Research Article
BibTex RIS Cite

Bir Güvenlik Trendi: Bal Küpü

Year 2018, , 1 - 11, 26.06.2018
https://doi.org/10.30801/acin.356815

Abstract











Bu
çalışma, bilişim dünyasında güvenliği sağlamak adına kullanılmakta olan ve her
geçen gün popülerliği artan bal küpleri hakkında bir araştırma niteliğindedir.
Honeypot olarak kullanılan bu terim dilimize bal küpü olarak geçmiştir. Bal
küplerinin birçok çeşidi vardır. Çalışmamızda bu çeşitleri açıklamaya
odaklanılmıştır. Bu amaca ek olarak, bal küpü sistemlerinin birçok alanda
kullanılmış örneklerinin de okuyucuya sunulması hedeflenmiş ve bir bal küpü
sistemi hazırlanarak üzerinde sql enjeksiyonu test edilmiştir.
    

References

  • [1] Antivirus software. 2017, En.wikipedia.org. Retrieved 1 February 2017, from http://en.wikipedia.org/wiki/Antivirus_software
  • [2] Yang, Y., Yang, H., & Mi, J. 2011, “Design of distributed honeypot system based on intrusion tracking” In 2011 IEEE 3rd International Conference on Communication Software and Networks. IEEE.
  • [3] Kuwatly, I., Sraj, M., & Al Masri, Z. 2004, “A Dynamic Honeypot Design for Intrusion Detection” In The IEEE/ACS International Conference on Pervasive Services. IEEE.
  • [4] Zakaria, W., & Kiah, M. 2012, “A review on artificial intelligence techniques for developing intelligent honeypot” In 2012 8th International Conference on Computing Technology and Information Management (NCM and ICNIT). IEEE.
  • [5] Song, Y., Zhu, X., Hong, Y., Zhang, H., & Tan, H. 2012, “A Mobile Communication Honeypot Observing System” In 2012 Fourth International Conference on Multimedia Information Networking and Security. IEEE.
  • [6] Chauhan, S., & Shiwani, S. 2017, “A honeypots based anti-phishing framework” In 2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT). IEEE.
  • [7] Sharma, S. 2016, “Detection and analysis of network & application layer attacks using Maya Honeypot” In 2016 6th International Conference - Cloud System and Big Data Engineering (Confluence). IEEE.
  • [8] Singh, A., & Joshi, R. 2011, “A honeypot system for efficient capture and analysis of network attack traffic” In 2011 International Conference on Signal Processing, Communication, Computing and Networking Technologies. IEEE.
  • [9] Djanali, S., Arunanto, F., Pratomo, B., Baihaqi, A., Studiawan, H., & Shiddiqi, A. 2014, “Aggressive web application honeypot for exposing attacker's identity” In 2014 The 1st International Conference on Information Technology, Computer, and Electrical Engineering. IEEE.
  • [10] Koniaris, I., Papadimitriou, G., & Nicopolitidis, P. 2013, “Analysis and visualization of SSH attacks using honeypots” In Eurocon 2013. IEEE.
  • [11] On Security Issues in Web Applications through Cross Site Scripting (XSS) 2013, In 2013 20th Asia-Pacific Software Engineering Conference (APSEC). IEEE.
Year 2018, , 1 - 11, 26.06.2018
https://doi.org/10.30801/acin.356815

Abstract

References

  • [1] Antivirus software. 2017, En.wikipedia.org. Retrieved 1 February 2017, from http://en.wikipedia.org/wiki/Antivirus_software
  • [2] Yang, Y., Yang, H., & Mi, J. 2011, “Design of distributed honeypot system based on intrusion tracking” In 2011 IEEE 3rd International Conference on Communication Software and Networks. IEEE.
  • [3] Kuwatly, I., Sraj, M., & Al Masri, Z. 2004, “A Dynamic Honeypot Design for Intrusion Detection” In The IEEE/ACS International Conference on Pervasive Services. IEEE.
  • [4] Zakaria, W., & Kiah, M. 2012, “A review on artificial intelligence techniques for developing intelligent honeypot” In 2012 8th International Conference on Computing Technology and Information Management (NCM and ICNIT). IEEE.
  • [5] Song, Y., Zhu, X., Hong, Y., Zhang, H., & Tan, H. 2012, “A Mobile Communication Honeypot Observing System” In 2012 Fourth International Conference on Multimedia Information Networking and Security. IEEE.
  • [6] Chauhan, S., & Shiwani, S. 2017, “A honeypots based anti-phishing framework” In 2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT). IEEE.
  • [7] Sharma, S. 2016, “Detection and analysis of network & application layer attacks using Maya Honeypot” In 2016 6th International Conference - Cloud System and Big Data Engineering (Confluence). IEEE.
  • [8] Singh, A., & Joshi, R. 2011, “A honeypot system for efficient capture and analysis of network attack traffic” In 2011 International Conference on Signal Processing, Communication, Computing and Networking Technologies. IEEE.
  • [9] Djanali, S., Arunanto, F., Pratomo, B., Baihaqi, A., Studiawan, H., & Shiddiqi, A. 2014, “Aggressive web application honeypot for exposing attacker's identity” In 2014 The 1st International Conference on Information Technology, Computer, and Electrical Engineering. IEEE.
  • [10] Koniaris, I., Papadimitriou, G., & Nicopolitidis, P. 2013, “Analysis and visualization of SSH attacks using honeypots” In Eurocon 2013. IEEE.
  • [11] On Security Issues in Web Applications through Cross Site Scripting (XSS) 2013, In 2013 20th Asia-Pacific Software Engineering Conference (APSEC). IEEE.
There are 11 citations in total.

Details

Primary Language Turkish
Subjects Computer Software
Journal Section Makaleler
Authors

Süleyman Muhammed Arıkan 0000-0003-1526-2970

Recep Benzer 0000-0002-5339-0554

Publication Date June 26, 2018
Submission Date November 21, 2017
Published in Issue Year 2018

Cite

APA Arıkan, S. M., & Benzer, R. (2018). Bir Güvenlik Trendi: Bal Küpü. Acta Infologica, 2(1), 1-11. https://doi.org/10.30801/acin.356815
AMA Arıkan SM, Benzer R. Bir Güvenlik Trendi: Bal Küpü. ACIN. June 2018;2(1):1-11. doi:10.30801/acin.356815
Chicago Arıkan, Süleyman Muhammed, and Recep Benzer. “Bir Güvenlik Trendi: Bal Küpü”. Acta Infologica 2, no. 1 (June 2018): 1-11. https://doi.org/10.30801/acin.356815.
EndNote Arıkan SM, Benzer R (June 1, 2018) Bir Güvenlik Trendi: Bal Küpü. Acta Infologica 2 1 1–11.
IEEE S. M. Arıkan and R. Benzer, “Bir Güvenlik Trendi: Bal Küpü”, ACIN, vol. 2, no. 1, pp. 1–11, 2018, doi: 10.30801/acin.356815.
ISNAD Arıkan, Süleyman Muhammed - Benzer, Recep. “Bir Güvenlik Trendi: Bal Küpü”. Acta Infologica 2/1 (June 2018), 1-11. https://doi.org/10.30801/acin.356815.
JAMA Arıkan SM, Benzer R. Bir Güvenlik Trendi: Bal Küpü. ACIN. 2018;2:1–11.
MLA Arıkan, Süleyman Muhammed and Recep Benzer. “Bir Güvenlik Trendi: Bal Küpü”. Acta Infologica, vol. 2, no. 1, 2018, pp. 1-11, doi:10.30801/acin.356815.
Vancouver Arıkan SM, Benzer R. Bir Güvenlik Trendi: Bal Küpü. ACIN. 2018;2(1):1-11.