TY - JOUR T1 - Bir Güvenlik Trendi: Bal Küpü AU - Arıkan, Süleyman Muhammed AU - Benzer, Recep PY - 2018 DA - June DO - 10.30801/acin.356815 JF - Acta Infologica JO - ACIN PB - İstanbul Üniversitesi WT - DergiPark SN - 2602-3563 SP - 1 EP - 11 VL - 2 IS - 1 LA - tr AB - Buçalışma, bilişim dünyasında güvenliği sağlamak adına kullanılmakta olan ve hergeçen gün popülerliği artan bal küpleri hakkında bir araştırma niteliğindedir.Honeypot olarak kullanılan bu terim dilimize bal küpü olarak geçmiştir. Balküplerinin birçok çeşidi vardır. Çalışmamızda bu çeşitleri açıklamayaodaklanılmıştır. Bu amaca ek olarak, bal küpü sistemlerinin birçok alandakullanılmış örneklerinin de okuyucuya sunulması hedeflenmiş ve bir bal küpüsistemi hazırlanarak üzerinde sql enjeksiyonu test edilmiştir. KW - Honeypot KW - bal küpü KW - malware KW - sql injection KW - ransomware CR - [1] Antivirus software. 2017, En.wikipedia.org. Retrieved 1 February 2017, from http://en.wikipedia.org/wiki/Antivirus_software CR - [2] Yang, Y., Yang, H., & Mi, J. 2011, “Design of distributed honeypot system based on intrusion tracking” In 2011 IEEE 3rd International Conference on Communication Software and Networks. IEEE. CR - [3] Kuwatly, I., Sraj, M., & Al Masri, Z. 2004, “A Dynamic Honeypot Design for Intrusion Detection” In The IEEE/ACS International Conference on Pervasive Services. IEEE. CR - [4] Zakaria, W., & Kiah, M. 2012, “A review on artificial intelligence techniques for developing intelligent honeypot” In 2012 8th International Conference on Computing Technology and Information Management (NCM and ICNIT). IEEE. CR - [5] Song, Y., Zhu, X., Hong, Y., Zhang, H., & Tan, H. 2012, “A Mobile Communication Honeypot Observing System” In 2012 Fourth International Conference on Multimedia Information Networking and Security. IEEE. CR - [6] Chauhan, S., & Shiwani, S. 2017, “A honeypots based anti-phishing framework” In 2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT). IEEE. CR - [7] Sharma, S. 2016, “Detection and analysis of network & application layer attacks using Maya Honeypot” In 2016 6th International Conference - Cloud System and Big Data Engineering (Confluence). IEEE. CR - [8] Singh, A., & Joshi, R. 2011, “A honeypot system for efficient capture and analysis of network attack traffic” In 2011 International Conference on Signal Processing, Communication, Computing and Networking Technologies. IEEE. CR - [9] Djanali, S., Arunanto, F., Pratomo, B., Baihaqi, A., Studiawan, H., & Shiddiqi, A. 2014, “Aggressive web application honeypot for exposing attacker's identity” In 2014 The 1st International Conference on Information Technology, Computer, and Electrical Engineering. IEEE. CR - [10] Koniaris, I., Papadimitriou, G., & Nicopolitidis, P. 2013, “Analysis and visualization of SSH attacks using honeypots” In Eurocon 2013. IEEE. CR - [11] On Security Issues in Web Applications through Cross Site Scripting (XSS) 2013, In 2013 20th Asia-Pacific Software Engineering Conference (APSEC). IEEE. UR - https://doi.org/10.30801/acin.356815 L1 - https://dergipark.org.tr/tr/download/article-file/495116 ER -