Research Article
BibTex RIS Cite

Kampüs Ağlarında İnternet Erişimi İçin Bağlantı Katmanı Kimlik Doğrulama Uygulaması

Year 2021, Volume: IDAP-2021 : 5th International Artificial Intelligence and Data Processing symposium Issue: Special, 82 - 92, 20.10.2021
https://doi.org/10.53070/bbd.990930

Abstract

Günümüzde internetin kullanılmadığı bir sektör kalmamış durumdadır. Bunun sonucu olarak hayatımızın her alanında güvenli ve sürdürülebilir internet bağlantısı zaruret haline gelmiştir. Bu denli yaygınlaşan çevrimiçi cihazların yönetimi beraberinde güvenlik sorununu da ortaya çıkarmaktadır. Özellikle internet sağlayıcısı durumunda bulunan kurum ve kuruluşlar için ağa bağlı cihazların tanımlanması, kütük dosyalarının işlenmesi ve herhangi bir hukuki durumda iz sürülebilir olması büyük önem arz etmektedir. Bunu sağlayabilmek adına kurumlar internet hizmeti sunduğu personelini tanımlayabilmeli, yetkisiz girişleri engelleyebilmeli ve çalışma alanı dışındaki web hizmetlerine erişimi kısıtlayabilmelidir. Günümüzde bunu gerçekleştirmek amacıyla belirli bir ölçekten büyük olan kurumlarda güvenlik duvarları hizmet vermektedir. Ayrıca kullanıcı tanımlama konusunda kısıtlayıcı portallar (Captive Portal) kullanılmaktadır.
Bu çalışmada İnönü Üniversitesi örnek alınarak, üniversite kampüs alanları için bir kısıtlayıcı portal uygulaması geliştirilmiştir. Geliştirilen uygulama Eve-Ng ortamında farklı senaryolar üretilerek test edilmiş ve kullanıcı kayıtlanması, yetkilendirilmesi ve internet erişimi başarılı bir şekilde simüle edilmiştir.

References

  • Adnan A. H. ve ark. (2015) A comparative study of WLAN security protocols: WPA, WPA2. International Conference on Advances in Electrical Engineering (ICAEE), Dhaka, pp. 165-169.
  • Akın G., Sezer U. (2009) Güvenlik amaçlı SNMP Walk ile merkezi loglama yazılımı. INET-TR 2009, İstanbul.
  • Akın G., Yüce H., Demir H. (2008, May) FreeRADIUS - LDAP ile kimlik denetimi klavuzu. Ulaknet Çalıştayı.
  • Amitash (2018) LDAP ve veritabanı arasındaki fark. http://www.differencebetween.net/technology/difference-between-ldap-and-database/. Accessed 28 June 2021.
  • Aryeh F. L., Asante M., Danso A. E. Y. (2016) Securing wireless network using pfSense captive portal with RADIUS authentication. Ghana Journal of Technology 1(1): 40-45.
  • Dell Technologies web sitesi, LDAP yapılandırması. https://www.delltechnologies.com/tr-tr/documentation/unity-family/unity-p-security-config-guide/10-unity-c-security-config-guide-ldap-appendix.htm. Accessed 28 June 2021.
  • Diyah H. (2019, July 25) Access point implementation to Unifi device with RADIUS and captive portal authentication method in PT XYZ. https://doi.org/10.31227/osf.io/ve6db.
  • Doğan R. Ö., Türe H. (2013) Opengate captive portal için kullanıcı dostu bir uygulama yazılımı.
  • Dzerkals U., Eve-ng professional cookbook [Electronic version]. https://www.eve-ng.net/index.php/documentation/professional-cookbook/, pp. 13-14. Accessed 26 June 2021.
  • Eroğlu Y. (2016) Unetlab – GNS3’e dişli rakip!. https://blog.yavuzeroglu.com/unetlab/unetlab-gns3e-disli-rakip.html. Accessed 26 June 2021.
  • Glazer, G., Hussey, C & Shea, R. (2003, March 20). CertificateBased Authentication for DHCP [Electronic version]. http://www.thesnowpit.ca/research/other/cbda.pdf. Accessed 20 June 2021.
  • Goeritno A., Afrianto Y., Basri H., Ritzkal (2017, May 17-18) Penerapan integrasi captive portal dengan single sign on (sso) pada layanan hotspot dan sistem informasi akademik. Seminar Nasional ke-2: Sains, Rekayasa, & Teknologi UPH, Tangerang/Endonezya.
  • Hawari M. S., Sumbawati M. S. (2019) Pembelajaran kolaborasi dengan aplikasi Eve-ng pada pembelajaran jaringan komputer di Universitas Negeri Surabaya. Journal of IT-Edu, 04(01): 240-247.
  • Ju H., Han J. (2005) DHCP message authentication with an effective key management, World Academy of Science Engineering and Technology.
  • Korkmaz M. H., Köse C. (2017, May 15-18) Port-based DHCP server design with authentication. 25th Signal Processing and Communications Applications Conference (SIU), Antalya/Turkey.
  • Ldap.com, Why choose LDAP. https://ldap.com/why-choose-ldap/. Accessed 28 June 2021.
  • Linkletter B. (2017) How to set up the UNetLab or Eve-ng network emulator on a Linux system. https://www.brianlinkletter.com/2017/02/how-to-set-up-the-eve-ng-network-emulator-on-a-linux-system/. Accessed 26 June 2021.
  • Natarajan R. (2011) Linux firewall tutorial: IPTables tables, chains, rules Fundamentals. https://www.thegeekstuff.com/2011/01/iptables-fundamentals/. Accessed 12 June 2021.
  • Shinder D., Shinder T., Hinkle T. (2000, March 11) DHCP server management. Managing windows 2000 network services, ISBN:978-1-928994-06-0, Syngress, pp. 101-162.
  • Soewito B. (2014) Building secure wireless access point based on certificate authentication and firewall captive portal. EPJ Web of Conferences, Paris.

A Link-Layer Authentication Application for Internet Access in Campus Networks

Year 2021, Volume: IDAP-2021 : 5th International Artificial Intelligence and Data Processing symposium Issue: Special, 82 - 92, 20.10.2021
https://doi.org/10.53070/bbd.990930

Abstract

Today, there is no sector where the internet is not used. As a result, a secure and sustainable internet connection has become a necessity in all areas of our lives. The management of online devices, which have become so widespread, also raises the security problem. Especially for institutions and organizations that are internet providers, it is of great importance to identify devices connected to the network, to process log files and to be traceable in any legal situation. In order to achieve this, institutions should be able to identify the personnel to whom they provide internet services, prevent unauthorized access and restrict access to web services outside the working area. Today, in order to achieve this, firewalls serve in institutions larger than a certain scale. In addition, Captive Portals are used for user identification.
In this study, a Captive Portal application has been developed for university campus areas, taking İnönü University as an example. The developed application has been tested by producing different scenarios in Eve-Ng environment and user registration, authorization and internet access have been successfully simulated.

References

  • Adnan A. H. ve ark. (2015) A comparative study of WLAN security protocols: WPA, WPA2. International Conference on Advances in Electrical Engineering (ICAEE), Dhaka, pp. 165-169.
  • Akın G., Sezer U. (2009) Güvenlik amaçlı SNMP Walk ile merkezi loglama yazılımı. INET-TR 2009, İstanbul.
  • Akın G., Yüce H., Demir H. (2008, May) FreeRADIUS - LDAP ile kimlik denetimi klavuzu. Ulaknet Çalıştayı.
  • Amitash (2018) LDAP ve veritabanı arasındaki fark. http://www.differencebetween.net/technology/difference-between-ldap-and-database/. Accessed 28 June 2021.
  • Aryeh F. L., Asante M., Danso A. E. Y. (2016) Securing wireless network using pfSense captive portal with RADIUS authentication. Ghana Journal of Technology 1(1): 40-45.
  • Dell Technologies web sitesi, LDAP yapılandırması. https://www.delltechnologies.com/tr-tr/documentation/unity-family/unity-p-security-config-guide/10-unity-c-security-config-guide-ldap-appendix.htm. Accessed 28 June 2021.
  • Diyah H. (2019, July 25) Access point implementation to Unifi device with RADIUS and captive portal authentication method in PT XYZ. https://doi.org/10.31227/osf.io/ve6db.
  • Doğan R. Ö., Türe H. (2013) Opengate captive portal için kullanıcı dostu bir uygulama yazılımı.
  • Dzerkals U., Eve-ng professional cookbook [Electronic version]. https://www.eve-ng.net/index.php/documentation/professional-cookbook/, pp. 13-14. Accessed 26 June 2021.
  • Eroğlu Y. (2016) Unetlab – GNS3’e dişli rakip!. https://blog.yavuzeroglu.com/unetlab/unetlab-gns3e-disli-rakip.html. Accessed 26 June 2021.
  • Glazer, G., Hussey, C & Shea, R. (2003, March 20). CertificateBased Authentication for DHCP [Electronic version]. http://www.thesnowpit.ca/research/other/cbda.pdf. Accessed 20 June 2021.
  • Goeritno A., Afrianto Y., Basri H., Ritzkal (2017, May 17-18) Penerapan integrasi captive portal dengan single sign on (sso) pada layanan hotspot dan sistem informasi akademik. Seminar Nasional ke-2: Sains, Rekayasa, & Teknologi UPH, Tangerang/Endonezya.
  • Hawari M. S., Sumbawati M. S. (2019) Pembelajaran kolaborasi dengan aplikasi Eve-ng pada pembelajaran jaringan komputer di Universitas Negeri Surabaya. Journal of IT-Edu, 04(01): 240-247.
  • Ju H., Han J. (2005) DHCP message authentication with an effective key management, World Academy of Science Engineering and Technology.
  • Korkmaz M. H., Köse C. (2017, May 15-18) Port-based DHCP server design with authentication. 25th Signal Processing and Communications Applications Conference (SIU), Antalya/Turkey.
  • Ldap.com, Why choose LDAP. https://ldap.com/why-choose-ldap/. Accessed 28 June 2021.
  • Linkletter B. (2017) How to set up the UNetLab or Eve-ng network emulator on a Linux system. https://www.brianlinkletter.com/2017/02/how-to-set-up-the-eve-ng-network-emulator-on-a-linux-system/. Accessed 26 June 2021.
  • Natarajan R. (2011) Linux firewall tutorial: IPTables tables, chains, rules Fundamentals. https://www.thegeekstuff.com/2011/01/iptables-fundamentals/. Accessed 12 June 2021.
  • Shinder D., Shinder T., Hinkle T. (2000, March 11) DHCP server management. Managing windows 2000 network services, ISBN:978-1-928994-06-0, Syngress, pp. 101-162.
  • Soewito B. (2014) Building secure wireless access point based on certificate authentication and firewall captive portal. EPJ Web of Conferences, Paris.
There are 20 citations in total.

Details

Primary Language Turkish
Subjects Computer Software
Journal Section PAPERS
Authors

Semra Yıldırım 0000-0002-5339-8695

Kenan İnce 0000-0003-4709-9557

Publication Date October 20, 2021
Submission Date September 3, 2021
Acceptance Date September 16, 2021
Published in Issue Year 2021 Volume: IDAP-2021 : 5th International Artificial Intelligence and Data Processing symposium Issue: Special

Cite

APA Yıldırım, S., & İnce, K. (2021). Kampüs Ağlarında İnternet Erişimi İçin Bağlantı Katmanı Kimlik Doğrulama Uygulaması. Computer Science, IDAP-2021 : 5th International Artificial Intelligence and Data Processing symposium(Special), 82-92. https://doi.org/10.53070/bbd.990930

The Creative Commons Attribution 4.0 International License 88x31.png is applied to all research papers published by JCS and

A Digital Object Identifier (DOI) Logo_TM.png is assigned for each published paper