{"title":"Privacy Awareness in Social Networks","authors":"Salih Erdem Erol, Ş. Sağiroğlu","doi":"10.1109/ISCTURKEY53027.2021.9654283","DOIUrl":"https://doi.org/10.1109/ISCTURKEY53027.2021.9654283","url":null,"abstract":"Although social networking environments have entered our lives as online internet applications which are used to interact with other users by creating their own content, they have become an immense source of information today. These data mainly contain personal data, especially covering profiles and shares of users but reveals a great dilemma. On the one hand, users want to communicate with their friends, interact and share their information, on the other hand, they are concerned about the privacy and security issues. In this study, privacy awareness in social networks and methods used in literature for measuring privacy awareness was investigated and discussed in detail. The findings, suggestions and evaluations were finally presented.","PeriodicalId":383915,"journal":{"name":"2021 International Conference on Information Security and Cryptology (ISCTURKEY)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131013299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ISCTURKEY 2021 Foreword","authors":"","doi":"10.1109/ISCTURKEY53027.2021.9654387","DOIUrl":"https://doi.org/10.1109/ISCTURKEY53027.2021.9654387","url":null,"abstract":"","PeriodicalId":383915,"journal":{"name":"2021 International Conference on Information Security and Cryptology (ISCTURKEY)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124579732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Özkan Şengül, Hasan Özkılıçaslan, Emrecan Arda, U. Yavanoglu, I. Dogru, A. Selçuk
{"title":"Implementing a Method for Docker Image Security","authors":"Özkan Şengül, Hasan Özkılıçaslan, Emrecan Arda, U. Yavanoglu, I. Dogru, A. Selçuk","doi":"10.1109/ISCTURKEY53027.2021.9654383","DOIUrl":"https://doi.org/10.1109/ISCTURKEY53027.2021.9654383","url":null,"abstract":"Containers that can be easily created, transported and scaled with the use of container-based virtualization technologies work better than classical virtualization technologies and provide efficient resource usage. The Docker platform is one of the most widely used solutions among container-based virtualization technologies. The OS-level virtualization of the Docker platform and the container’s use of the host operating system kernel may cause security problems. In this study, a method including static and dynamic analysis has been proposed to ensure Docker image and container security. In the static analysis phase of the method, the packages of the images are scanned for vulnerabilities and malware. In the dynamic analysis phase, Docker containers are run for a certain period of time, after the open port scanning, network traffic is analyzed with the Snort3. Seven Docker images are analyzed and the results are shared.","PeriodicalId":383915,"journal":{"name":"2021 International Conference on Information Security and Cryptology (ISCTURKEY)","volume":"33 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120986116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ISCTURKEY 2021 Cover Page","authors":"","doi":"10.1109/ISCTURKEY53027.2021.9654381","DOIUrl":"https://doi.org/10.1109/ISCTURKEY53027.2021.9654381","url":null,"abstract":"","PeriodicalId":383915,"journal":{"name":"2021 International Conference on Information Security and Cryptology (ISCTURKEY)","volume":"1998 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127929179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alireza Shirmarz, A. Ghaffari, Ramin Mohammadi, S. Akleylek
{"title":"DDOS Attack Detection Accuracy Improvement in Software Defined Network (SDN) Using Ensemble Classification","authors":"Alireza Shirmarz, A. Ghaffari, Ramin Mohammadi, S. Akleylek","doi":"10.1109/ISCTURKEY53027.2021.9654403","DOIUrl":"https://doi.org/10.1109/ISCTURKEY53027.2021.9654403","url":null,"abstract":"Nowadays, Denial of Service (DOS) is a significant cyberattack that can happen on the Internet. This attack can be taken place with more than one attacker that in this case called Distributed Denial of Service (DDOS). The attackers endeavour to make the resources (server & bandwidth) unavailable to legitimate traffic by overwhelming resources with malicious traffic. An appropriate security module is needed to discriminate the malicious flows with high accuracy to prevent the failure resulting from a DDOS attack. In this paper, a DDoS attack discriminator will be designed for Software Defined Network (SDN) architecture so that it can be deployed in the POX controller. The simulation results present that the proposed model can achieve an accuracy of about 99.4%which shows an outstanding percentage of improvement compared with Decision Tree (DT), K-Nearest Neighbour (KNN), Support Vector Machine (SVM) approaches.","PeriodicalId":383915,"journal":{"name":"2021 International Conference on Information Security and Cryptology (ISCTURKEY)","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124331939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Digital Twin Security Threats and Countermeasures: An Introduction","authors":"Enis Karaarslan, M. Babiker","doi":"10.1109/ISCTURKEY53027.2021.9654360","DOIUrl":"https://doi.org/10.1109/ISCTURKEY53027.2021.9654360","url":null,"abstract":"The digital twin is based on integrated technologies such as the Internet of Things (IoT), Cloud Computing, Machine Learning, and Artificial Intelligence. The digital twin has become an important method of the digital manufacturing processes for the fourth industrial revolution. The digital twin is driven by increased intelligence, digitization, and reliability of smart manufacturing assets. It has potential usage areas such as construction, smart cities, and healthcare. It could be used to increase the overall performance of the potential systems and to support the physical world. Although extensive benefits are recognized, the security risks for using the digital twin have yet to be explored. The physical world of various nodes communicates with the digital twin. The digital twins will also communicate with each other in the near future. This study investigates the risks and threats which target the components of digital twin, machine learning processes, and data communication. Potential countermeasures and also future work is given.","PeriodicalId":383915,"journal":{"name":"2021 International Conference on Information Security and Cryptology (ISCTURKEY)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121508504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Honeypots Vulnerabilities to Backdoor Attack","authors":"Farshad Javid, M. Z. Lighvan","doi":"10.1109/ISCTURKEY53027.2021.9654401","DOIUrl":"https://doi.org/10.1109/ISCTURKEY53027.2021.9654401","url":null,"abstract":"Honeypots are widely used to increase the security of systems and networks, but they only observe the activities that are done against them. A honeypot will not be able to detect an exploit in another system unless it interacts directly with it. In addition to the weakness caused by the normal behavior of honeypots, our research shows that honeypots may succumb to back door attacks. To prove this claim, a backdoor attack is performed on the popular Honeypot system. Experimental results show that the Kfsensor Honeypot is bypassed using a backdoor attack, and network protection is disabled even with the Honeypot enabled.","PeriodicalId":383915,"journal":{"name":"2021 International Conference on Information Security and Cryptology (ISCTURKEY)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114727582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Analysis of Ethereum Smart Contract Vulnerabilities","authors":"Turgay Arda Usman, A. Selçuk, Süleyman Özarslan","doi":"10.1109/ISCTURKEY53027.2021.9654305","DOIUrl":"https://doi.org/10.1109/ISCTURKEY53027.2021.9654305","url":null,"abstract":"New vulnerabilities are constantly being discovered in Ethereum and the found vulnerabilities are fixed. This situation causes many vulnerabilities to be effective periodically. This article analyzes the smart contracts deployed on the Ethereum blockchain in 2020 and examines the ten most common vulnerabilities. By doing so, we aimed to determine a threat landscape for 2020. During this analysis, we studied how the vulnerabilities emerged, critical attacks that exploit the vulnerabilities, and what can be done to avoid them.","PeriodicalId":383915,"journal":{"name":"2021 International Conference on Information Security and Cryptology (ISCTURKEY)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128507438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MQTT Security at a Glance","authors":"Emrah Atilgan, Ilker Ozcelik, E. Yolacan","doi":"10.1109/ISCTURKEY53027.2021.9654337","DOIUrl":"https://doi.org/10.1109/ISCTURKEY53027.2021.9654337","url":null,"abstract":"It is possible to talk about the concept of IoT in every environment where there is the Internet and devices that can connect to the Internet in various ways. An IoT system may include various devices such as sensors, machines, applications, etc. to improve the quality of people’s lives or the value of business income. The MQTT protocol is the most widely used protocol for the communication of these devices in IoT systems. Since it is a part of our daily life, it has become essential to examine the weaknesses of this protocol and provide solutions to them. In this study, the structure and operation of the MQTT protocol are detailed, possible attack types are classified, and their properties are examined. Then, the security solutions for the MQTT protocol are examined under two categories and the studies done in recent years are included. With the proposed study, it is aimed to examine the security issues of the MQTT protocol and to guide future studies by creating a knowledge base in this field.","PeriodicalId":383915,"journal":{"name":"2021 International Conference on Information Security and Cryptology (ISCTURKEY)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128774536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Threats and Performance Evaluation of Ultra Wideband and Bluetooth Low Energy Technologies for Indoor Positioning","authors":"İsmail Dervişoğlu, U. Yavanoglu","doi":"10.1109/ISCTURKEY53027.2021.9654342","DOIUrl":"https://doi.org/10.1109/ISCTURKEY53027.2021.9654342","url":null,"abstract":"The most basic positioning technology GPS cannot be used effectively due to the distortion of its signals in closed areas. Therefore, different technologies are used for positioning within these areas. Examples of these technologies include Bluetooth Low Energy (BLE), a low-power and cost-effective technology, and Ultra Wideband (UWB) technologies that have many advantages by broadcasting with short pulses at high bandwidth. In this study, indoor positioning systems were developed using BLE and UWB technologies, and security threats and location prediction performances of these systems were examined. There are differences between BLE and UWB technologies such as standard, bandwidth and distance estimation algorithms. Because of these differences, the security threats related to these two technologies differ. In this context, security problems that may arise depending on the technology used in the system are mentioned. In addition, the performance of these systems developed using these two different technologies, was compared by conducting distance and positioning tests in the same area with an area of 12m x 15m. In the tests conducted to compare the positioning performance from these tests, it was calculated that the UWB indoor positioning system had a positioning error of 0.43 m and the BLE indoor positioning system had a positioning error of 1.54 m in the same environment.","PeriodicalId":383915,"journal":{"name":"2021 International Conference on Information Security and Cryptology (ISCTURKEY)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123369637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}