<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article  article-type="research-article"        dtd-version="1.4">
            <front>

                <journal-meta>
                                    <journal-id></journal-id>
            <journal-title-group>
                                                                                    <journal-title>İstanbul Ticaret Üniversitesi Fen Bilimleri Dergisi</journal-title>
            </journal-title-group>
                            <issn pub-type="ppub">1305-7820</issn>
                                        <issn pub-type="epub">2587-165X</issn>
                                                                                            <publisher>
                    <publisher-name>Istanbul Ticaret University</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id pub-id-type="doi">10.55071/ticaretfbd.1245975</article-id>
                                                                <article-categories>
                                            <subj-group  xml:lang="en">
                                                            <subject>Computer Software</subject>
                                                    </subj-group>
                                            <subj-group  xml:lang="tr">
                                                            <subject>Bilgisayar Yazılımı</subject>
                                                    </subj-group>
                                    </article-categories>
                                                                                                                                                        <title-group>
                                                                                                                        <article-title>BALKÜPLERİNİN SALDIRI VE SAVUNMA AÇISINDAN İNCELENMESİ</article-title>
                                                                                                                                                                                                <trans-title-group xml:lang="en">
                                    <trans-title>EXAMINATION OF HONEYPOTS FROM OFFENSIVE AND DEFENSIVE PERSPECTIVE</trans-title>
                                </trans-title-group>
                                                                                                    </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0002-2524-439X</contrib-id>
                                                                <name>
                                    <surname>Karabay</surname>
                                    <given-names>Muhammed Sadık</given-names>
                                </name>
                                                                    <aff>Kuveyt Türk Katılım Bankası</aff>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0002-6133-8617</contrib-id>
                                                                <name>
                                    <surname>Eyüpoğlu</surname>
                                    <given-names>Can</given-names>
                                </name>
                                                                    <aff>MİLLİ SAVUNMA ÜNİVERSİTESİ, HAVA HARP OKULU</aff>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                        <pub-date pub-type="pub" iso-8601-date="20230629">
                    <day>06</day>
                    <month>29</month>
                    <year>2023</year>
                </pub-date>
                                        <volume>22</volume>
                                        <issue>43</issue>
                                        <fpage>15</fpage>
                                        <lpage>32</lpage>
                        
                        <history>
                                    <date date-type="received" iso-8601-date="20230201">
                        <day>02</day>
                        <month>01</month>
                        <year>2023</year>
                    </date>
                                                    <date date-type="accepted" iso-8601-date="20230413">
                        <day>04</day>
                        <month>13</month>
                        <year>2023</year>
                    </date>
                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 2002, İstanbul Commerce University Journal of Science</copyright-statement>
                    <copyright-year>2002</copyright-year>
                    <copyright-holder>İstanbul Commerce University Journal of Science</copyright-holder>
                </permissions>
            
                                                                                                <abstract><p>Geçtiğimiz son 20 yıldaki teknolojik gelişmelerle beraber bilgisayar ağlarının kapasitesi ve bağlanan cihaz sayısı sürekli artmaktadır. Özellikle nesnelerin interneti (Internet of Things-IoT) teknolojisi ile internete bağlı cihaz sayısının 50 milyarı aşması beklenmektedir. Son kullanıcı tarafından kullanılan akıllı cihazlar ve bu cihazların kullanımındaki artış beraberinde devasa boyutlardaki veri akışını da getirmiştir. Covid-19 süreci ile uzaktan çalışma, çevrimiçi eğitim vb. durumlar neredeyse tüm işlemleri internet üzerinden yürütmeye ve verilere internet üzerinden erişime olanak vermiştir. Tüm bunlarla beraber, verilerin saklandığı, yürütüldüğü ve işlendiği sistemler saldırganların hedefi haline gelmiştir. Bu çalışmada olası siber saldırı senaryolarında saldırganların kurumsal ağ sisteminin içine sızması durumunda saldırganların dikkatini başka yöne çekmesine olanak sağlayacak balküpü sistemleri, hem saldırgan hem de savunan bakış açısıyla ele alınmıştır.</p></abstract>
                                                                                                                                    <trans-abstract xml:lang="en">
                            <p>With the technological developments in the last two decades, the capacity of computer networks and the number of connected devices are constantly increased. Especially with the Internet of Things (IoT) technology, the number of devices connected to the Internet is expected to exceed 50 billion. The smart devices used by the end users and the increase in the use of these devices have brought with them huge data flow. With the Covid-19 process, remote work, online education, etc. systems have made it possible to do almost all activities online and to access data over the internet. With all this, the systems in which data is stored, executed and processed have become the target of attackers. In this study, honeypot systems, which will allow attackers to divert the attention of attackers in case of infiltration into the corporate network system in possible cyber attack scenarios, are discussed from both the attacker and the defender perspective.</p></trans-abstract>
                                                            
            
                                                            <kwd-group>
                                                    <kwd>Balküpü</kwd>
                                                    <kwd>  Siber Saldırı</kwd>
                                                    <kwd>  Tuzak Sistemler</kwd>
                                                    <kwd>  Kızıl Takım</kwd>
                                            </kwd-group>
                                                        
                                                                            <kwd-group xml:lang="en">
                                                    <kwd>Cyber attack</kwd>
                                                    <kwd>  honeypot</kwd>
                                                    <kwd>  red team</kwd>
                                                    <kwd>  trap systems</kwd>
                                            </kwd-group>
                                                                                                            </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">Al-Jameel, S., &amp; Alanazi, A. A. (2021). Honeypots Tools Study and Analysis. International Journal of Computer Science &amp; Network Security, 21(1), 162-173.</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">Amal, M. R., &amp; Venkadesh, P. (2023). H-Doctor: Honeypot based firewall tuning for attack prevention. Measurement: Sensors, 25, 100664.</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">Bagyalakshmi, G., Rajkumar, G., Arunkumar, N., Easwaran, M., Narasimhan, K., Elamaran, V., &amp; Ramirez-Gonzalez, G. (2018). Network vulnerability analysis on brain signal/image databases using Nmap and Wireshark tools. IEEE Access, 6, 57144-57151.</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">Borkar, A., Salunke, A., Barabde, A., &amp; Karlekar, N. P. (2011, February, 25-26). Honeypot: a survey of technologies, tools and deployment. Proceedings of the International Conference &amp; Workshop on Emerging Trends in Technology, India, 1357-1357.</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">Bringer, M. L., Chelmecki, C. A., &amp; Fujinoki, H. (2012). A survey: Recent advances and future trends in honeypot research. International Journal of Computer Network and Information Security, 4(10), 63-75.</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">Campbell, R. M., Padayachee, K., &amp; Masombuka, T. (2015, December, 14-16). A survey of honeypot research: Trends and opportunities. In 10th International Conference for Internet Technology and Secured Transactions (ICITST), IEEE, 208-212.</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">Chen, P. T., Laih, C. S., Pouget, F., &amp; Dacier, M. (2005, November, 07-09). Comparative survey of local honeypot sensors to assist network forensics. In First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE&#039;05), IEEE, 120-132.</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">Dalamagkas, C., Sarigiannidis, P., Ioannidis, D., Iturbe, E., Nikolis, O., Ramos, F., ... &amp; Tzovaras, D. (2019, June, 24-28). A survey on honeypots, honeynets and their applications on smart grid. In 2019 IEEE Conference on Network Softwarization (NetSoft), IEEE, 93-100.</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">Denis, M., Zena, C., &amp; Hayajneh, T. (2016, April, 29-29). Penetration testing: Concepts, attack methods, and defense strategies. In 2016 IEEE Long Island Systems, Applications and Technology Conference (LISAT), IEEE, 1-6.</mixed-citation>
                    </ref>
                                    <ref id="ref10">
                        <label>10</label>
                        <mixed-citation publication-type="journal">Fan, W., Du, Z., Fernández, D., &amp; Villagra, V. A. (2017). Enabling an anatomic view to investigate honeypot systems: A survey. IEEE Systems Journal, 12(4), 3906-3919.</mixed-citation>
                    </ref>
                                    <ref id="ref11">
                        <label>11</label>
                        <mixed-citation publication-type="journal">Grimes, R. A. (2005). Honeyd Configuration. Honeypots for Windows. Apress Berkeley, CA.</mixed-citation>
                    </ref>
                                    <ref id="ref12">
                        <label>12</label>
                        <mixed-citation publication-type="journal">Hong-Xia, L., Pu, W., Jian, Z., &amp; Xiao-Qiong, Y. (2010, May, 7-9). Exploration on the connotation of management honeypot. In 2010 International Conference on E-Business and E-Government, IEEE, 1152-1155.</mixed-citation>
                    </ref>
                                    <ref id="ref13">
                        <label>13</label>
                        <mixed-citation publication-type="journal">Nawrocki, M., Wählisch, M., Schmidt, T. C., Keil, C., &amp; Schönfelder, J. (2016). A survey on honeypot software and data analysis, arXiv preprint arXiv:1608.06249.</mixed-citation>
                    </ref>
                                    <ref id="ref14">
                        <label>14</label>
                        <mixed-citation publication-type="journal">Ng, C. K., Pan, L., &amp; Xiang, Y. (2018). Honeypot frameworks and their applications: a new framework. Springer, Singapore.</mixed-citation>
                    </ref>
                                    <ref id="ref15">
                        <label>15</label>
                        <mixed-citation publication-type="journal">Perevozchikov, V. A., Shaymardanov, T. A., &amp; Chugunkov, I. V. (2017, February, 1-3). New techniques of malware detection using FTP Honeypot systems. In 2017 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), IEEE, 204-207.</mixed-citation>
                    </ref>
                                    <ref id="ref16">
                        <label>16</label>
                        <mixed-citation publication-type="journal">Priya, V. D., &amp; Chakkaravarthy, S. S. (2023). Containerized cloud-based honeypot deception for tracking attackers. Scientific Reports, 13(1), 1437.</mixed-citation>
                    </ref>
                                    <ref id="ref17">
                        <label>17</label>
                        <mixed-citation publication-type="journal">Sembiring, I. (2016, October, 19-20). Implementation of honeypot to detect and prevent distributed denial of service attack. In 2016 3rd International Conference on Information Technology, Computer, and Electrical Engineering (ICITACEE), IEEE, 345-350.</mixed-citation>
                    </ref>
                                    <ref id="ref18">
                        <label>18</label>
                        <mixed-citation publication-type="journal">Sochor, T., &amp; Zuzcak, M. (2014, June, 23-27). Study of internet threats and attack methods using honeypots and honeynets. In International Conference on Computer Networks, Springer, Cham, 118-127.</mixed-citation>
                    </ref>
                                    <ref id="ref19">
                        <label>19</label>
                        <mixed-citation publication-type="journal">Uitto, J., Rauti, S., Laurén, S., &amp; Leppänen, V. (2017, April, 04-06). A survey on anti-honeypot and anti-introspection methods. In World Conference on Information Systems and Technologie, Springer, Cham, 125-134.</mixed-citation>
                    </ref>
                                    <ref id="ref20">
                        <label>20</label>
                        <mixed-citation publication-type="journal">Yang, X., Yuan, J., Yang, H., Kong, Y., Zhang, H., &amp; Zhao, J. (2023). A Highly Interactive Honeypot-Based Approach to Network Threat Management. Future Internet, 15(4), 127.</mixed-citation>
                    </ref>
                                    <ref id="ref21">
                        <label>21</label>
                        <mixed-citation publication-type="journal">Zimmerman, C. (2014). Ten Strategies of a World-Class Cybersecurity Operations Centre. The Mitre Corporation, Ukrainian.</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
