Biblio
Filters: Author is Güven, Ebu Yusuf [Clear All Filters]
SSH and Telnet Protocols Attack Analysis Using Honeypot Technique: Analysis of SSH AND ℡NET Honeypot. 2021 6th International Conference on Computer Science and Engineering (UBMK). :806–811.
.
2021. Generally, the defense measures taken against new cyber-attack methods are insufficient for cybersecurity risk management. Contrary to classical attack methods, the existence of undiscovered attack types called’ zero-day attacks’ can invalidate the actions taken. It is possible with honeypot systems to implement new security measures by recording the attacker’s behavior. The purpose of the honeypot is to learn about the methods and tools used by the attacker or malicious activity. In particular, it allows us to discover zero-day attack types and develop new defense methods for them. Attackers have made protocols such as SSH (Secure Shell) and Telnet, which are widely used for remote access to devices, primary targets. In this study, SSHTelnet honeypot was established using Cowrie software. Attackers attempted to connect, and attackers record their activity after providing access. These collected attacker log records and files uploaded to the system are published on Github to other researchers1. We shared the observations and analysis results of attacks on SSH and Telnet protocols with honeypot.
SSH and Telnet Protocols Attack Analysis Using Honeypot Technique : *Analysis of SSH AND ℡NET Honeypot. 2021 6th International Conference on Computer Science and Engineering (UBMK). :806–811.
.
2021. Generally, the defense measures taken against new cyber-attack methods are insufficient for cybersecurity risk management. Contrary to classical attack methods, the existence of undiscovered attack types called' zero-day attacks' can invalidate the actions taken. It is possible with honeypot systems to implement new security measures by recording the attacker's behavior. The purpose of the honeypot is to learn about the methods and tools used by the attacker or malicious activity. In particular, it allows us to discover zero-day attack types and develop new defense methods for them. Attackers have made protocols such as SSH (Secure Shell) and Telnet, which are widely used for remote access to devices, primary targets. In this study, SSHTelnet honeypot was established using Cowrie software. Attackers attempted to connect, and attackers record their activity after providing access. These collected attacker log records and files uploaded to the system are published on Github to other researchers1. We shared the observations and analysis results of attacks on SSH and Telnet protocols with honeypot.
Security on Wireless Sensor Network. 2019 4th International Conference on Computer Science and Engineering (UBMK). :693–698.
.
2019. Wireless sensor networks are called wireless networks consisting of low-cost sensor nodes that use limited resources, collect and distribute data. Wireless sensor networks make observation and control of physical environments from distance easier. They are used in a variety of areas, such as environmental surveillance, military purposes, and the collection of information in specific areas. While the low cost of sensor nodes allows it to spread and increase it's quantitative, battery and computational constraints, noise and manipulation threats from the environment cause various challenges in wireless sensor applications. To overcome these challenges, researches have conducted a lot of researches on various fields like power consumption, use of resources and security approaches. In these studies, routing, placement algorithms and system designs are generally examined for efficient energy consumption. In this article, the relationship between the security of sensor networks and efficient resource usage and various scenarios are presented.