Araştırma Makalesi
BibTex RIS Kaynak Göster

Bir Güvenlik Trendi: Bal Küpü

Yıl 2018, Cilt: 2 Sayı: 1, 1 - 11, 26.06.2018
https://doi.org/10.30801/acin.356815

Öz











Bu
çalışma, bilişim dünyasında güvenliği sağlamak adına kullanılmakta olan ve her
geçen gün popülerliği artan bal küpleri hakkında bir araştırma niteliğindedir.
Honeypot olarak kullanılan bu terim dilimize bal küpü olarak geçmiştir. Bal
küplerinin birçok çeşidi vardır. Çalışmamızda bu çeşitleri açıklamaya
odaklanılmıştır. Bu amaca ek olarak, bal küpü sistemlerinin birçok alanda
kullanılmış örneklerinin de okuyucuya sunulması hedeflenmiş ve bir bal küpü
sistemi hazırlanarak üzerinde sql enjeksiyonu test edilmiştir.
    

Kaynakça

  • [1] Antivirus software. 2017, En.wikipedia.org. Retrieved 1 February 2017, from http://en.wikipedia.org/wiki/Antivirus_software
  • [2] Yang, Y., Yang, H., & Mi, J. 2011, “Design of distributed honeypot system based on intrusion tracking” In 2011 IEEE 3rd International Conference on Communication Software and Networks. IEEE.
  • [3] Kuwatly, I., Sraj, M., & Al Masri, Z. 2004, “A Dynamic Honeypot Design for Intrusion Detection” In The IEEE/ACS International Conference on Pervasive Services. IEEE.
  • [4] Zakaria, W., & Kiah, M. 2012, “A review on artificial intelligence techniques for developing intelligent honeypot” In 2012 8th International Conference on Computing Technology and Information Management (NCM and ICNIT). IEEE.
  • [5] Song, Y., Zhu, X., Hong, Y., Zhang, H., & Tan, H. 2012, “A Mobile Communication Honeypot Observing System” In 2012 Fourth International Conference on Multimedia Information Networking and Security. IEEE.
  • [6] Chauhan, S., & Shiwani, S. 2017, “A honeypots based anti-phishing framework” In 2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT). IEEE.
  • [7] Sharma, S. 2016, “Detection and analysis of network & application layer attacks using Maya Honeypot” In 2016 6th International Conference - Cloud System and Big Data Engineering (Confluence). IEEE.
  • [8] Singh, A., & Joshi, R. 2011, “A honeypot system for efficient capture and analysis of network attack traffic” In 2011 International Conference on Signal Processing, Communication, Computing and Networking Technologies. IEEE.
  • [9] Djanali, S., Arunanto, F., Pratomo, B., Baihaqi, A., Studiawan, H., & Shiddiqi, A. 2014, “Aggressive web application honeypot for exposing attacker's identity” In 2014 The 1st International Conference on Information Technology, Computer, and Electrical Engineering. IEEE.
  • [10] Koniaris, I., Papadimitriou, G., & Nicopolitidis, P. 2013, “Analysis and visualization of SSH attacks using honeypots” In Eurocon 2013. IEEE.
  • [11] On Security Issues in Web Applications through Cross Site Scripting (XSS) 2013, In 2013 20th Asia-Pacific Software Engineering Conference (APSEC). IEEE.
Yıl 2018, Cilt: 2 Sayı: 1, 1 - 11, 26.06.2018
https://doi.org/10.30801/acin.356815

Öz

Kaynakça

  • [1] Antivirus software. 2017, En.wikipedia.org. Retrieved 1 February 2017, from http://en.wikipedia.org/wiki/Antivirus_software
  • [2] Yang, Y., Yang, H., & Mi, J. 2011, “Design of distributed honeypot system based on intrusion tracking” In 2011 IEEE 3rd International Conference on Communication Software and Networks. IEEE.
  • [3] Kuwatly, I., Sraj, M., & Al Masri, Z. 2004, “A Dynamic Honeypot Design for Intrusion Detection” In The IEEE/ACS International Conference on Pervasive Services. IEEE.
  • [4] Zakaria, W., & Kiah, M. 2012, “A review on artificial intelligence techniques for developing intelligent honeypot” In 2012 8th International Conference on Computing Technology and Information Management (NCM and ICNIT). IEEE.
  • [5] Song, Y., Zhu, X., Hong, Y., Zhang, H., & Tan, H. 2012, “A Mobile Communication Honeypot Observing System” In 2012 Fourth International Conference on Multimedia Information Networking and Security. IEEE.
  • [6] Chauhan, S., & Shiwani, S. 2017, “A honeypots based anti-phishing framework” In 2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT). IEEE.
  • [7] Sharma, S. 2016, “Detection and analysis of network & application layer attacks using Maya Honeypot” In 2016 6th International Conference - Cloud System and Big Data Engineering (Confluence). IEEE.
  • [8] Singh, A., & Joshi, R. 2011, “A honeypot system for efficient capture and analysis of network attack traffic” In 2011 International Conference on Signal Processing, Communication, Computing and Networking Technologies. IEEE.
  • [9] Djanali, S., Arunanto, F., Pratomo, B., Baihaqi, A., Studiawan, H., & Shiddiqi, A. 2014, “Aggressive web application honeypot for exposing attacker's identity” In 2014 The 1st International Conference on Information Technology, Computer, and Electrical Engineering. IEEE.
  • [10] Koniaris, I., Papadimitriou, G., & Nicopolitidis, P. 2013, “Analysis and visualization of SSH attacks using honeypots” In Eurocon 2013. IEEE.
  • [11] On Security Issues in Web Applications through Cross Site Scripting (XSS) 2013, In 2013 20th Asia-Pacific Software Engineering Conference (APSEC). IEEE.
Toplam 11 adet kaynakça vardır.

Ayrıntılar

Birincil Dil Türkçe
Konular Bilgisayar Yazılımı
Bölüm Makaleler
Yazarlar

Süleyman Muhammed Arıkan 0000-0003-1526-2970

Recep Benzer 0000-0002-5339-0554

Yayımlanma Tarihi 26 Haziran 2018
Gönderilme Tarihi 21 Kasım 2017
Yayımlandığı Sayı Yıl 2018 Cilt: 2 Sayı: 1

Kaynak Göster

APA Arıkan, S. M., & Benzer, R. (2018). Bir Güvenlik Trendi: Bal Küpü. Acta Infologica, 2(1), 1-11. https://doi.org/10.30801/acin.356815
AMA Arıkan SM, Benzer R. Bir Güvenlik Trendi: Bal Küpü. ACIN. Haziran 2018;2(1):1-11. doi:10.30801/acin.356815
Chicago Arıkan, Süleyman Muhammed, ve Recep Benzer. “Bir Güvenlik Trendi: Bal Küpü”. Acta Infologica 2, sy. 1 (Haziran 2018): 1-11. https://doi.org/10.30801/acin.356815.
EndNote Arıkan SM, Benzer R (01 Haziran 2018) Bir Güvenlik Trendi: Bal Küpü. Acta Infologica 2 1 1–11.
IEEE S. M. Arıkan ve R. Benzer, “Bir Güvenlik Trendi: Bal Küpü”, ACIN, c. 2, sy. 1, ss. 1–11, 2018, doi: 10.30801/acin.356815.
ISNAD Arıkan, Süleyman Muhammed - Benzer, Recep. “Bir Güvenlik Trendi: Bal Küpü”. Acta Infologica 2/1 (Haziran 2018), 1-11. https://doi.org/10.30801/acin.356815.
JAMA Arıkan SM, Benzer R. Bir Güvenlik Trendi: Bal Küpü. ACIN. 2018;2:1–11.
MLA Arıkan, Süleyman Muhammed ve Recep Benzer. “Bir Güvenlik Trendi: Bal Küpü”. Acta Infologica, c. 2, sy. 1, 2018, ss. 1-11, doi:10.30801/acin.356815.
Vancouver Arıkan SM, Benzer R. Bir Güvenlik Trendi: Bal Küpü. ACIN. 2018;2(1):1-11.