User Guide
Why can I only view 3 results?
You can also view all results when you are connected from the network of member institutions only. For non-member institutions, we are opening a 1-month free trial version if institution officials apply.
So many results that aren't mine?
References in many bibliographies are sometimes referred to as "Surname, I", so the citations of academics whose Surname and initials are the same may occasionally interfere. This problem is often the case with citation indexes all over the world.
How can I see only citations to my article?
After searching the name of your article, you can see the references to the article you selected as soon as you click on the details section.
 Views 75
 Downloands 17
Açık Kaynak İstihbaratı Üzerinden Siber Saldırı Tespiti Yöntemleri
2019
Journal:  
Düzce Üniversitesi Bilim ve Teknoloji Dergisi
Author:  
Abstract:

Son yıllarda siber suçun gittikçe büyüyen etkisi, siber tehditlerin üstesinden gelmek için dünya çapında istihbarat ve kanun uygulayıcı kurumlar ortaya çıkartmıştır. Tüm kurum ve kuruluşlar siber suçla en iyi şekilde nasıl mücadele edileceğini öğrenmeye çalışmaktadır. İnternet ağ teknolojilerinin gelişmesi ve genişlemesi ile siber saldırıları engellemek gittikçe zorlaşmaktadır. Ağdaki tehlikeli hedeflerin kapsamlı bir analizini oluşturmak için internette açık halde bulunan verileri toplayarak istihbarat elde etmek, istihbarat birimleri için önemli bir araç olarak hızla gelişmektedir. İnternetteki mevcut açık kaynakların miktarı hızla arttıkça, siber suçla mücadele gelişen açık kaynak istihbaratı yani OSINT yöntemleri çerçevesinde daha etkin olmaktadır. Buna bağlı olarak bilginin etkili ve verimli bir şekilde toplanması ve işlenmesi için gelişmiş yazılım araçları ve teknikleri daha da gelişmektedir. Bu çalışmada, OSINT kavramı siber saldırı tespiti için her açıdan ele alınmıştır. OSINT kavramını internet ortamında kamuya açık paylaşılan veriler üzerinden tarama, bulma, toplama, çıkarma, kullanma, doğrulama ve analiz yaparak elde etme amaçlı destek yöntemleri detaylandırılarak anlatılmıştır. Siber tehditlere karşı geliştiren araştırmalar için açık kaynak verilerinin kullanılmasına yönelik mevcut çabalar gözden geçirilmiş ve detaylı bir şekilde incelenmiştir. Bunlara ek olarak, siber suçlarla etkin mücadele için siber suç soruşturma çerçevesi önerilmiştir.

Keywords:

Methods of detection of cyber attacks on open source information
2019
Author:  
Abstract:

In recent years, the increasing impact of cyber crime has been revealed by intelligence and law enforcement agencies around the world to overcome cyber threats. All institutions and organizations are trying to learn how to best fight cyber crime. With the development and expansion of Internet network technologies, it is increasingly difficult to prevent cyber attacks. Obtaining intelligence by collecting open data on the internet to create a comprehensive analysis of hazardous targets in the network is rapidly developing as an important tool for intelligence units. As the number of existing open-source resources on the Internet is rapidly increasing, it is becoming more effective in the framework of open-source intelligence, which develops the fight against cyber crime, which is OSINT methods. As a result, advanced software tools and techniques are further developing for the effective and efficient collection and processing of information. In this study, the OSINT concept has been dealt with from every point of view for the detection of cyber attacks. The OSINT concept is described by detailing the support methods for obtaining through the scan, finding, collecting, extracting, use, verification and analysis of publicly shared data. The current efforts to use open source data for research on cyber threats have been reviewed and detailed. In addition, a framework for cyber crime investigation was proposed to effectively fight cyber crime.

Keywords:

Cyber Attack Detection Methods Over Open Source Intelligence
2019
Author:  
Abstract:

In recent years, the growing impact of cybercrime has revealed worldwide intelligence and law enforcement agencies to overcome cyber threats. All institutions and organizations are trying to learn how to fight cybercrime in the best possible way. With the development and expansion of internet networking technologies, it becomes increasingly difficult to prevent cyber attacks. It is rapidly developing as an important tool for intelligence units by collecting data on the internet to generate a comprehensive analysis of dangerous targets on the network. As the amount of available open-source resources on the internet increases rapidly, the emerging open-source intelligence, in other words, is more effective within the framework of OSINT methods. In this connection, advanced software tools and techniques are further developed for the effective and efficient collection and processing of information. In this study, the concept of OSINT was discussed in all aspects for cyber attack detection. The purpose of browsing, finding, collecting, extracting, using, verifying and analyzing the OSINT concept through publicly available data is explained in detail. Existing efforts to use open source data for research against cyber threats have been reviewed and examined in detail. In addition, the cyber crime investigation framework has been proposed to combat cybercrime effectively.

Keywords:

Citation Owners
Information: There is no ciation to this publication.
Similar Articles








Düzce Üniversitesi Bilim ve Teknoloji Dergisi

Field :   Fen Bilimleri ve Matematik

Journal Type :   Ulusal

Metrics
Article : 1.636
Cite : 3.108
2023 Impact : 0.134
Düzce Üniversitesi Bilim ve Teknoloji Dergisi