Bir Güvenlik Trendi: Bal Küpü

Bu çalışma, bilişim dünyasında güvenliği sağlamak adına kullanılmakta olan ve her geçen gün popülerliği artan bal küpleri hakkında bir araştırma niteliğindedir. Honeypot olarak kullanılan bu terim dilimize bal küpü olarak geçmiştir. Bal küplerinin birçok çeşidi vardır. Çalışmamızda bu çeşitleri açıklamaya odaklanılmıştır. Bu amaca ek olarak, bal küpü sistemlerinin birçok alanda kullanılmış örneklerinin de okuyucuya sunulması hedeflenmiş ve bir bal küpü sistemi hazırlanarak üzerinde sql enjeksiyonu test edilmiştir.    

___

  • [1] Antivirus software. 2017, En.wikipedia.org. Retrieved 1 February 2017, from http://en.wikipedia.org/wiki/Antivirus_software
  • [2] Yang, Y., Yang, H., & Mi, J. 2011, “Design of distributed honeypot system based on intrusion tracking” In 2011 IEEE 3rd International Conference on Communication Software and Networks. IEEE.
  • [3] Kuwatly, I., Sraj, M., & Al Masri, Z. 2004, “A Dynamic Honeypot Design for Intrusion Detection” In The IEEE/ACS International Conference on Pervasive Services. IEEE.
  • [4] Zakaria, W., & Kiah, M. 2012, “A review on artificial intelligence techniques for developing intelligent honeypot” In 2012 8th International Conference on Computing Technology and Information Management (NCM and ICNIT). IEEE.
  • [5] Song, Y., Zhu, X., Hong, Y., Zhang, H., & Tan, H. 2012, “A Mobile Communication Honeypot Observing System” In 2012 Fourth International Conference on Multimedia Information Networking and Security. IEEE.
  • [6] Chauhan, S., & Shiwani, S. 2017, “A honeypots based anti-phishing framework” In 2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT). IEEE.
  • [7] Sharma, S. 2016, “Detection and analysis of network & application layer attacks using Maya Honeypot” In 2016 6th International Conference - Cloud System and Big Data Engineering (Confluence). IEEE.
  • [8] Singh, A., & Joshi, R. 2011, “A honeypot system for efficient capture and analysis of network attack traffic” In 2011 International Conference on Signal Processing, Communication, Computing and Networking Technologies. IEEE.
  • [9] Djanali, S., Arunanto, F., Pratomo, B., Baihaqi, A., Studiawan, H., & Shiddiqi, A. 2014, “Aggressive web application honeypot for exposing attacker's identity” In 2014 The 1st International Conference on Information Technology, Computer, and Electrical Engineering. IEEE.
  • [10] Koniaris, I., Papadimitriou, G., & Nicopolitidis, P. 2013, “Analysis and visualization of SSH attacks using honeypots” In Eurocon 2013. IEEE.
  • [11] On Security Issues in Web Applications through Cross Site Scripting (XSS) 2013, In 2013 20th Asia-Pacific Software Engineering Conference (APSEC). IEEE.