Analysis of Different Types of Network Attacks on the GNS3 Platform
Abstract
Keywords
References
- “Cyber crime attacks experienced by global companies 2017”, Statista. [Çevrimiçi]. Erişim adresi: https://www.statista.com/statistics/474937/cyber-crime-attacks-experienced-by-global-companies/. [Erişim: 20-Ara-2019].
- “Snort - Network Intrusion Detection & Prevention System”. [Çevrimiçi]. Erişim adresi: https://www.snort.org/. [Erişim: 14-Oca-2020].
- N. Goksel ve M. Demirci, “DoS Attack Detection using Packet Statistics in SDN”, in 2019 International Symposium on Networks, Computers and Communications (ISNCC), ss. 1-6, 2019, doi: 10.1109/ISNCC.2019.8909114.
- Ş. Sağiroğlu, E. Yolaçan, ve U. Yavanoğlu, “Zeki saldırı tespit sistemi tasarımı ve gerçekleştirilmesi”, Gazi Üniversitesi Mühendislik Mimarlık Fakültesi Dergisi, c. 26, sy 2, 325-340, 2011
- I. Karadoğan ve R. Daş, “Analysis of attack types on TCP/IP based networks via exploiting protocols”, in 2015 23nd Signal Processing and Communications Applications Conference (SIU), Inonu University, Malatya, ss. 1785-1788, 2015, doi: 10.1109/SIU.2015.7130200.
- “Scapy”. [Çevrimiçi]. Erişim adresi: https://scapy.net/. [Erişim: 18-Ara-2019].
- R. Das ve G. Tuna, “Packet tracing and analysis of network cameras with Wireshark”, in 2017 5th International Symposium on Digital Forensic and Security (ISDFS), Romanya, ss. 1-6, 2017, doi: 10.1109/ISDFS.2017.7916510.
- R. Abdulhammed, M. Faezipour, H. Musafer, ve A. Abuzneid, “Efficient Network Intrusion Detection Using PCA-Based Dimensionality Reduction of Features”, in 2019 International Symposium on Networks, Computers and Communications (ISNCC), ss. 1-6, 2019, doi: 10.1109/ISNCC.2019.8909140.
Details
Primary Language
English
Subjects
Empirical Software Engineering, Computer Software, Software Architecture
Journal Section
Research Article
Publication Date
December 30, 2020
Submission Date
April 16, 2020
Acceptance Date
November 2, 2020
Published in Issue
Year 2020 Volume: 3 Number: 3
Cited By
NESNELERİN İNTERNETİ KAPSAMINDA KULLANILAN ARA KATMAN YAZILIMLARINA YÖNELİK AĞ BENZETİMİ
Konya Journal of Engineering Sciences
https://doi.org/10.36306/konjes.1076950Password Attack Analysis Over Honeypot Using Machine Learning Password Attack Analysis
Turkish Journal of Mathematics and Computer Science
https://doi.org/10.47000/tjmcs.971141A New Hybrid Approach Using GWO and MFO Algorithms to Detect Network Attack
Computer Modeling in Engineering & Sciences
https://doi.org/10.32604/cmes.2023.025212
