Araştırma Makalesi
BibTex RIS Kaynak Göster

Mobil Cihazlarda Güvenlik Tehditler Temel Stratejiler

Yıl 2016, Cilt: 15 Sayı: 30, 55 - 75, 31.12.2016

Öz

Tüketici elektroniğinin günümüzdeki en yaygın
hali mobil cihazların kullanımıdır. Bu alandaki teknolojik gelişmeler,
hayatımızın her alanına etki edecek şekilde artmakta ve yaşamımıza yön
vermektedir. Artık bilgisayarlarla aynı donanımsal özelliklere sahip olabilen mobil
cihazların kullanımı sadece iletişim amacıyla kalmayıp, internet kullanımı, iş,
hobi ve sağlık alanlarındaki uygulamaları ile zenginlemiştir. Pek çok farklı
alana özel uygulamaların ortak yönü, kullanıcı bilgilerinin işlemesi, bu
bilgilerin farklı ortamlara iletmesi ve depolaması gibi faaliyetleri içermesidir.
Artan kullanım oranı ile bilgi ve iletişim güvenliğine daha fazla ihtiyaç
duyulmaya başlanan bu cihazlara yönelik yapılan saldırılar karşısında taşınan
bilgilerin güvenliğinin sağlanması gerekliliği ortaya çıkmaktadır. Mobil cihazlardaki
güvenlik açıkları ve kötücül yazılım barındıran uygulamaların son kullanıcı
tarafından yüklemesi ile kişisel bilgi ve haberleşme güvenliğini tehdit eden
durumlar oluşmaktadır. Bu çalışmada, mobil uygulamalarda bulunan güvenlik açıkları,
saldırı ve bu sorunlara ilişkin alınan önlemler anlatılmaktadır. Sadece son
kullanıcıya yönelik tavsiyeler değil, aynı zamanda uygulama geliştiriciler için
de dikkat edilmesi gereken hususlar özetlenmiştir. Son kullanıcıların, mobil
sistemlerin saldırı yöntemlerine dair temel bilgileri öğrenmesi ile kişisel
güvenliğin arttırılabileceği değerlendirilmektedir.

Kaynakça

  • Adinata, M., Liem, I.,(2014). “A/B test tools of native mobile application,” Proc. 2014 Int. Conf. Data Softw. Eng. ICODSE 2014.
  • Ahmad, M. S., Musa, N. E., Nadarajah, R., Hassan, R., & Othman, N. E. (2013). Comparison between android and iOS Operating System in terms of security. In Information Technology in Asia (CITA), 2013 8th International Conference on (pp. 1-4). IEEE.
  • Bere, A., (2013) “Toward assessing the impact of mobile security issues in pedagogical delivery: A mobile learning case study,” Sci. Inf. Conf. (SAI), 2013, pp. 363–368.
  • Borys, M., (2015). “Mobile Application Usability Testing in Quasi-Real Conditions,” pp. 381–387.
  • Bosnic, S., Papp, I., & Novak, S. (2016). The development of hybrid mobile applications with Apache Cordova. In Telecommunications Forum (TELFOR), 2016 24th (pp. 1-4). IEEE.
  • Chaffey, D. (2016) “Mobile Marketing Statistics Compilation” Erişim Tarihi: 24.06.2016 Kaynak: http://www.smartinsights.com/mobile-marketing/mobile-marketing-analytics/mobile-marketing-statistics/
  • Eizmendi, I., Velez, M., Prieto, G., Correia, S., Arrinda, A., Angueira, P., (2010) “Laboratory Tests for testing DVB-T2 mobile performance,” Evaluation, pp. 1–5.
  • Fan, X., & Wong, K. (2016). Migrating user interfaces in native mobile applications: android to iOS. In Proceedings of the International Workshop on Mobile Software Engineering and Systems (pp. 210-213). ACM.
  • Guerid, H., Serhrouchni, A., Achemlal, M., Mittig, K., (2011). “A Novel Traceback Approach for Direct and Reflected ICMP Attacks,” 2011 Conf. Netw. Inf. Syst. Secur., pp. 1–5.
  • Huang, K., Zhang, J., Tan, W., Feng, Z., (2015). “An Empirical Analysis of Contemporary Android Mobile Vulnerability Market,” 2015 IEEE Int. Conf. Mob. Serv., pp. 182–189.
  • Jadhav, S., Oh, T., Kim, Y.H., Kim, J.N., (2015). “Mobile device penetration testing framework and platform for the mobile device security course,” 2015 17th Int. Conf. Adv. Commun. Technol., pp. 675–680.
  • Ju, H., Kim, Y., Jeon, Y., & Kim, J. (2015). Implementation of a hardware security chip for mobile devices. IEEE Transactions on Consumer Electronics, 61(4), 500-506.
  • Kikuchi, H., Sasa, K., & Shimizu, Y. (2016). Interactive History Sniffing Attack with Amida Lottery. In Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2016 10th International Conference on (pp. 599-602). IEEE.
  • Kim, H., Choi, B., Wong, W.E., (2009). “Performance testing of mobile applications at the unit test level,” SSIRI 2009 - 3rd IEEE Int. Conf. Secur. Softw. Integr. Reliab. Improv., pp. 171–180.
  • Küçüksille, E., Özger, F., & Genç, S. (2013). Mobil bulut bilişim ve geleceği. Akademik Bilişim Konferansı Bildirileri, 23-25.
  • Liyanage, M., Abro, A. B., Ylianttila, M., & Gurtov, A. (2016). Opportunities and challenges of software-defined mobile networks in network security. IEEE Security & Privacy, 14(4), 34-44.
  • Lu, X., Luo, Y., Liu, X., (2014). “A Graph-Based Approach to Assisting Creation of Mobile Web Applications,” 2014 IEEE Int. Conf. Web Serv., pp. 728–729, 2014.
  • Lu, H. L. H., Gheitanchi, S., Young, R., Chatwin, C., (2010). “A symbian based mobile user authorization system using mobile networks,” Wirel. Adv. (WiAD), 2010 6th Conf.
  • Ma, H.J., Li, M., Wang, K., Dou, Z., Jiang, H., (2014). “NTP network timing technique research for Android and iOS mobile platform,” 2014 IEEE Int. Freq. Control Symp., vol. 3, pp. 1–4.
  • Masruroh, S. U., & Saputra, I. (2016, April). Performance evaluation of instant messenger in Android operating system and iPhone operating system. In Cyber and IT Service Management, International Conference on (pp. 1-6). IEEE.
  • Mohamed, M., Shrestha, B., & Saxena, N. (2016). SMASheD: Sniffing and Manipulating Android Sensor Data for Offensive Purposes. IEEE Transactions on Information Forensics and Security.
  • Omeleze, S., Venter, H. S., (2013). “Testing the harmonised digital forensic investigation process model-using an Android mobile phone,” 2013 Inf. Secur. South Africa - Proc. ISSA 2013 Conf.
  • Penning, N., Hoffman, M., Nikolai, J., Wang, Y., (2014). “Mobile Malware Security Challenges and Cloud-Based Detection,” 2014 Int. Conf. Collab. Technolgies Syst., pp. 181–188.
  • Pooryousef, S., & Amini, M. (2016, September). Fine-grained access control for hybrid mobile applications in Android using restricted paths. In Information Security and Cryptology (ISCISC), 2016 13th International Iranian Society of Cryptology Conference on (pp. 85-90). IEEE.
  • Sağıroğlu, Ş., Bulut, H. (2009). Mobil ortamlarda bilgi ve haberleşme güvenliği üzerine bir inceleme. Gazi Üniversitesi Mühendislik-Mimarlık Fakültesi Dergisi, 24(3).
  • Setiabudi, D. H., Tjahyana, L. J., (2013). “Mobile learning application based on hybrid mobile application technology running on Android smartphone and Blackberry,” Int. Conf. ICT Smart Soc., pp. 1–5.
  • Sun, J.Z, Howie, D., Koivisto, A., Sauvola, J., (2001). “A hierarchical framework model of mobile security,” 12th IEEE Int. Symp. Pers. Indoor Mob. Radio Commun. PIMRC 2001. Proc. (Cat. No.01TH8598), vol. 1, pp. 56–60, 2001.
  • Tilson, D., Sorensen, C., Lyytinen, K., (2011). “Change and control paradoxes in mobile infrastructure innovation: The Android and iOS mobile operating systems cases,” Proc. Annu. Hawaii Int. Conf. Syst. Sci., pp. 1324–1333.
  • Wang, Y., Alshboul, Y., (2015). “Mobile security testing approaches and challenges,” 2015 First Conf. Mob. Secur. Serv., pp. 1–5.
  • Wang, Y., Wei, J., Vangury, K., (2014). “Bring your own device security issues and challenges,” 2014 IEEE 11th Consum. Commun. Netw. Conf., pp. 80–85.
  • Zhou, Y., Jiang, X. , (2012). “Dissecting Android Malware: Characterization and Evolution,” 2012 IEEE Symp. Secur. Priv., no. 4, pp. 95–109.
Yıl 2016, Cilt: 15 Sayı: 30, 55 - 75, 31.12.2016

Öz

Kaynakça

  • Adinata, M., Liem, I.,(2014). “A/B test tools of native mobile application,” Proc. 2014 Int. Conf. Data Softw. Eng. ICODSE 2014.
  • Ahmad, M. S., Musa, N. E., Nadarajah, R., Hassan, R., & Othman, N. E. (2013). Comparison between android and iOS Operating System in terms of security. In Information Technology in Asia (CITA), 2013 8th International Conference on (pp. 1-4). IEEE.
  • Bere, A., (2013) “Toward assessing the impact of mobile security issues in pedagogical delivery: A mobile learning case study,” Sci. Inf. Conf. (SAI), 2013, pp. 363–368.
  • Borys, M., (2015). “Mobile Application Usability Testing in Quasi-Real Conditions,” pp. 381–387.
  • Bosnic, S., Papp, I., & Novak, S. (2016). The development of hybrid mobile applications with Apache Cordova. In Telecommunications Forum (TELFOR), 2016 24th (pp. 1-4). IEEE.
  • Chaffey, D. (2016) “Mobile Marketing Statistics Compilation” Erişim Tarihi: 24.06.2016 Kaynak: http://www.smartinsights.com/mobile-marketing/mobile-marketing-analytics/mobile-marketing-statistics/
  • Eizmendi, I., Velez, M., Prieto, G., Correia, S., Arrinda, A., Angueira, P., (2010) “Laboratory Tests for testing DVB-T2 mobile performance,” Evaluation, pp. 1–5.
  • Fan, X., & Wong, K. (2016). Migrating user interfaces in native mobile applications: android to iOS. In Proceedings of the International Workshop on Mobile Software Engineering and Systems (pp. 210-213). ACM.
  • Guerid, H., Serhrouchni, A., Achemlal, M., Mittig, K., (2011). “A Novel Traceback Approach for Direct and Reflected ICMP Attacks,” 2011 Conf. Netw. Inf. Syst. Secur., pp. 1–5.
  • Huang, K., Zhang, J., Tan, W., Feng, Z., (2015). “An Empirical Analysis of Contemporary Android Mobile Vulnerability Market,” 2015 IEEE Int. Conf. Mob. Serv., pp. 182–189.
  • Jadhav, S., Oh, T., Kim, Y.H., Kim, J.N., (2015). “Mobile device penetration testing framework and platform for the mobile device security course,” 2015 17th Int. Conf. Adv. Commun. Technol., pp. 675–680.
  • Ju, H., Kim, Y., Jeon, Y., & Kim, J. (2015). Implementation of a hardware security chip for mobile devices. IEEE Transactions on Consumer Electronics, 61(4), 500-506.
  • Kikuchi, H., Sasa, K., & Shimizu, Y. (2016). Interactive History Sniffing Attack with Amida Lottery. In Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2016 10th International Conference on (pp. 599-602). IEEE.
  • Kim, H., Choi, B., Wong, W.E., (2009). “Performance testing of mobile applications at the unit test level,” SSIRI 2009 - 3rd IEEE Int. Conf. Secur. Softw. Integr. Reliab. Improv., pp. 171–180.
  • Küçüksille, E., Özger, F., & Genç, S. (2013). Mobil bulut bilişim ve geleceği. Akademik Bilişim Konferansı Bildirileri, 23-25.
  • Liyanage, M., Abro, A. B., Ylianttila, M., & Gurtov, A. (2016). Opportunities and challenges of software-defined mobile networks in network security. IEEE Security & Privacy, 14(4), 34-44.
  • Lu, X., Luo, Y., Liu, X., (2014). “A Graph-Based Approach to Assisting Creation of Mobile Web Applications,” 2014 IEEE Int. Conf. Web Serv., pp. 728–729, 2014.
  • Lu, H. L. H., Gheitanchi, S., Young, R., Chatwin, C., (2010). “A symbian based mobile user authorization system using mobile networks,” Wirel. Adv. (WiAD), 2010 6th Conf.
  • Ma, H.J., Li, M., Wang, K., Dou, Z., Jiang, H., (2014). “NTP network timing technique research for Android and iOS mobile platform,” 2014 IEEE Int. Freq. Control Symp., vol. 3, pp. 1–4.
  • Masruroh, S. U., & Saputra, I. (2016, April). Performance evaluation of instant messenger in Android operating system and iPhone operating system. In Cyber and IT Service Management, International Conference on (pp. 1-6). IEEE.
  • Mohamed, M., Shrestha, B., & Saxena, N. (2016). SMASheD: Sniffing and Manipulating Android Sensor Data for Offensive Purposes. IEEE Transactions on Information Forensics and Security.
  • Omeleze, S., Venter, H. S., (2013). “Testing the harmonised digital forensic investigation process model-using an Android mobile phone,” 2013 Inf. Secur. South Africa - Proc. ISSA 2013 Conf.
  • Penning, N., Hoffman, M., Nikolai, J., Wang, Y., (2014). “Mobile Malware Security Challenges and Cloud-Based Detection,” 2014 Int. Conf. Collab. Technolgies Syst., pp. 181–188.
  • Pooryousef, S., & Amini, M. (2016, September). Fine-grained access control for hybrid mobile applications in Android using restricted paths. In Information Security and Cryptology (ISCISC), 2016 13th International Iranian Society of Cryptology Conference on (pp. 85-90). IEEE.
  • Sağıroğlu, Ş., Bulut, H. (2009). Mobil ortamlarda bilgi ve haberleşme güvenliği üzerine bir inceleme. Gazi Üniversitesi Mühendislik-Mimarlık Fakültesi Dergisi, 24(3).
  • Setiabudi, D. H., Tjahyana, L. J., (2013). “Mobile learning application based on hybrid mobile application technology running on Android smartphone and Blackberry,” Int. Conf. ICT Smart Soc., pp. 1–5.
  • Sun, J.Z, Howie, D., Koivisto, A., Sauvola, J., (2001). “A hierarchical framework model of mobile security,” 12th IEEE Int. Symp. Pers. Indoor Mob. Radio Commun. PIMRC 2001. Proc. (Cat. No.01TH8598), vol. 1, pp. 56–60, 2001.
  • Tilson, D., Sorensen, C., Lyytinen, K., (2011). “Change and control paradoxes in mobile infrastructure innovation: The Android and iOS mobile operating systems cases,” Proc. Annu. Hawaii Int. Conf. Syst. Sci., pp. 1324–1333.
  • Wang, Y., Alshboul, Y., (2015). “Mobile security testing approaches and challenges,” 2015 First Conf. Mob. Secur. Serv., pp. 1–5.
  • Wang, Y., Wei, J., Vangury, K., (2014). “Bring your own device security issues and challenges,” 2014 IEEE 11th Consum. Commun. Netw. Conf., pp. 80–85.
  • Zhou, Y., Jiang, X. , (2012). “Dissecting Android Malware: Characterization and Evolution,” 2012 IEEE Symp. Secur. Priv., no. 4, pp. 95–109.
Toplam 31 adet kaynakça vardır.

Ayrıntılar

Konular Mühendislik
Bölüm Araştırma Makaleleri
Yazarlar

Gözde Karataş Bu kişi benim

Akhan Akbulut

Abdül Halim Zaim

Yayımlanma Tarihi 31 Aralık 2016
Gönderilme Tarihi 12 Ağustos 2017
Yayımlandığı Sayı Yıl 2016 Cilt: 15 Sayı: 30

Kaynak Göster

APA Karataş, G., Akbulut, A., & Zaim, A. H. (2016). Mobil Cihazlarda Güvenlik Tehditler Temel Stratejiler. İstanbul Ticaret Üniversitesi Fen Bilimleri Dergisi, 15(30), 55-75.
AMA Karataş G, Akbulut A, Zaim AH. Mobil Cihazlarda Güvenlik Tehditler Temel Stratejiler. İstanbul Ticaret Üniversitesi Fen Bilimleri Dergisi. Aralık 2016;15(30):55-75.
Chicago Karataş, Gözde, Akhan Akbulut, ve Abdül Halim Zaim. “Mobil Cihazlarda Güvenlik Tehditler Temel Stratejiler”. İstanbul Ticaret Üniversitesi Fen Bilimleri Dergisi 15, sy. 30 (Aralık 2016): 55-75.
EndNote Karataş G, Akbulut A, Zaim AH (01 Aralık 2016) Mobil Cihazlarda Güvenlik Tehditler Temel Stratejiler. İstanbul Ticaret Üniversitesi Fen Bilimleri Dergisi 15 30 55–75.
IEEE G. Karataş, A. Akbulut, ve A. H. Zaim, “Mobil Cihazlarda Güvenlik Tehditler Temel Stratejiler”, İstanbul Ticaret Üniversitesi Fen Bilimleri Dergisi, c. 15, sy. 30, ss. 55–75, 2016.
ISNAD Karataş, Gözde vd. “Mobil Cihazlarda Güvenlik Tehditler Temel Stratejiler”. İstanbul Ticaret Üniversitesi Fen Bilimleri Dergisi 15/30 (Aralık 2016), 55-75.
JAMA Karataş G, Akbulut A, Zaim AH. Mobil Cihazlarda Güvenlik Tehditler Temel Stratejiler. İstanbul Ticaret Üniversitesi Fen Bilimleri Dergisi. 2016;15:55–75.
MLA Karataş, Gözde vd. “Mobil Cihazlarda Güvenlik Tehditler Temel Stratejiler”. İstanbul Ticaret Üniversitesi Fen Bilimleri Dergisi, c. 15, sy. 30, 2016, ss. 55-75.
Vancouver Karataş G, Akbulut A, Zaim AH. Mobil Cihazlarda Güvenlik Tehditler Temel Stratejiler. İstanbul Ticaret Üniversitesi Fen Bilimleri Dergisi. 2016;15(30):55-7.