{"title":"IBIGDELFT 2018","authors":"Mücadele Kongresi, Telif Hakkı","doi":"10.1109/ibigdelft.2018.8625341","DOIUrl":"https://doi.org/10.1109/ibigdelft.2018.8625341","url":null,"abstract":"Abstracting is permitted with credit to the source. Libraries are permitted to photocopy beyond the limit of U.S. Copyright law for private use of patrons those articles in this volume that carry a code at the bottom of the first page, provided the per-copy fee indicated in the code is paid throught Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923. For reprint or republication permission, email to IEEE Copyright Manager at pubs-permission@ieee.org","PeriodicalId":290302,"journal":{"name":"2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114825321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ahmet Kilic, S. Ozdemir, Ilker Ozcelik, R. Erdoğan, Ramazan Terzi, Murat Akin, Bilgehan Arslan, Mehtap Ulker, Baris Bülent Kirlar, Süleyman Demirel, C. Varol, Sam Houston, Ç. Arslan, E. Okamoto, E. Yolacan, Osman Gazi, Fehmi Jafaar, H. Ş. Bilge, I. G. Ozbilgin, R. Erdoğan, H. Sever, M. Kiraz, M. Kaya, Y. Beyazit
{"title":"International Congress on Bigdata Deep Learning and Fighting Cyber Terrorism","authors":"Ahmet Kilic, S. Ozdemir, Ilker Ozcelik, R. Erdoğan, Ramazan Terzi, Murat Akin, Bilgehan Arslan, Mehtap Ulker, Baris Bülent Kirlar, Süleyman Demirel, C. Varol, Sam Houston, Ç. Arslan, E. Okamoto, E. Yolacan, Osman Gazi, Fehmi Jafaar, H. Ş. Bilge, I. G. Ozbilgin, R. Erdoğan, H. Sever, M. Kiraz, M. Kaya, Y. Beyazit","doi":"10.1109/ibigdelft.2018.8625348","DOIUrl":"https://doi.org/10.1109/ibigdelft.2018.8625348","url":null,"abstract":"International Congress on Bigdata Deep Learning and Fighting Cyber Terrorism","PeriodicalId":290302,"journal":{"name":"2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131718538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of Security Information and Event Management Systems for Custom Security Visualization Generation","authors":"Ferda Özdemir Sönmez, B. Gunel","doi":"10.1109/ibigdelft.2018.8625291","DOIUrl":"https://doi.org/10.1109/ibigdelft.2018.8625291","url":null,"abstract":"Security Information and Event Management Systems (SIEM) are generally very complex systems encapsulating a large number of functions with different behaviors. Visualization is a common way of data presentation in these systems along with other data presentation ways such as reporting, alerting, text messaging. However, generation of the visualization has different steps. If the data is in a custom format, rather than a predefined format which either obeys a standard or a known file structure, the generation of custom visualizations may not be straightforward. Evaluation information for these tools related to custom visualization generation capabilities may be useful for better decision making. This information can be used while designing visualizations through SIEM systems or purchasing the most useful SIEM system for an organization. In this study, six well-known SIEM systems are evaluated through a common scenario created by the authors to check custom visualization generation capabilities. The contributions include this unique scenario and the advantages and disadvantages regarding various steps of the provided scenario along with the difficulties experienced by the authors during the installation and configuration of these SIEM systems.","PeriodicalId":290302,"journal":{"name":"2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114498498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Steganography Application for UTF8 Encoded Texts","authors":"Cihan Yakar, S. Ozdemir","doi":"10.1109/IBIGDELFT.2018.8625308","DOIUrl":"https://doi.org/10.1109/IBIGDELFT.2018.8625308","url":null,"abstract":"Encryption is the most common method used to protect the texts from being read by the individuals or systems other than the sender and receiver. In encrypted communication, third parties and supervisors can easily realize that a closed information is transmitted. Although this content cannot be resolved immediately, it can be marked as suspicious. Closed text can also be protected by using a hidden method instead of using an encryption method. The hidden text could be attributed “innocent” without notice by the third parties or systems. Recognizing the hidden text will become more difficult when it is included in everyday conversations. In this study, the work of hiding another text within a text encoded in the UTF-8 standard has been made for everyday communication applications. The method used in the study has been controlled by using instant messaging softwares which are widely used.","PeriodicalId":290302,"journal":{"name":"2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126142156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Awareness Qualification Level Measurement Model","authors":"Salih Erdem Erol, Ş. Sağiroğlu","doi":"10.1109/IBIGDELFT.2018.8625305","DOIUrl":"https://doi.org/10.1109/IBIGDELFT.2018.8625305","url":null,"abstract":"To be able to talk about effective information security against all types of attacks, from a simple cyber attack to cyber terrorism and even cyber warfare, awareness must be defined as a problem, not a solution. To solve this problem “You can not manage what you can not measure!” point of view must be the starting point. Information security problem can be solved if security awareness level can be measured accurately and raising the awareness level according to the measurements. After studies in the literature are examined, it is seen that there is no dynamic model for measuring the cyber security awareness, score based leveling, survey and focus area based approaches are used, measurements are made for certain levels/groups and do not have a certain leveling standardization. In this study, a “capability based dynamic model” has been proposed for the first time in order to measure awareness level. It is seen that the proposed model is superior to the models in literature by these specifications; designed in a stepped structure with leveling standardization, applicable to all groups/levels and capability based approach used. It is considered that the developed model will contribute to the increase of cyber security awareness.","PeriodicalId":290302,"journal":{"name":"2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123937371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yasin Uygun, Mehmet Onur Erboy, M. Aktaş, O. Kalipsiz, Ishak Aykurt
{"title":"Technical Analysis on Financial Time Series Data Based on Map-Reduce Programming Model: A Case Study","authors":"Yasin Uygun, Mehmet Onur Erboy, M. Aktaş, O. Kalipsiz, Ishak Aykurt","doi":"10.1109/IBIGDELFT.2018.8625357","DOIUrl":"https://doi.org/10.1109/IBIGDELFT.2018.8625357","url":null,"abstract":"Technical analysis is a widely used method for forecasting the price direction on the financial time series data. This method requires the use of different number and types of analysis algorithms (technical indicators) together. Although these algorithms show successful performance on small-scalefinancial time series data, significant performance decreases are detected when the size of data increased. On the large-scale financial time series data, it is necessary to implement these algorithms based on the Map-Reduce programming model and examine the performance of the algorithms which are implemented based on this model comparatively. For this purpose, seven different indicators are studied within the scope of this study, new versions of these indicators are implemented using Map-Reduce parallel data processing model and performance comparisons are made with these algorithms. As a result of these comparisons on single-node and multi-node, significant performance gains have been obtained using Map-Reduce programming model.","PeriodicalId":290302,"journal":{"name":"2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122657052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. K. Pehlivanoglu, S. Akleylek, M. T. Sakalli, N. Duru
{"title":"Generating MDS Matrices in Toeplitz Form by Using Generalised Hadamard Form","authors":"M. K. Pehlivanoglu, S. Akleylek, M. T. Sakalli, N. Duru","doi":"10.1109/IBIGDELFT.2018.8625280","DOIUrl":"https://doi.org/10.1109/IBIGDELFT.2018.8625280","url":null,"abstract":"In this paper, hardware efficient diffusion layers are generated. Non-involutory and new 8×8 MDS matrices over GF(28) with the best-known XOR counts are constructed by using a new matrix form, which is developed by circulant matrix form and the idea used in developing Generalised Hadamard (GHadamard) matrix form. Then, it is shown that the proposed matrix form is a subset of Toeplitz matrix form.","PeriodicalId":290302,"journal":{"name":"2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123184170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}