerabilities of the radioelectric space and TCP / IP that can be attacked, violated and exploited affecting the availability of these complementary services. The research is structured by chapters, first the context of the thesis will be addressed, then the state of the art, then a theoretical framework, then the characterization of services and technologies involved in the protocol, then a risk analysis will be performed on the services / previously listed technologies and finally the methodology aimed at detecting DoS over DMR communications. Following the steps of the methodology, it will be possible to detect intruders and to deal with DoS attacks that affect availability within the DMR protocol connection chain