Zamansal Evrişimli Ağlarla Saldırı Tespiti: Karşılaştırmalı Bir Analiz

2021-01-01
ÇAKIR, BERNA
Angın, Pelin
Son yıllarda Nesnelerin İnterneti paradigmasının hızlı yükselişi ve bu yükselişin yarattığı büyük siber saldırı yüzeyi, otomatik saldırı tespit sistemlerinin önemini arttırmıştır. Özellikle daha önce gözlenmemiş sıfırıncı gün saldırılarının tespitinde klasik imza tabanlı saldırı tespit sistemleri yetersiz kalmaktadır. Bu durum siber güvenlik araştırmacılarını özellikle anomali tespiti için makine öğrenme tabanlı yöntemlere yönlendirmiştir. Literatürde derin öğrenme yöntemlerini bilgisayar ağlarında saldırı tespiti için kullanan birçok yöntem önerilmiş ve yüksek başarım elde etmiştir. Yakın zamanda ilk olarak videolarda aksiyon segmentasyonu için önerilen zamansal evrişimsel ağlar (TCN), zaman serisi içeren öğrenme görevlerinde yüksek başarı elde ettiği halde, bilgisayar ağlarında saldırı tespiti alanındaki etkinlikleri detaylı analiz edilmemiştir. Bu çalışmada TCN’nin saldırı tespiti konusunda başarımı irdelenmiştir. TCN’nin hem ikili sınıflandırma hem de anomali tespiti problemlerindeki başarımı, birçok saldırı tespiti probleminde yüksek başarım elde etmiş tekrarlayan sinir ağları ve tam bağlı sinir ağları yöntemleriyle kıyaslanmıştır. Elde edilen sonuçlar TCN’nin yüksek doğruluklu saldırı tespiti için ümit vaat eden bir yöntem olduğunu göstermektedir.
European Journal of Science and Technology

Suggestions

Zero-day attack detection with deep learning
Çakır, Berna; Angın, Pelin; Department of Computer Engineering (2019)
The rise of the IoT paradigm in the past decade has resulted in an unprecedented number of zero-day attacks launched against IoT systems, which are capable of causing major damages. Deep learning has recently become a popular technique for many learning tasks including intrusion detection, with high potential to detect zero-day attacks in addition to ones with well-known signatures. In this thesis, we analyzed the efficacy of supervised and unsupervised deep learning algorithms for detecting zero-day attack...
It security and privacy guidance tool for iot designs and products
Erhan, Mutl; Günel Kılıç, Banu; Department of Information Systems (2019)
Security and privacy issues in the Internet of Things (IoT) have received much attention in recent years because of the attacks, which have increased both in quantity and diversity. Many studies have been done to make the IoT ecosystem more secure, and these have managed to ease some risks partially by presenting security frameworks or basic standards. However; presented frameworks or standards have not been accepted by all the stakeholders in the IoT ecosystem and have not been able to provide solutions fo...
Malicious code detection: run trace analysis by LSTM
Şırlancı, Melih; Acartürk, Cengiz; Gürkan Balıkçıoğlu, Pınar; Department of Cybersecurity (2021-6)
Malicious software threats and their detection have been gaining importance as a subdomain of information security due to the expansion of ICT applications in daily settings. A major challenge in designing and developing anti-malware systems is the coverage of the detection, particularly the development of dynamic analysis methods that can detect polymorphic and metamorphic malware efficiently. In the present study, we propose a methodological framework for detecting malicious code by analyzing run trace ou...
Static Malware Detection Using Stacked Bi-Directional LSTM
Demirci, Deniz; Acartürk, Cengiz; Department of Cybersecurity (2021-8-19)
The recent proliferation in the use of the Internet and personal computers has made it easier for cybercriminals to expose Internet users to widespread and damaging threats. In order protect the end users against such threats, a security system must be proactive. It needs to detect malicious files or executables before reaching the end-user. To create an efficient and low-cost malware detection mechanism, in the present study, we propose stacked bidirectional long short-term memory (Stacked BiLSTM) based de...
An energy efficient hierarchical approach using multimedia and scalar sensors for emergency services
Kızılkaya, Burak; Ever, Enver; Sustainable Environment and Energy Systems (2019-7)
Recently, environment monitoring and detection systems became more accessible with the help of IoT applications. Furthermore, connecting smart devices makes monitoring applications more accurate and reliable. On the other hand, optimizing the energy requirement of smart sensors especially while transmitting data has always been very important, and there are different applications to create energy efficient IoT systems. Detailed analysis of lifetimes of various types of sensors (survival analysis) has theref...
Citation Formats
B. ÇAKIR and P. Angın, “Zamansal Evrişimli Ağlarla Saldırı Tespiti: Karşılaştırmalı Bir Analiz,” European Journal of Science and Technology, no. 22, pp. 204–211, 2021, Accessed: 00, 2022. [Online]. Available: http://dx.doi.org/10.31590/ejosat.848784.