Bir Güvenlik Trendi: Bal Küpü
Yıl 2018,
Cilt: 2 Sayı: 1, 1 - 11, 26.06.2018
Süleyman Muhammed Arıkan
,
Recep Benzer
Öz
Bu
çalışma, bilişim dünyasında güvenliği sağlamak adına kullanılmakta olan ve her
geçen gün popülerliği artan bal küpleri hakkında bir araştırma niteliğindedir.
Honeypot olarak kullanılan bu terim dilimize bal küpü olarak geçmiştir. Bal
küplerinin birçok çeşidi vardır. Çalışmamızda bu çeşitleri açıklamaya
odaklanılmıştır. Bu amaca ek olarak, bal küpü sistemlerinin birçok alanda
kullanılmış örneklerinin de okuyucuya sunulması hedeflenmiş ve bir bal küpü
sistemi hazırlanarak üzerinde sql enjeksiyonu test edilmiştir.
Kaynakça
- [1] Antivirus software. 2017, En.wikipedia.org. Retrieved 1 February 2017, from http://en.wikipedia.org/wiki/Antivirus_software
- [2] Yang, Y., Yang, H., & Mi, J. 2011, “Design of distributed honeypot system based on intrusion tracking” In 2011 IEEE 3rd International Conference on Communication Software and Networks. IEEE.
- [3] Kuwatly, I., Sraj, M., & Al Masri, Z. 2004, “A Dynamic Honeypot Design for Intrusion Detection” In The IEEE/ACS International Conference on Pervasive Services. IEEE.
- [4] Zakaria, W., & Kiah, M. 2012, “A review on artificial intelligence techniques for developing intelligent honeypot” In 2012 8th International Conference on Computing Technology and Information Management (NCM and ICNIT). IEEE.
- [5] Song, Y., Zhu, X., Hong, Y., Zhang, H., & Tan, H. 2012, “A Mobile Communication Honeypot Observing System” In 2012 Fourth International Conference on Multimedia Information Networking and Security. IEEE.
- [6] Chauhan, S., & Shiwani, S. 2017, “A honeypots based anti-phishing framework” In 2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT). IEEE.
- [7] Sharma, S. 2016, “Detection and analysis of network & application layer attacks using Maya Honeypot” In 2016 6th International Conference - Cloud System and Big Data Engineering (Confluence). IEEE.
- [8] Singh, A., & Joshi, R. 2011, “A honeypot system for efficient capture and analysis of network attack traffic” In 2011 International Conference on Signal Processing, Communication, Computing and Networking Technologies. IEEE.
- [9] Djanali, S., Arunanto, F., Pratomo, B., Baihaqi, A., Studiawan, H., & Shiddiqi, A. 2014, “Aggressive web application honeypot for exposing attacker's identity” In 2014 The 1st International Conference on Information Technology, Computer, and Electrical Engineering. IEEE.
- [10] Koniaris, I., Papadimitriou, G., & Nicopolitidis, P. 2013, “Analysis and visualization of SSH attacks using honeypots” In Eurocon 2013. IEEE.
- [11] On Security Issues in Web Applications through Cross Site Scripting (XSS) 2013, In 2013 20th Asia-Pacific Software Engineering Conference (APSEC). IEEE.
Yıl 2018,
Cilt: 2 Sayı: 1, 1 - 11, 26.06.2018
Süleyman Muhammed Arıkan
,
Recep Benzer
Kaynakça
- [1] Antivirus software. 2017, En.wikipedia.org. Retrieved 1 February 2017, from http://en.wikipedia.org/wiki/Antivirus_software
- [2] Yang, Y., Yang, H., & Mi, J. 2011, “Design of distributed honeypot system based on intrusion tracking” In 2011 IEEE 3rd International Conference on Communication Software and Networks. IEEE.
- [3] Kuwatly, I., Sraj, M., & Al Masri, Z. 2004, “A Dynamic Honeypot Design for Intrusion Detection” In The IEEE/ACS International Conference on Pervasive Services. IEEE.
- [4] Zakaria, W., & Kiah, M. 2012, “A review on artificial intelligence techniques for developing intelligent honeypot” In 2012 8th International Conference on Computing Technology and Information Management (NCM and ICNIT). IEEE.
- [5] Song, Y., Zhu, X., Hong, Y., Zhang, H., & Tan, H. 2012, “A Mobile Communication Honeypot Observing System” In 2012 Fourth International Conference on Multimedia Information Networking and Security. IEEE.
- [6] Chauhan, S., & Shiwani, S. 2017, “A honeypots based anti-phishing framework” In 2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT). IEEE.
- [7] Sharma, S. 2016, “Detection and analysis of network & application layer attacks using Maya Honeypot” In 2016 6th International Conference - Cloud System and Big Data Engineering (Confluence). IEEE.
- [8] Singh, A., & Joshi, R. 2011, “A honeypot system for efficient capture and analysis of network attack traffic” In 2011 International Conference on Signal Processing, Communication, Computing and Networking Technologies. IEEE.
- [9] Djanali, S., Arunanto, F., Pratomo, B., Baihaqi, A., Studiawan, H., & Shiddiqi, A. 2014, “Aggressive web application honeypot for exposing attacker's identity” In 2014 The 1st International Conference on Information Technology, Computer, and Electrical Engineering. IEEE.
- [10] Koniaris, I., Papadimitriou, G., & Nicopolitidis, P. 2013, “Analysis and visualization of SSH attacks using honeypots” In Eurocon 2013. IEEE.
- [11] On Security Issues in Web Applications through Cross Site Scripting (XSS) 2013, In 2013 20th Asia-Pacific Software Engineering Conference (APSEC). IEEE.