Analisys of Effects Generated by Cyberattacks on an SDN Controller in a Synthetic Data Environment
Este proyecto explora la dinámica de un entorno de redes definidas por software (SDN) en respuesta a varios ciberataques, centrándose en el impacto en el rendimiento y la estabilidad de la red. Utilizando una configuración controlada con Mininet y ONOS, establecimos una topología de red diseñada par...
- Autores:
-
Cedeño Romero, Nicolas Steven
- Tipo de recurso:
- Trabajo de grado de pregrado
- Fecha de publicación:
- 2024
- Institución:
- Universidad Santo Tomás
- Repositorio:
- Repositorio Institucional USTA
- Idioma:
- spa
- OAI Identifier:
- oai:repository.usta.edu.co:11634/59058
- Acceso en línea:
- http://hdl.handle.net/11634/59058
- Palabra clave:
- SDN
Network Security
Cyberattacks
OpenFlow
ONOS
Ingeniería de Telecomunicaciones
Sistema de telecomunicaciones
Bases de datos
SDN
Seguridad de redes
Ciberataques
Flujo abierto
ONOS
- Rights
- openAccess
- License
- Atribución-NoComercial-SinDerivadas 2.5 Colombia
| id |
SANTOTOMAS_8f937d65d9f2e95b20fc1da2f8a645c0 |
|---|---|
| oai_identifier_str |
oai:repository.usta.edu.co:11634/59058 |
| network_acronym_str |
SANTOTOMAS |
| network_name_str |
Repositorio Institucional USTA |
| repository_id_str |
|
| dc.title.spa.fl_str_mv |
Analisys of Effects Generated by Cyberattacks on an SDN Controller in a Synthetic Data Environment |
| title |
Analisys of Effects Generated by Cyberattacks on an SDN Controller in a Synthetic Data Environment |
| spellingShingle |
Analisys of Effects Generated by Cyberattacks on an SDN Controller in a Synthetic Data Environment SDN Network Security Cyberattacks OpenFlow ONOS Ingeniería de Telecomunicaciones Sistema de telecomunicaciones Bases de datos SDN Seguridad de redes Ciberataques Flujo abierto ONOS |
| title_short |
Analisys of Effects Generated by Cyberattacks on an SDN Controller in a Synthetic Data Environment |
| title_full |
Analisys of Effects Generated by Cyberattacks on an SDN Controller in a Synthetic Data Environment |
| title_fullStr |
Analisys of Effects Generated by Cyberattacks on an SDN Controller in a Synthetic Data Environment |
| title_full_unstemmed |
Analisys of Effects Generated by Cyberattacks on an SDN Controller in a Synthetic Data Environment |
| title_sort |
Analisys of Effects Generated by Cyberattacks on an SDN Controller in a Synthetic Data Environment |
| dc.creator.fl_str_mv |
Cedeño Romero, Nicolas Steven |
| dc.contributor.advisor.none.fl_str_mv |
Arevalo Herrera, Juliana |
| dc.contributor.author.none.fl_str_mv |
Cedeño Romero, Nicolas Steven |
| dc.contributor.orcid.spa.fl_str_mv |
https://orcid.org/0009-0009-7119-1127 https://orcid.org/0000-0001-7401-4286 |
| dc.contributor.googlescholar.spa.fl_str_mv |
https://scholar.google.com/citations?hl=es&user=qDZbf-wAAAAJ |
| dc.contributor.cvlac.spa.fl_str_mv |
https://scienti.minciencias.gov.co/cvlac/visualizador/generarCurriculoCv.do?cod_rh=0002170070 https://scienti.minciencias.gov.co/cvlac/visualizador/generarCurriculoCv.do?cod_rh=0000759813 |
| dc.contributor.corporatename.spa.fl_str_mv |
Universidad Santo Tomás |
| dc.subject.keyword.spa.fl_str_mv |
SDN Network Security Cyberattacks OpenFlow ONOS |
| topic |
SDN Network Security Cyberattacks OpenFlow ONOS Ingeniería de Telecomunicaciones Sistema de telecomunicaciones Bases de datos SDN Seguridad de redes Ciberataques Flujo abierto ONOS |
| dc.subject.lemb.spa.fl_str_mv |
Ingeniería de Telecomunicaciones Sistema de telecomunicaciones Bases de datos |
| dc.subject.proposal.spa.fl_str_mv |
SDN Seguridad de redes Ciberataques Flujo abierto ONOS |
| description |
Este proyecto explora la dinámica de un entorno de redes definidas por software (SDN) en respuesta a varios ciberataques, centrándose en el impacto en el rendimiento y la estabilidad de la red. Utilizando una configuración controlada con Mininet y ONOS, establecimos una topología de red diseñada para simular condiciones vulnerables a las amenazas cibernéticas. A través de la implementación del envenenamiento de la topología ARP, se introdujeron tres hosts falsos, comprometiendo la integridad de las comunicaciones de la red. Además, se ejecutó un ataque de inundación de Packet-In, lo que resultó en la falla del controlador ONOS, lo que subrayó los desafíos de administrar el tráfico de red en escenarios de ataque. Los experimentos demostraron cómo se puede explotar la arquitectura de control centralizada de SDN, revelando vulnerabilidades significativas en el manejo del tráfico malicioso. Esta investigación destaca la necesidad crítica de medidas de seguridad mejoradas en las arquitecturas SDN para mitigar los riesgos asociados con las amenazas cibernéticas en evolución, brindando información para futuros desarrollos en estrategias de seguridad de red. |
| publishDate |
2024 |
| dc.date.issued.none.fl_str_mv |
2024 |
| dc.date.accessioned.none.fl_str_mv |
2025-01-17T17:09:36Z |
| dc.date.available.none.fl_str_mv |
2025-01-17T17:09:36Z |
| dc.type.local.spa.fl_str_mv |
Trabajo de grado |
| dc.type.version.none.fl_str_mv |
info:eu-repo/semantics/acceptedVersion |
| dc.type.coar.none.fl_str_mv |
http://purl.org/coar/resource_type/c_7a1f |
| dc.type.drive.none.fl_str_mv |
info:eu-repo/semantics/bachelorThesis |
| format |
http://purl.org/coar/resource_type/c_7a1f |
| status_str |
acceptedVersion |
| dc.identifier.citation.spa.fl_str_mv |
Cedeño Romero, N.S. (2024). Analisys of Effects Generated by Cyberattacks on an SDN Controller in a Synthetic Data Environment [Trabajo de Grado, Universidad Santo Tomás]. Repositorio Institucional. |
| dc.identifier.uri.none.fl_str_mv |
http://hdl.handle.net/11634/59058 |
| dc.identifier.reponame.spa.fl_str_mv |
reponame:Repositorio Institucional Universidad Santo Tomás |
| dc.identifier.instname.spa.fl_str_mv |
instname:Universidad Santo Tomás |
| dc.identifier.repourl.spa.fl_str_mv |
repourl:https://repository.usta.edu.co |
| identifier_str_mv |
Cedeño Romero, N.S. (2024). Analisys of Effects Generated by Cyberattacks on an SDN Controller in a Synthetic Data Environment [Trabajo de Grado, Universidad Santo Tomás]. Repositorio Institucional. reponame:Repositorio Institucional Universidad Santo Tomás instname:Universidad Santo Tomás repourl:https://repository.usta.edu.co |
| url |
http://hdl.handle.net/11634/59058 |
| dc.language.iso.spa.fl_str_mv |
spa |
| language |
spa |
| dc.relation.references.spa.fl_str_mv |
L. Mhamdi and M. M. Isa, “Securing SDN: Hybrid autoencoder-random forest for intrusion detection and attack mitigation,” J. Netw. Comput. Appl., vol. 225, p. 103868, May 2024, doi: 10.1016/j.jnca.2024.103868. M. W. Nadeem, H. G. Goh, Y. Aun, and V. Ponnusamy, “Detecting and Mitigating Botnet Attacks in Software-Defined Networks Using Deep Learning Techniques,” IEEE Access, vol. 11, pp. 49153–49171, 2023, doi: 10.1109/ACCESS.2023.3277397. M. AbdulRaheem et al., “Machine learning assisted snort and zeek in detecting DDoS attacks in software-defined networking,” Int. J. Inf. Technol., vol. 16, no. 3, pp. 1627–1643, Mar. 2023, doi: 10.1007/s41870-023-01469-3. H. U. Ishtiaq, A. A. Bhutta, and A. N. Mian, “DHCP DoS and starvation attacks on SDN controllers and their mitigation,” J. Comput. Virol. Hacking Tech., vol. 20, no. 1, pp. 15–25, Mar. 2023, doi: 10.1007/s11416-023-00483-0. C. Gonzalez and S. M. Charfadine, “SDN Controllers and ML-Based Anomaly Detection in Embedded Systems: A Comparative Analysis,” in Proceedings - 10th International Conference on Wireless Networks and Mobile Communications, WINCOM 2023, 2023. doi: 10.1109/WINCOM59760.2023.10322912. I. H. Abdulqadder, D. Zou, and I. T. Aziz, “The DAG blockchain: A secure edge assisted honeypot for attack detection and multi-controller based load balancing in SDN 5G,” Futur. Gener. Comput. Syst., vol. 141, pp. 339–354, Apr. 2023, doi: 10.1016/j.future.2022.11.008. S. Karnani and H. K. Shakya, “Mitigation strategies for distributed denial of service (DDoS) in SDN: A survey and taxonomy,” Information Security Journal, vol. 32, no. 6. Taylor & Francis, pp. 444–468, Nov. 02, 2023. doi: 10.1080/19393555.2022.2111004. M. Yue, Q. Yan, Z. Lu, and Z. Wu, “CCS: A Cross-Plane Collaboration Strategy to Defend Against LDoS Attacks in SDN,” IEEE Trans. Netw. Serv. Manag., 2024, doi: 10.1109/TNSM.2024.3363490. D. Tang, Z. Zheng, C. Yin, B. Xiong, Z. Qin, and Q. Yang, “FTODefender: An efficient flow table overflow attacks defending system in SDN,” Expert Syst. Appl., vol. 237, p. 121460, Mar. 2024, doi: 10.1016/j.eswa.2023.121460. D. Tang, Z. Zheng, K. Li, C. Yin, W. Liang, and J. Zhang, “FTOP: An Efficient Flow Table Overflow Preventing System for Switches in SDN,” IEEE Trans. Netw. Sci. Eng., 2023, doi: 10.1109/TNSE.2023.3297650. N. Aslam, S. Srivastava, and M. M. Gore, “A Comprehensive Analysis of Machine Learning- and Deep Learning-Based Solutions for DDoS Attack Detection in SDN,” Arab. J. Sci. Eng., vol. 49, no. 3, pp. 3533–3573, Mar. 2024, doi: 10.1007/s13369- 023-08075-2 Toyeer-E-Ferdoush, H. Rahman, and M. Hasan, “A convenient way to mitigate DDoS TCP SYN flood attack,” J. Discret. Math. Sci. Cryptogr., vol. 25, no. 7, pp. 2069–2077, Oct. 2022, doi: 10.1080/09720529.2022.2133246. H. Qian and L. Cai, “Improved K-means-based solution for detecting DDoS attacks in SDN,” Phys. Commun., vol. 64, p. 102318, Jun. 2024, doi: 10.1016/j.phycom.2024.102318. Y. Gao and M. Xu, “Defense Against Software-Defined Network Topology Poisoning Attacks,” Tsinghua Sci. Technol., vol. 28, no. 1, pp. 39–46, 2023, doi: 10.26599/TST.2021.9010077. S. Sunil Gowda and R. B. Dayananda, “Detection And Prevention of ARP Attack in Software Defined Networks,” in 2023 14th International Conference on Computing Communication and Networking Technologies, ICCCNT 2023, 2023. doi: 10.1109/ICCCNT56998.2023.10307123. A. T. Phu et al., “Defending SDN against packet injection attacks using deep learning,” Comput. Networks, vol. 234, p. 109935, Oct. 2023, doi: 10.1016/j.comnet.2023.109935. |
| dc.rights.*.fl_str_mv |
Atribución-NoComercial-SinDerivadas 2.5 Colombia |
| dc.rights.uri.*.fl_str_mv |
http://creativecommons.org/licenses/by-nc-nd/2.5/co/ |
| dc.rights.local.spa.fl_str_mv |
Abierto (Texto Completo) |
| dc.rights.accessrights.none.fl_str_mv |
info:eu-repo/semantics/openAccess |
| dc.rights.coar.spa.fl_str_mv |
http://purl.org/coar/access_right/c_abf2 |
| rights_invalid_str_mv |
Atribución-NoComercial-SinDerivadas 2.5 Colombia http://creativecommons.org/licenses/by-nc-nd/2.5/co/ Abierto (Texto Completo) http://purl.org/coar/access_right/c_abf2 |
| eu_rights_str_mv |
openAccess |
| dc.format.mimetype.spa.fl_str_mv |
application/pdf |
| dc.coverage.campus.spa.fl_str_mv |
CRAI-USTA Bogotá |
| dc.publisher.spa.fl_str_mv |
Universidad Santo Tomás |
| dc.publisher.program.spa.fl_str_mv |
Pregrado Ingeniería de Telecomunicaciones |
| dc.publisher.faculty.spa.fl_str_mv |
Facultad de Ingeniería de Telecomunicaciones |
| institution |
Universidad Santo Tomás |
| bitstream.url.fl_str_mv |
https://repository.usta.edu.co/bitstream/11634/59058/6/2024cartadederechosdeautor.pdf.jpg https://repository.usta.edu.co/bitstream/11634/59058/7/2024cartadefacultad.pdf.jpg https://repository.usta.edu.co/bitstream/11634/59058/8/2024nicolascede%c3%b1o.pdf.jpg https://repository.usta.edu.co/bitstream/11634/59058/5/license.txt https://repository.usta.edu.co/bitstream/11634/59058/4/license_rdf https://repository.usta.edu.co/bitstream/11634/59058/1/2024cartadederechosdeautor.pdf https://repository.usta.edu.co/bitstream/11634/59058/2/2024cartadefacultad.pdf https://repository.usta.edu.co/bitstream/11634/59058/3/2024nicolascede%c3%b1o.pdf |
| bitstream.checksum.fl_str_mv |
76fe7754cf5ead64b01b3bd3bcc2c1b9 f5c16db24c55e2d8486d3d08c85882f9 38295b77c5d3f15a12ee9aac7fbfd4b2 aedeaf396fcd827b537c73d23464fc27 217700a34da79ed616c2feb68d4c5e06 c2e4bc9a7682a49665f6e5d5f723be39 33c26c779a3dde4156302bacd9373157 1709634f4e48c5146fb8297972e63e0a |
| bitstream.checksumAlgorithm.fl_str_mv |
MD5 MD5 MD5 MD5 MD5 MD5 MD5 MD5 |
| repository.name.fl_str_mv |
Repositorio Universidad Santo Tomás |
| repository.mail.fl_str_mv |
repositorio@usta.edu.co |
| _version_ |
1860881706469294080 |
| spelling |
Arevalo Herrera, Julianawill be generated::orcid::0000-0001-7401-4286600Cedeño Romero, Nicolas Stevenwill be generated::orcid::0009-0009-7119-1127600https://orcid.org/0009-0009-7119-1127https://orcid.org/0000-0001-7401-4286https://scholar.google.com/citations?hl=es&user=qDZbf-wAAAAJhttps://scienti.minciencias.gov.co/cvlac/visualizador/generarCurriculoCv.do?cod_rh=0002170070https://scienti.minciencias.gov.co/cvlac/visualizador/generarCurriculoCv.do?cod_rh=0000759813Universidad Santo Tomás2025-01-17T17:09:36Z2025-01-17T17:09:36Z2024Cedeño Romero, N.S. (2024). Analisys of Effects Generated by Cyberattacks on an SDN Controller in a Synthetic Data Environment [Trabajo de Grado, Universidad Santo Tomás]. Repositorio Institucional.http://hdl.handle.net/11634/59058reponame:Repositorio Institucional Universidad Santo Tomásinstname:Universidad Santo Tomásrepourl:https://repository.usta.edu.coEste proyecto explora la dinámica de un entorno de redes definidas por software (SDN) en respuesta a varios ciberataques, centrándose en el impacto en el rendimiento y la estabilidad de la red. Utilizando una configuración controlada con Mininet y ONOS, establecimos una topología de red diseñada para simular condiciones vulnerables a las amenazas cibernéticas. A través de la implementación del envenenamiento de la topología ARP, se introdujeron tres hosts falsos, comprometiendo la integridad de las comunicaciones de la red. Además, se ejecutó un ataque de inundación de Packet-In, lo que resultó en la falla del controlador ONOS, lo que subrayó los desafíos de administrar el tráfico de red en escenarios de ataque. Los experimentos demostraron cómo se puede explotar la arquitectura de control centralizada de SDN, revelando vulnerabilidades significativas en el manejo del tráfico malicioso. Esta investigación destaca la necesidad crítica de medidas de seguridad mejoradas en las arquitecturas SDN para mitigar los riesgos asociados con las amenazas cibernéticas en evolución, brindando información para futuros desarrollos en estrategias de seguridad de red.This project explores the dynamics of a Software-Defined Networking (SDN) environment in response to various cyberattacks, focusing on the impact on network performance and stability. Utilizing a controlled setup with Mininet and ONOS, we established a network topology designed to simulate conditions vulnerable to cyber threats. Through the implementation of ARP topology poisoning, three fake hosts were introduced, compromising the integrity of network communications. Additionally, a Packet-In flood attack was executed, resulting in the failure of the ONOS controller, which underscored the challenges of managing network traffic under attack scenarios. The experiments demonstrated how SDN's centralized control architecture can be exploited, revealing significant vulnerabilities in handling malicious traffic. This research highlights the critical need for enhanced security measures in SDN architectures to mitigate risks associated with evolving cyber threats, providing insights for future developments in network security strategies.Ingeniero de TelecomunicacionesPregradoapplication/pdfspaUniversidad Santo TomásPregrado Ingeniería de TelecomunicacionesFacultad de Ingeniería de TelecomunicacionesAtribución-NoComercial-SinDerivadas 2.5 Colombiahttp://creativecommons.org/licenses/by-nc-nd/2.5/co/Abierto (Texto Completo)info:eu-repo/semantics/openAccesshttp://purl.org/coar/access_right/c_abf2Analisys of Effects Generated by Cyberattacks on an SDN Controller in a Synthetic Data EnvironmentSDNNetwork SecurityCyberattacksOpenFlowONOSIngeniería de TelecomunicacionesSistema de telecomunicacionesBases de datosSDNSeguridad de redesCiberataquesFlujo abiertoONOSTrabajo de gradoinfo:eu-repo/semantics/acceptedVersionhttp://purl.org/coar/resource_type/c_7a1finfo:eu-repo/semantics/bachelorThesisCRAI-USTA BogotáL. Mhamdi and M. M. Isa, “Securing SDN: Hybrid autoencoder-random forest for intrusion detection and attack mitigation,” J. Netw. Comput. Appl., vol. 225, p. 103868, May 2024, doi: 10.1016/j.jnca.2024.103868.M. W. Nadeem, H. G. Goh, Y. Aun, and V. Ponnusamy, “Detecting and Mitigating Botnet Attacks in Software-Defined Networks Using Deep Learning Techniques,” IEEE Access, vol. 11, pp. 49153–49171, 2023, doi: 10.1109/ACCESS.2023.3277397.M. AbdulRaheem et al., “Machine learning assisted snort and zeek in detecting DDoS attacks in software-defined networking,” Int. J. Inf. Technol., vol. 16, no. 3, pp. 1627–1643, Mar. 2023, doi: 10.1007/s41870-023-01469-3.H. U. Ishtiaq, A. A. Bhutta, and A. N. Mian, “DHCP DoS and starvation attacks on SDN controllers and their mitigation,” J. Comput. Virol. Hacking Tech., vol. 20, no. 1, pp. 15–25, Mar. 2023, doi: 10.1007/s11416-023-00483-0.C. Gonzalez and S. M. Charfadine, “SDN Controllers and ML-Based Anomaly Detection in Embedded Systems: A Comparative Analysis,” in Proceedings - 10th International Conference on Wireless Networks and Mobile Communications, WINCOM 2023, 2023. doi: 10.1109/WINCOM59760.2023.10322912.I. H. Abdulqadder, D. Zou, and I. T. Aziz, “The DAG blockchain: A secure edge assisted honeypot for attack detection and multi-controller based load balancing in SDN 5G,” Futur. Gener. Comput. Syst., vol. 141, pp. 339–354, Apr. 2023, doi: 10.1016/j.future.2022.11.008.S. Karnani and H. K. Shakya, “Mitigation strategies for distributed denial of service (DDoS) in SDN: A survey and taxonomy,” Information Security Journal, vol. 32, no. 6. Taylor & Francis, pp. 444–468, Nov. 02, 2023. doi: 10.1080/19393555.2022.2111004.M. Yue, Q. Yan, Z. Lu, and Z. Wu, “CCS: A Cross-Plane Collaboration Strategy to Defend Against LDoS Attacks in SDN,” IEEE Trans. Netw. Serv. Manag., 2024, doi: 10.1109/TNSM.2024.3363490.D. Tang, Z. Zheng, C. Yin, B. Xiong, Z. Qin, and Q. Yang, “FTODefender: An efficient flow table overflow attacks defending system in SDN,” Expert Syst. Appl., vol. 237, p. 121460, Mar. 2024, doi: 10.1016/j.eswa.2023.121460.D. Tang, Z. Zheng, K. Li, C. Yin, W. Liang, and J. Zhang, “FTOP: An Efficient Flow Table Overflow Preventing System for Switches in SDN,” IEEE Trans. Netw. Sci. Eng., 2023, doi: 10.1109/TNSE.2023.3297650.N. Aslam, S. Srivastava, and M. M. Gore, “A Comprehensive Analysis of Machine Learning- and Deep Learning-Based Solutions for DDoS Attack Detection in SDN,” Arab. J. Sci. Eng., vol. 49, no. 3, pp. 3533–3573, Mar. 2024, doi: 10.1007/s13369- 023-08075-2Toyeer-E-Ferdoush, H. Rahman, and M. Hasan, “A convenient way to mitigate DDoS TCP SYN flood attack,” J. Discret. Math. Sci. Cryptogr., vol. 25, no. 7, pp. 2069–2077, Oct. 2022, doi: 10.1080/09720529.2022.2133246.H. Qian and L. Cai, “Improved K-means-based solution for detecting DDoS attacks in SDN,” Phys. Commun., vol. 64, p. 102318, Jun. 2024, doi: 10.1016/j.phycom.2024.102318.Y. Gao and M. Xu, “Defense Against Software-Defined Network Topology Poisoning Attacks,” Tsinghua Sci. Technol., vol. 28, no. 1, pp. 39–46, 2023, doi: 10.26599/TST.2021.9010077.S. Sunil Gowda and R. B. Dayananda, “Detection And Prevention of ARP Attack in Software Defined Networks,” in 2023 14th International Conference on Computing Communication and Networking Technologies, ICCCNT 2023, 2023. doi: 10.1109/ICCCNT56998.2023.10307123.A. T. Phu et al., “Defending SDN against packet injection attacks using deep learning,” Comput. Networks, vol. 234, p. 109935, Oct. 2023, doi: 10.1016/j.comnet.2023.109935.THUMBNAIL2024cartadederechosdeautor.pdf.jpg2024cartadederechosdeautor.pdf.jpgIM Thumbnailimage/jpeg7468https://repository.usta.edu.co/bitstream/11634/59058/6/2024cartadederechosdeautor.pdf.jpg76fe7754cf5ead64b01b3bd3bcc2c1b9MD56open access2024cartadefacultad.pdf.jpg2024cartadefacultad.pdf.jpgIM Thumbnailimage/jpeg8568https://repository.usta.edu.co/bitstream/11634/59058/7/2024cartadefacultad.pdf.jpgf5c16db24c55e2d8486d3d08c85882f9MD57open access2024nicolascedeño.pdf.jpg2024nicolascedeño.pdf.jpgIM Thumbnailimage/jpeg3835https://repository.usta.edu.co/bitstream/11634/59058/8/2024nicolascede%c3%b1o.pdf.jpg38295b77c5d3f15a12ee9aac7fbfd4b2MD58open accessLICENSElicense.txtlicense.txttext/plain; charset=utf-8807https://repository.usta.edu.co/bitstream/11634/59058/5/license.txtaedeaf396fcd827b537c73d23464fc27MD55open accessCC-LICENSElicense_rdflicense_rdfapplication/rdf+xml; charset=utf-8811https://repository.usta.edu.co/bitstream/11634/59058/4/license_rdf217700a34da79ed616c2feb68d4c5e06MD54open accessORIGINAL2024cartadederechosdeautor.pdf2024cartadederechosdeautor.pdfapplication/pdf316633https://repository.usta.edu.co/bitstream/11634/59058/1/2024cartadederechosdeautor.pdfc2e4bc9a7682a49665f6e5d5f723be39MD51metadata only access2024cartadefacultad.pdf2024cartadefacultad.pdfapplication/pdf290609https://repository.usta.edu.co/bitstream/11634/59058/2/2024cartadefacultad.pdf33c26c779a3dde4156302bacd9373157MD52metadata only access2024nicolascedeño.pdf2024nicolascedeño.pdfapplication/pdf1018207https://repository.usta.edu.co/bitstream/11634/59058/3/2024nicolascede%c3%b1o.pdf1709634f4e48c5146fb8297972e63e0aMD53open access11634/59058oai:repository.usta.edu.co:11634/590582025-01-18 03:01:32.232metadata only accessRepositorio Universidad Santo Tomásrepositorio@usta.edu.coQXV0b3Jpem8gYWwgQ2VudHJvIGRlIFJlY3Vyc29zIHBhcmEgZWwgQXByZW5kaXphamUgeSBsYSBJbnZlc3RpZ2FjacOzbiwgQ1JBSS1VU1RBCmRlIGxhIFVuaXZlcnNpZGFkIFNhbnRvIFRvbcOhcywgcGFyYSBxdWUgY29uIGZpbmVzIGFjYWTDqW1pY29zIGFsbWFjZW5lIGxhCmluZm9ybWFjacOzbiBpbmdyZXNhZGEgcHJldmlhbWVudGUuCgpTZSBwZXJtaXRlIGxhIGNvbnN1bHRhLCByZXByb2R1Y2Npw7NuIHBhcmNpYWwsIHRvdGFsIG8gY2FtYmlvIGRlIGZvcm1hdG8gY29uCmZpbmVzIGRlIGNvbnNlcnZhY2nDs24sIGEgbG9zIHVzdWFyaW9zIGludGVyZXNhZG9zIGVuIGVsIGNvbnRlbmlkbyBkZSBlc3RlCnRyYWJham8sIHBhcmEgdG9kb3MgbG9zIHVzb3MgcXVlIHRlbmdhbiBmaW5hbGlkYWQgYWNhZMOpbWljYSwgc2llbXByZSB5IGN1YW5kbwptZWRpYW50ZSBsYSBjb3JyZXNwb25kaWVudGUgY2l0YSBiaWJsaW9ncsOhZmljYSBzZSBsZSBkw6kgY3LDqWRpdG8gYWwgdHJhYmFqbyBkZQpncmFkbyB5IGEgc3UgYXV0b3IuIERlIGNvbmZvcm1pZGFkIGNvbiBsbyBlc3RhYmxlY2lkbyBlbiBlbCBhcnTDrWN1bG8gMzAgZGUgbGEKTGV5IDIzIGRlIDE5ODIgeSBlbCBhcnTDrWN1bG8gMTEgZGUgbGEgRGVjaXNpw7NuIEFuZGluYSAzNTEgZGUgMTk5Mywg4oCcTG9zIGRlcmVjaG9zCm1vcmFsZXMgc29icmUgZWwgdHJhYmFqbyBzb24gcHJvcGllZGFkIGRlIGxvcyBhdXRvcmVz4oCdLCBsb3MgY3VhbGVzIHNvbgppcnJlbnVuY2lhYmxlcywgaW1wcmVzY3JpcHRpYmxlcywgaW5lbWJhcmdhYmxlcyBlIGluYWxpZW5hYmxlcy4K |
