2021 International Conference on Information Security and Cryptology (ISCTURKEY)最新文献

筛选
英文 中文
Privacy Awareness in Social Networks 社交网络中的隐私意识
2021 International Conference on Information Security and Cryptology (ISCTURKEY) Pub Date : 2021-12-02 DOI: 10.1109/ISCTURKEY53027.2021.9654283
Salih Erdem Erol, Ş. Sağiroğlu
{"title":"Privacy Awareness in Social Networks","authors":"Salih Erdem Erol, Ş. Sağiroğlu","doi":"10.1109/ISCTURKEY53027.2021.9654283","DOIUrl":"https://doi.org/10.1109/ISCTURKEY53027.2021.9654283","url":null,"abstract":"Although social networking environments have entered our lives as online internet applications which are used to interact with other users by creating their own content, they have become an immense source of information today. These data mainly contain personal data, especially covering profiles and shares of users but reveals a great dilemma. On the one hand, users want to communicate with their friends, interact and share their information, on the other hand, they are concerned about the privacy and security issues. In this study, privacy awareness in social networks and methods used in literature for measuring privacy awareness was investigated and discussed in detail. The findings, suggestions and evaluations were finally presented.","PeriodicalId":383915,"journal":{"name":"2021 International Conference on Information Security and Cryptology (ISCTURKEY)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131013299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ISCTURKEY 2021 Foreword
2021 International Conference on Information Security and Cryptology (ISCTURKEY) Pub Date : 2021-12-02 DOI: 10.1109/ISCTURKEY53027.2021.9654387
{"title":"ISCTURKEY 2021 Foreword","authors":"","doi":"10.1109/ISCTURKEY53027.2021.9654387","DOIUrl":"https://doi.org/10.1109/ISCTURKEY53027.2021.9654387","url":null,"abstract":"","PeriodicalId":383915,"journal":{"name":"2021 International Conference on Information Security and Cryptology (ISCTURKEY)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124579732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementing a Method for Docker Image Security Docker镜像安全的实现方法
2021 International Conference on Information Security and Cryptology (ISCTURKEY) Pub Date : 2021-12-02 DOI: 10.1109/ISCTURKEY53027.2021.9654383
Özkan Şengül, Hasan Özkılıçaslan, Emrecan Arda, U. Yavanoglu, I. Dogru, A. Selçuk
{"title":"Implementing a Method for Docker Image Security","authors":"Özkan Şengül, Hasan Özkılıçaslan, Emrecan Arda, U. Yavanoglu, I. Dogru, A. Selçuk","doi":"10.1109/ISCTURKEY53027.2021.9654383","DOIUrl":"https://doi.org/10.1109/ISCTURKEY53027.2021.9654383","url":null,"abstract":"Containers that can be easily created, transported and scaled with the use of container-based virtualization technologies work better than classical virtualization technologies and provide efficient resource usage. The Docker platform is one of the most widely used solutions among container-based virtualization technologies. The OS-level virtualization of the Docker platform and the container’s use of the host operating system kernel may cause security problems. In this study, a method including static and dynamic analysis has been proposed to ensure Docker image and container security. In the static analysis phase of the method, the packages of the images are scanned for vulnerabilities and malware. In the dynamic analysis phase, Docker containers are run for a certain period of time, after the open port scanning, network traffic is analyzed with the Snort3. Seven Docker images are analyzed and the results are shared.","PeriodicalId":383915,"journal":{"name":"2021 International Conference on Information Security and Cryptology (ISCTURKEY)","volume":"33 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120986116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
ISCTURKEY 2021 Cover Page ISCTURKEY 2021封面页
2021 International Conference on Information Security and Cryptology (ISCTURKEY) Pub Date : 2021-12-02 DOI: 10.1109/ISCTURKEY53027.2021.9654381
{"title":"ISCTURKEY 2021 Cover Page","authors":"","doi":"10.1109/ISCTURKEY53027.2021.9654381","DOIUrl":"https://doi.org/10.1109/ISCTURKEY53027.2021.9654381","url":null,"abstract":"","PeriodicalId":383915,"journal":{"name":"2021 International Conference on Information Security and Cryptology (ISCTURKEY)","volume":"1998 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127929179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DDOS Attack Detection Accuracy Improvement in Software Defined Network (SDN) Using Ensemble Classification 利用集成分类提高软件定义网络(SDN)中DDOS攻击检测准确率
2021 International Conference on Information Security and Cryptology (ISCTURKEY) Pub Date : 2021-12-02 DOI: 10.1109/ISCTURKEY53027.2021.9654403
Alireza Shirmarz, A. Ghaffari, Ramin Mohammadi, S. Akleylek
{"title":"DDOS Attack Detection Accuracy Improvement in Software Defined Network (SDN) Using Ensemble Classification","authors":"Alireza Shirmarz, A. Ghaffari, Ramin Mohammadi, S. Akleylek","doi":"10.1109/ISCTURKEY53027.2021.9654403","DOIUrl":"https://doi.org/10.1109/ISCTURKEY53027.2021.9654403","url":null,"abstract":"Nowadays, Denial of Service (DOS) is a significant cyberattack that can happen on the Internet. This attack can be taken place with more than one attacker that in this case called Distributed Denial of Service (DDOS). The attackers endeavour to make the resources (server & bandwidth) unavailable to legitimate traffic by overwhelming resources with malicious traffic. An appropriate security module is needed to discriminate the malicious flows with high accuracy to prevent the failure resulting from a DDOS attack. In this paper, a DDoS attack discriminator will be designed for Software Defined Network (SDN) architecture so that it can be deployed in the POX controller. The simulation results present that the proposed model can achieve an accuracy of about 99.4%which shows an outstanding percentage of improvement compared with Decision Tree (DT), K-Nearest Neighbour (KNN), Support Vector Machine (SVM) approaches.","PeriodicalId":383915,"journal":{"name":"2021 International Conference on Information Security and Cryptology (ISCTURKEY)","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124331939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Digital Twin Security Threats and Countermeasures: An Introduction 数字孪生安全威胁与对策:导论
2021 International Conference on Information Security and Cryptology (ISCTURKEY) Pub Date : 2021-12-02 DOI: 10.1109/ISCTURKEY53027.2021.9654360
Enis Karaarslan, M. Babiker
{"title":"Digital Twin Security Threats and Countermeasures: An Introduction","authors":"Enis Karaarslan, M. Babiker","doi":"10.1109/ISCTURKEY53027.2021.9654360","DOIUrl":"https://doi.org/10.1109/ISCTURKEY53027.2021.9654360","url":null,"abstract":"The digital twin is based on integrated technologies such as the Internet of Things (IoT), Cloud Computing, Machine Learning, and Artificial Intelligence. The digital twin has become an important method of the digital manufacturing processes for the fourth industrial revolution. The digital twin is driven by increased intelligence, digitization, and reliability of smart manufacturing assets. It has potential usage areas such as construction, smart cities, and healthcare. It could be used to increase the overall performance of the potential systems and to support the physical world. Although extensive benefits are recognized, the security risks for using the digital twin have yet to be explored. The physical world of various nodes communicates with the digital twin. The digital twins will also communicate with each other in the near future. This study investigates the risks and threats which target the components of digital twin, machine learning processes, and data communication. Potential countermeasures and also future work is given.","PeriodicalId":383915,"journal":{"name":"2021 International Conference on Information Security and Cryptology (ISCTURKEY)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121508504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Honeypots Vulnerabilities to Backdoor Attack 针对后门攻击的蜜罐漏洞
2021 International Conference on Information Security and Cryptology (ISCTURKEY) Pub Date : 2021-12-02 DOI: 10.1109/ISCTURKEY53027.2021.9654401
Farshad Javid, M. Z. Lighvan
{"title":"Honeypots Vulnerabilities to Backdoor Attack","authors":"Farshad Javid, M. Z. Lighvan","doi":"10.1109/ISCTURKEY53027.2021.9654401","DOIUrl":"https://doi.org/10.1109/ISCTURKEY53027.2021.9654401","url":null,"abstract":"Honeypots are widely used to increase the security of systems and networks, but they only observe the activities that are done against them. A honeypot will not be able to detect an exploit in another system unless it interacts directly with it. In addition to the weakness caused by the normal behavior of honeypots, our research shows that honeypots may succumb to back door attacks. To prove this claim, a backdoor attack is performed on the popular Honeypot system. Experimental results show that the Kfsensor Honeypot is bypassed using a backdoor attack, and network protection is disabled even with the Honeypot enabled.","PeriodicalId":383915,"journal":{"name":"2021 International Conference on Information Security and Cryptology (ISCTURKEY)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114727582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Analysis of Ethereum Smart Contract Vulnerabilities 以太坊智能合约漏洞分析
2021 International Conference on Information Security and Cryptology (ISCTURKEY) Pub Date : 2021-12-02 DOI: 10.1109/ISCTURKEY53027.2021.9654305
Turgay Arda Usman, A. Selçuk, Süleyman Özarslan
{"title":"An Analysis of Ethereum Smart Contract Vulnerabilities","authors":"Turgay Arda Usman, A. Selçuk, Süleyman Özarslan","doi":"10.1109/ISCTURKEY53027.2021.9654305","DOIUrl":"https://doi.org/10.1109/ISCTURKEY53027.2021.9654305","url":null,"abstract":"New vulnerabilities are constantly being discovered in Ethereum and the found vulnerabilities are fixed. This situation causes many vulnerabilities to be effective periodically. This article analyzes the smart contracts deployed on the Ethereum blockchain in 2020 and examines the ten most common vulnerabilities. By doing so, we aimed to determine a threat landscape for 2020. During this analysis, we studied how the vulnerabilities emerged, critical attacks that exploit the vulnerabilities, and what can be done to avoid them.","PeriodicalId":383915,"journal":{"name":"2021 International Conference on Information Security and Cryptology (ISCTURKEY)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128507438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
MQTT Security at a Glance MQTT安全性概览
2021 International Conference on Information Security and Cryptology (ISCTURKEY) Pub Date : 2021-12-02 DOI: 10.1109/ISCTURKEY53027.2021.9654337
Emrah Atilgan, Ilker Ozcelik, E. Yolacan
{"title":"MQTT Security at a Glance","authors":"Emrah Atilgan, Ilker Ozcelik, E. Yolacan","doi":"10.1109/ISCTURKEY53027.2021.9654337","DOIUrl":"https://doi.org/10.1109/ISCTURKEY53027.2021.9654337","url":null,"abstract":"It is possible to talk about the concept of IoT in every environment where there is the Internet and devices that can connect to the Internet in various ways. An IoT system may include various devices such as sensors, machines, applications, etc. to improve the quality of people’s lives or the value of business income. The MQTT protocol is the most widely used protocol for the communication of these devices in IoT systems. Since it is a part of our daily life, it has become essential to examine the weaknesses of this protocol and provide solutions to them. In this study, the structure and operation of the MQTT protocol are detailed, possible attack types are classified, and their properties are examined. Then, the security solutions for the MQTT protocol are examined under two categories and the studies done in recent years are included. With the proposed study, it is aimed to examine the security issues of the MQTT protocol and to guide future studies by creating a knowledge base in this field.","PeriodicalId":383915,"journal":{"name":"2021 International Conference on Information Security and Cryptology (ISCTURKEY)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128774536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Security Threats and Performance Evaluation of Ultra Wideband and Bluetooth Low Energy Technologies for Indoor Positioning 超宽带和蓝牙低功耗室内定位技术的安全威胁与性能评估
2021 International Conference on Information Security and Cryptology (ISCTURKEY) Pub Date : 2021-12-02 DOI: 10.1109/ISCTURKEY53027.2021.9654342
İsmail Dervişoğlu, U. Yavanoglu
{"title":"Security Threats and Performance Evaluation of Ultra Wideband and Bluetooth Low Energy Technologies for Indoor Positioning","authors":"İsmail Dervişoğlu, U. Yavanoglu","doi":"10.1109/ISCTURKEY53027.2021.9654342","DOIUrl":"https://doi.org/10.1109/ISCTURKEY53027.2021.9654342","url":null,"abstract":"The most basic positioning technology GPS cannot be used effectively due to the distortion of its signals in closed areas. Therefore, different technologies are used for positioning within these areas. Examples of these technologies include Bluetooth Low Energy (BLE), a low-power and cost-effective technology, and Ultra Wideband (UWB) technologies that have many advantages by broadcasting with short pulses at high bandwidth. In this study, indoor positioning systems were developed using BLE and UWB technologies, and security threats and location prediction performances of these systems were examined. There are differences between BLE and UWB technologies such as standard, bandwidth and distance estimation algorithms. Because of these differences, the security threats related to these two technologies differ. In this context, security problems that may arise depending on the technology used in the system are mentioned. In addition, the performance of these systems developed using these two different technologies, was compared by conducting distance and positioning tests in the same area with an area of 12m x 15m. In the tests conducted to compare the positioning performance from these tests, it was calculated that the UWB indoor positioning system had a positioning error of 0.43 m and the BLE indoor positioning system had a positioning error of 1.54 m in the same environment.","PeriodicalId":383915,"journal":{"name":"2021 International Conference on Information Security and Cryptology (ISCTURKEY)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123369637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信