Yazar "Bariskan, Mehmet Ali" seçeneğine göre listele
Listeleniyor 1 - 3 / 3
Sayfa Başına Sonuç
Sıralama seçenekleri
Öğe Cyber Attack Detection with Encrypted Network Connection Analysis(Springer Science and Business Media Deutschland GmbH, 2024) Gonen, Serkan; Karacayilmaz, Gokce; Artuner, Harun; Bariskan, Mehmet Ali; Yilmaz, Ercan NurcanThe evolution of science and technology has led to increasingly complex cyber security threats, with advanced evasion techniques and encrypted communication channels making attacks harder to detect. While encryption has improved privacy and confidentiality for users, it has also provided a new avenue for attackers to exploit. Traditional intrusion detection systems, which transitioned from signature-based to behavior-based approaches, have struggled to keep up with these challenges. To address this issue, researchers have turned to continuous system monitoring and network traffic packet analysis. However, this method can be resource-intensive and time-consuming, particularly when analyzing encrypted packets. In this study, the JA3 fingerprint infrastructure was examined as a potential solution for quickly detecting attacks conducted over encrypted sessions while minimizing system downtime and damage. The results demonstrated that the JA3 infrastructure effectively detected attacks carried out via encrypted channels. Although Windows 10 and Kali 2020.4 operating systems were used as the victim and attacker systems respectively, the methodology can be applied to other operating systems and network hardware by following the outlined steps. This research is expected to make a significant contribution to the field of encryption-based attack prevention. © 2024, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.Öğe Machine learning-based identification of cybersecurity threats affecting autonomous vehicle systems(Pergamon-Elsevier Science Ltd, 2024) Onur, Furkan; Gonen, Serkan; Bariskan, Mehmet Ali; Kubat, Cemallettin; Tunay, Mustafa; Yilmaz, Ercan NurcanWith the advancement of humanity, transportation and trade activities have increased, leading to the development process of basic land vehicles as more than physical power became necessary. Hand tools were developed with the invention of the wheel, followed by animal-powered vehicles, and then steam engine technology. After the advancement of electromechanical technologies, today's modern vehicles have been developed. Those who used these vehicles thought of transferring control from the human to autonomous driving systems to solve their safety and comfort problems. Today, instead of fully autonomous systems targeted for the future, autonomous driving support systems have been developed. Although these systems aim to increase the safety and comfort of passengers, they can become an easy target for malicious people due to network technologies and remote connection features. The most effective method of protection from these attackers is to conduct vulnerability analysis against newly emerging threats for the systems we use and to rectify identified vulnerabilities. In this research paper, the weaknesses of wireless communication towards remote connection usage of the mini electric autonomous vehicle were investigated, which we developed and produced its mechanics, electronics, and software. In this context, a test environment was created, and the problems and threats in autonomous driving technology were revealed through attacks (Deauth Attack, DoS, DDoS and MitM) made on the test environment. Following the exposed vulnerabilities, studies were conducted for the detection of these attacks using Artificial Intelligence. In the study, different algorithms were used to detect the attacks, and random forest algorithm successfully detected 96.1% of attacks. The main contribution to the field of cybersecurity in autonomous vehicles by providing effective solutions for threat identification and defense.Öğe A Novel Approach Detection for False Data Injection, and Man in the Middle Attacks in IoT and IIoT(Institute of Electrical and Electronics Engineers Inc., 2023) Gonen, Serkan; Bariskan, Mehmet Ali; Kaplan, Derya Yiltas; Yilmaz, Ercan Nurcan; Cetin, AydinHuman beings have gone through stages that have made significant contributions to their lives with technological developments. One of the most important of these close to the present day is the introduction of IoTs, and IIoTs into our lives with the industry 4.0 process. From smart homes to smart grids, we are faced with a world that is getting smarter in every aspect of our lives. In this cyber environment where our data, including our personal data, is transferred to the virtual environment, the biggest threat is the attacks that can be made on this existing environment. The biggest methods used by attackers are to exploit the vulnerabilities that the existing system brings in addition to the old vulnerabilities. With the IoT process, there have been very important developments, and all operations can be carried out remotely via mobile phone or computer, such as checking the missing needs in the refrigerator, washing, drying clothes, and even in the most advanced dimension, reducing the temperature if it is too high, or increasing it if it is low, without people coming to their homes, and with these renovations, new types of threads become part of our lives. With this study we focus on one of more dangerous part of these attacks, False Data Injection (FDI), and Men in the Middle (MitM) attacks. With this study we detected MitM, and FDI attacks with success rate of %95 percent. © 2023 IEEE.