Research Article
BibTex RIS Cite

Dijital Para Birimlerinde Veri Güvenliği Ve Siber Saldırı Yöntemlerinin Analizi

Year 2022, , 1000 - 1013, 30.09.2022
https://doi.org/10.21923/jesd.978517

Abstract

Teknolojinin son yıllarda hızla gelişmesiyle birlikte bilgi teknolojisindeki dijital veriler hayatın vazgeçilmez bir alanı haline gelmiştir. Dijital veri servislerinin günlük yaşamımızda kullanılması kaçınılmaz hale gelmiştir. Her gün bankalar ve kullanıcılar tarafından para işlemleri, satın almalar ve para havaleleri yapılmaktadır. Kağıt sistemlerden dijital sistemlere geçişle birlikte kullanıcı sayısı her geçen gün artmaktadır ancak bu sistemlerle ilgili güvenlik endişeleri bulunmaktadır. Modern teknolojilerde bilgi hırsızlığı olasılığı, siber saldırı riski ve ihlal korkusu finansal kayıplara yol açabileceği endişesi sürekli yaşanmaktadır. Bu tür dijital para işlemleri, kullanıcıların kişisel verilerini ve gizliliğini taşıdığı için herkesin doğru işlemleri güvenilir bir şekilde tamamlaması gerekmektedir. Finansal işlemlerin ve dijital para birimlerinin günlük yaşamdaki büyük önemi nedeniyle, bu makalede dijital para biriminin özelliklerini ve sahteciliğe nasıl önlem alınması gerektiği açıklanmaktadır. Ayrıca bir kripto para birimini kullanmak için güvenli olan araçların neler olduğunu analiz edilecektir. Bu işlemlerde kullanılan algoritma mekanizmalarının ele alabileceği riskler incelenerek güvenlik sorunları anlatılmaktadır. Ayrıca kripto paranın güvenlik yöntemleri, algoritmaları, dijital para siber saldırı yöntemleri ve güvenlik önlemleri incelenmiştir.

References

  • Abdi, A. I., Eassa, F. E., Jambi K., Almarhabi, K., Al-Ghamdi, A. S. A., 2020. Blockchain Platforms and Access Control Classification for IoT Systems, Symmetry, 12(10), 1663.
  • AL-LAHAM, M., AL-TARAWNEH, H., ABDALLAT, N., 2009. "Development of Electronic Money and Its Impact on the Central Bank Role and Monetary Policy", Issues in Informing Science and Information Technology, 6: 339–349.doi:10.28945/1063.
  • Andola, N. et al., 2021. "Anonymity on blockchain-based e-cash protocols—A survey.", Computer Science Review 40 (2021): 100394.
  • Artisantechgroup, 2021. What is a blockchain, anyway?, https://artisantechgroup.com/what-is-a-blockchain/, (Accessed Date: 29.06.2021).
  • Bank of England, 2021. "Central Bank Digital Currency: Opportunities, Challenges and Design.", (Accessed Date: 10.06.2021).
  • Bank for International Settlements. (2021), "Impending Arrival – A Sequel to the Survey on Central Bank Digital Currency," Page 10, (Accessed Date: 15.06.2021).
  • BCSEC Security Trend Analysis, 2021. https://bcsec.org/analyse, (Accessed Date: 22.06.2021).
  • Bayat-Sarmadi, S., Mozaffari-Kermani, M., and Reyhani-Masoleh, A., 2014. "Efficient and concurrent reliable realization of the secure cryptographic SHA-3 algorithm.", IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 33.7, (2014): 1105-1109.
  • Caporale, G. M. et al., 2020. "Non-linearities, cyber-attacks and cryptocurrencies.", Finance Research Letters 32, (2020): 101297.
  • Bendovschi, A., 2015. "Cyber-attacks–trends, patterns and security countermeasures.", Procedia Economics and Finance 28, (2015): 24-31.
  • Caporale, G. M., et al., 2021. "Cyber-attacks, spillovers and contagion in the cryptocurrency markets.", Journal of International Financial Markets, Institutions and Money, (2021): 101298.
  • Caporale, G. M. et al., 2020. Cyber-attacks and cryptocurrencies, No. 8124, CESifo Working Paper.
  • Caporale, G. M., Kang, W.-Y., SpagnoloPAGNOLO, F., SPAGNOLO, N., 2021. Cyber-attacks and cryptocurrencies (No. 8124), CESifo Working Paper.
  • Casino, F., DASAKLIS, T. K., PATSAKIS, C., 2019. A systematic literature review of blockchain-based applications: Current status, classification and open issues, Telematics and informatics, 36, 55-81.
  • Cisco,2021. https://www.cisco.com/c/m/en_uk/campaigns/security/cyber-threats-and-protection-2018-report/index.html ,(Accessed Date: 03.06.2021).
  • Congressional Research Service, 2021. "Cryptocurrency: The Economics of Money and Selected Policy Issues,", (Accessed Date: 29.06.2021).
  • Coinmarketcap, 2021. “https://coinmarketcap.com/” data taken on 26-04-2021 10:45 PM for top 18 coins, (Accessed Date: 29.06.2021).
  • Cybernews,2021.https://cybernews.com/resources/what-is-aes-encryption/, Accessed May 13, (2021).
  • De Haro-Olmo, F. J., ÁNGEL JESÚS, V.-V., and JOSÉ ANTONİO ÁLVAREZ-BERMEJO, J.A., 2020. "Blockchain from the perspective of privacy and anonymisation: a systematic literature review.", Sensors, 20.24 (2020): 7171.
  • De Silva, S., Goyal, S.B., Bedi, P., 2021. Security Challenges of Digital Currency System. In: Abraham A., Sasaki H., Rios R., Gandhi N., Singh U., Ma K. (eds) Innovations in Bio-Inspired Computing and Applications. IBICA 2020. Advances in Intelligent Systems and Computing, vol 1372. Springer, Cham. https://doi.org/10.1007/978-3-030-73603-3_51
  • Eskandari, S. et al., 2018. "A first look at browser-based cryptojacking.", 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE.
  • Fang, W. et al., 2018. Cybersecurity in the blockchain: threats and countermeasures, J. Cyber Security, 3(2), 87–104.
  • Finyear, 2021. https://www.finyear.com/14-cyber-attacks-on-crypto-exchanges-resulted-in-a-loss-of-882 million_a40041.html, (Accessed Date: 23.06.2021).
  • Gaspar, L. et al., 2009. "Efficient AES s-boxes implementation for non-volatile FPGAs.", 2009 International Conference on Field Programmable Logic and Applications, IEEE, (2009).
  • Guesmi, R. et al. (2016), "A novel chaos-based image encryption using DNA sequence operation and Secure Hash Algorithm SHA-2.", Nonlinear Dynamics, 83.3, (2016): 1123-1136.
  • Gupta, P., Kumar, S., 2014. A comparative analysis of SHA and MD5 algorithm, Architecture, 1, 5.
  • Greeshma, K. V. (2015), Crypto Currencies and Cybercrime, International Journal of Engineering and TechnicalResearch,https://www.ijert.org/research/crypto-currencies, (Accessed Date: 23.06.2021).
  • Heilmen, E. et al. (2015), "Eclipse attacks on bitcoin’s peer-to-peer network.", 24th {USENIX} Security Symposium ({USENIX} Security 15).
  • Investopedia, 2021. https://www.investopedia.com/news/introduction-cardano/, (Accessed Date:21.06.2021).
  • JPMorgan Chase, 2021. "Could Blockchain Have as Great an Impact as the Internet?", (Accessed Date:27.06.2021).
  • Kumar, P., Rana S. B., 2016. Development of modified AES algorithm for data security, Optik, 127(4), 2341-2345.
  • Lee Lai, R., Kuo, L.E.E., Chuen, D., 2018. Handbook of Blockchain, Digital Finance, and Inclusion; Singapore University of Social Sciences: Singapore.
  • Livetechit. (2021), https://www.livetechit.com/hackers-have-looted-more-bitcoin-than-satoshis-entire-stash/, (Accessed Date: 22.06.2021).
  • Mazzutt, R. et al., 2018. "A quantitative analysis of the impact of arbitrary blockchain content on bitcoin.", International Conference on Financial Cryptography and Data Security, Springer, Berlin, Heidelberg.
  • Nadeau, M., 2018. "What is cryptojacking? How to prevent, detect, and recover from it.", CSO Online.
  • Newreleases, 2021. https://newreleases.io/project/github/litecoinproject/litecoin/release/v0.18.1, (Accessed Date: 10.06.2021).
  • Nytimes, 2021. Ethereum-bitcoin-digital, https://www.nytimes.com/2017/06/19/business/dealbook/ethereum-bitcoin-digital-currency.html, (Erişim Tarihi: 09.06.2021).
  • Polge, J., Robert, J., Le Traon, Y., 2021. Permissioned blockchain frameworks in the industry: A comparison, Ict. Express, 7(2), 229-233.
  • Saad, M., Aminollah K., and Mohaisen A., 2018, "End-to-end analysis of in-browser cryptojacking.", arXiv preprint arXiv:1809.02152, (2018).
  • Tandon, A., Kaur, P., Mäntymäki, M., Dhir, A., 2021. Blockchain applications in management: A bibliometric analysis and literature review, Technological Forecasting and Social Change, Volume 166, https://doi.org/10.1016/j.techfore.2021.120649.
  • Thenextweb, 2021. https://thenextweb.com/news/can-blockchain-democratize-education-this-startup-seems-to-think-so, (Accessed Date: 11.06.2021).
  • Wang, H. et al., 2018. "An overview of blockchain security analysis.", China Cyber Security Annual Conference, Springer, Singapore.
  • Zhang, J., Zhong, S., Wang, T., Chao, H. C., Wang, J., 2020. Blockchain-based systems and applications: a survey, Journal of Internet Technology, 21(1), 1-14.
  • Zhu, S., Zhu, C., and Wang, W., 2018. "A new image encryption algorithm based on chaos and secure hash SHA-256.", Entropy 20.9, (2018): 716.

ANALYSIS OF DATA SECURITY AND CYBER-ATTACK METHODS IN DIGITAL CURRENCY

Year 2022, , 1000 - 1013, 30.09.2022
https://doi.org/10.21923/jesd.978517

Abstract

With the rapid development of technology in recent years, digital data in information technology has become an indispensable area of life. The use of digital data services in our daily lives has become inevitable. Money transactions, purchases, and money transfers are made by banks and users every day. With the transition from paper systems to digital systems, the number of users is increasing day by day, but there are security concerns about these systems. In modern technologies, the possibility of information theft, the risk of cyber-attack, and the fear of breaches are constantly being worried about financial losses. Since such digital currency transactions carry the personal data and privacy of users, everyone needs to complete the correct transactions reliably. Due to the great importance of financial transactions and digital currencies in daily life, this article explains the features of digital currency and how to prevent counterfeiting. It will also analyze what tools are safe to use in a cryptocurrency. The risks that the algorithm mechanisms used in these processes can handle are examined and security problems are explained. In addition, security methods, algorithms, digital currency cyber-attack methods, and security measures of crypto money are examined.

References

  • Abdi, A. I., Eassa, F. E., Jambi K., Almarhabi, K., Al-Ghamdi, A. S. A., 2020. Blockchain Platforms and Access Control Classification for IoT Systems, Symmetry, 12(10), 1663.
  • AL-LAHAM, M., AL-TARAWNEH, H., ABDALLAT, N., 2009. "Development of Electronic Money and Its Impact on the Central Bank Role and Monetary Policy", Issues in Informing Science and Information Technology, 6: 339–349.doi:10.28945/1063.
  • Andola, N. et al., 2021. "Anonymity on blockchain-based e-cash protocols—A survey.", Computer Science Review 40 (2021): 100394.
  • Artisantechgroup, 2021. What is a blockchain, anyway?, https://artisantechgroup.com/what-is-a-blockchain/, (Accessed Date: 29.06.2021).
  • Bank of England, 2021. "Central Bank Digital Currency: Opportunities, Challenges and Design.", (Accessed Date: 10.06.2021).
  • Bank for International Settlements. (2021), "Impending Arrival – A Sequel to the Survey on Central Bank Digital Currency," Page 10, (Accessed Date: 15.06.2021).
  • BCSEC Security Trend Analysis, 2021. https://bcsec.org/analyse, (Accessed Date: 22.06.2021).
  • Bayat-Sarmadi, S., Mozaffari-Kermani, M., and Reyhani-Masoleh, A., 2014. "Efficient and concurrent reliable realization of the secure cryptographic SHA-3 algorithm.", IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 33.7, (2014): 1105-1109.
  • Caporale, G. M. et al., 2020. "Non-linearities, cyber-attacks and cryptocurrencies.", Finance Research Letters 32, (2020): 101297.
  • Bendovschi, A., 2015. "Cyber-attacks–trends, patterns and security countermeasures.", Procedia Economics and Finance 28, (2015): 24-31.
  • Caporale, G. M., et al., 2021. "Cyber-attacks, spillovers and contagion in the cryptocurrency markets.", Journal of International Financial Markets, Institutions and Money, (2021): 101298.
  • Caporale, G. M. et al., 2020. Cyber-attacks and cryptocurrencies, No. 8124, CESifo Working Paper.
  • Caporale, G. M., Kang, W.-Y., SpagnoloPAGNOLO, F., SPAGNOLO, N., 2021. Cyber-attacks and cryptocurrencies (No. 8124), CESifo Working Paper.
  • Casino, F., DASAKLIS, T. K., PATSAKIS, C., 2019. A systematic literature review of blockchain-based applications: Current status, classification and open issues, Telematics and informatics, 36, 55-81.
  • Cisco,2021. https://www.cisco.com/c/m/en_uk/campaigns/security/cyber-threats-and-protection-2018-report/index.html ,(Accessed Date: 03.06.2021).
  • Congressional Research Service, 2021. "Cryptocurrency: The Economics of Money and Selected Policy Issues,", (Accessed Date: 29.06.2021).
  • Coinmarketcap, 2021. “https://coinmarketcap.com/” data taken on 26-04-2021 10:45 PM for top 18 coins, (Accessed Date: 29.06.2021).
  • Cybernews,2021.https://cybernews.com/resources/what-is-aes-encryption/, Accessed May 13, (2021).
  • De Haro-Olmo, F. J., ÁNGEL JESÚS, V.-V., and JOSÉ ANTONİO ÁLVAREZ-BERMEJO, J.A., 2020. "Blockchain from the perspective of privacy and anonymisation: a systematic literature review.", Sensors, 20.24 (2020): 7171.
  • De Silva, S., Goyal, S.B., Bedi, P., 2021. Security Challenges of Digital Currency System. In: Abraham A., Sasaki H., Rios R., Gandhi N., Singh U., Ma K. (eds) Innovations in Bio-Inspired Computing and Applications. IBICA 2020. Advances in Intelligent Systems and Computing, vol 1372. Springer, Cham. https://doi.org/10.1007/978-3-030-73603-3_51
  • Eskandari, S. et al., 2018. "A first look at browser-based cryptojacking.", 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE.
  • Fang, W. et al., 2018. Cybersecurity in the blockchain: threats and countermeasures, J. Cyber Security, 3(2), 87–104.
  • Finyear, 2021. https://www.finyear.com/14-cyber-attacks-on-crypto-exchanges-resulted-in-a-loss-of-882 million_a40041.html, (Accessed Date: 23.06.2021).
  • Gaspar, L. et al., 2009. "Efficient AES s-boxes implementation for non-volatile FPGAs.", 2009 International Conference on Field Programmable Logic and Applications, IEEE, (2009).
  • Guesmi, R. et al. (2016), "A novel chaos-based image encryption using DNA sequence operation and Secure Hash Algorithm SHA-2.", Nonlinear Dynamics, 83.3, (2016): 1123-1136.
  • Gupta, P., Kumar, S., 2014. A comparative analysis of SHA and MD5 algorithm, Architecture, 1, 5.
  • Greeshma, K. V. (2015), Crypto Currencies and Cybercrime, International Journal of Engineering and TechnicalResearch,https://www.ijert.org/research/crypto-currencies, (Accessed Date: 23.06.2021).
  • Heilmen, E. et al. (2015), "Eclipse attacks on bitcoin’s peer-to-peer network.", 24th {USENIX} Security Symposium ({USENIX} Security 15).
  • Investopedia, 2021. https://www.investopedia.com/news/introduction-cardano/, (Accessed Date:21.06.2021).
  • JPMorgan Chase, 2021. "Could Blockchain Have as Great an Impact as the Internet?", (Accessed Date:27.06.2021).
  • Kumar, P., Rana S. B., 2016. Development of modified AES algorithm for data security, Optik, 127(4), 2341-2345.
  • Lee Lai, R., Kuo, L.E.E., Chuen, D., 2018. Handbook of Blockchain, Digital Finance, and Inclusion; Singapore University of Social Sciences: Singapore.
  • Livetechit. (2021), https://www.livetechit.com/hackers-have-looted-more-bitcoin-than-satoshis-entire-stash/, (Accessed Date: 22.06.2021).
  • Mazzutt, R. et al., 2018. "A quantitative analysis of the impact of arbitrary blockchain content on bitcoin.", International Conference on Financial Cryptography and Data Security, Springer, Berlin, Heidelberg.
  • Nadeau, M., 2018. "What is cryptojacking? How to prevent, detect, and recover from it.", CSO Online.
  • Newreleases, 2021. https://newreleases.io/project/github/litecoinproject/litecoin/release/v0.18.1, (Accessed Date: 10.06.2021).
  • Nytimes, 2021. Ethereum-bitcoin-digital, https://www.nytimes.com/2017/06/19/business/dealbook/ethereum-bitcoin-digital-currency.html, (Erişim Tarihi: 09.06.2021).
  • Polge, J., Robert, J., Le Traon, Y., 2021. Permissioned blockchain frameworks in the industry: A comparison, Ict. Express, 7(2), 229-233.
  • Saad, M., Aminollah K., and Mohaisen A., 2018, "End-to-end analysis of in-browser cryptojacking.", arXiv preprint arXiv:1809.02152, (2018).
  • Tandon, A., Kaur, P., Mäntymäki, M., Dhir, A., 2021. Blockchain applications in management: A bibliometric analysis and literature review, Technological Forecasting and Social Change, Volume 166, https://doi.org/10.1016/j.techfore.2021.120649.
  • Thenextweb, 2021. https://thenextweb.com/news/can-blockchain-democratize-education-this-startup-seems-to-think-so, (Accessed Date: 11.06.2021).
  • Wang, H. et al., 2018. "An overview of blockchain security analysis.", China Cyber Security Annual Conference, Springer, Singapore.
  • Zhang, J., Zhong, S., Wang, T., Chao, H. C., Wang, J., 2020. Blockchain-based systems and applications: a survey, Journal of Internet Technology, 21(1), 1-14.
  • Zhu, S., Zhu, C., and Wang, W., 2018. "A new image encryption algorithm based on chaos and secure hash SHA-256.", Entropy 20.9, (2018): 716.
There are 44 citations in total.

Details

Primary Language English
Subjects Computer Software
Journal Section Research Articles
Authors

İsa Avcı 0000-0001-7032-8018

Publication Date September 30, 2022
Submission Date August 4, 2021
Acceptance Date March 22, 2022
Published in Issue Year 2022

Cite

APA Avcı, İ. (2022). ANALYSIS OF DATA SECURITY AND CYBER-ATTACK METHODS IN DIGITAL CURRENCY. Mühendislik Bilimleri Ve Tasarım Dergisi, 10(3), 1000-1013. https://doi.org/10.21923/jesd.978517