Yazar "Aslan, ömer" seçeneğine göre listele
Listeleniyor 1 - 5 / 5
Sayfa Başına Sonuç
Sıralama seçenekleri
Öğe BÖLÜM 8: KÖTÜ AMAÇLI YAZILIMLAR VE ANALİZİ(2018) Samet, Refik; Aslan, ömerKötü amaçlı yazılımlar dinamik olup zaman zaman saldırı biçimini ve hedefini değiştirerek sürekli gelişme gösteren yazılımlardır. Bu yazılımları tespit etmek ve bulaştıkları sistemlerle olan etkileşimlerini anlamak için analiz edilmeleri gerekmektedir. Kötü amaçlı yazılım analizi bu yazılımların nasıl çalıştığını anlamak, tespit etmek ve yayılmasını engellemek amacıyla yapılan çalışmaları kapsamaktadır. Bu bölümde bu yazılımların nasıl analiz ve tespit edileceğiyle ilgili güncel bilgiler bulunmaktadır. Her ne kadar yeni teknik ve yöntemler kullanılsa da bütün kötü amaçlı yazılımları %100 başarı oranıyla analiz ve tespit etmek mümkün görünmemektedir.Öğe How to Decrease Cyber Threats by Reducing Software Vulnerabilities and Bugs(2016-10) Aslan, ömerAs a result of technological improvements, computer systems facing not only traditional security attacks, but also facing new cyber attacks which are more sophisticated and harmful threats such as Stuxnet, and Dragonfly. These attacks may cause enormous destruction to victim machine, steal confidential information or use infected machine to attack other computerized systems. Every year, the whole world lose millions of dollars because of the cyber attack and its consequences. Each year, these kinds of attacks and impact of the cyber attacks increase rapidly. In most cases, attackers carried out direct penetration to the system or use malware to carry out malicious intents. Most of the threats and attacks that exploit existing vulnerabilities which are found in hardware, software, and network layers. Absolute security is not possible and not necessary, instead we need to provide good enough security. To protect computer system from cyber threats, deep protection mechanism such as encryption, firewall, intrusion detection, prevention and response system has been used for many years, but some new malware types bypass through those security protection, so there is an urgent need to develop new security mechanism. The goal of this study is understanding core of the attacks in advance and provide a conceptual framework to implement secure software and specify vulnerable programs automatically.Öğe Investigation of Possibilities to Detect Malware Using Existing Tools(IEEE, 2017-10) Aslan, ömer; samet, RefikMalware stands for malicious software, which is installed on a computer system without the knowledge of the system owner. It performs malicious actions such as stealing confidential information and allowing remote code execution, and it can cause denial of service. Recently, malware creators started to publish new malware, which can bypass anti-malware software, intrusion detection systems (IDS) and sandbox execution. Due to this evasion, the protection of computer networks and computerized systems against these programs has become one of the biggest challenges in the information security realm. This paper proposes a methodology to learn the well-known malware analysis and detection tools, to implement these tools on well-known malware and benign programs and to compare the obtained results. Further, this research will suggest to users how to analyze and detect existing and unknown malware. In a test case, 100 malware and 100 benign program samples were collected from different sources and analyzed under different versions of Windows machines. The test results indicated that it is almost impossible to detect malware by only using one tool. Using static and dynamic analysis tools together increased accuracy and the detection rate. The test results also showed that dynamicÖğe Mitigating Cyber Security Attacks by being Aware of Vulnerabilities and Bugs(IEEE, 2017) Aslan, ömer; samet, RefikBecause the Internet makes human lives easier, many devices are connected to the Internet daily. The private data of individuals and large companies, including health-related data, user bank accounts, and military and manufacturing data, are increasingly accessible via the Internet. Because almost all data is now accessible through the Internet, protecting these valuable assets has become a major concern. The goal of cyber security is to protect such assets from unauthorized use. Attackers use automated tools and manual techniques to penetrate systems by exploiting existing vulnerabilities and software bugs. To provide good enough security; attack methodologies, vulnerability concepts and defence strategies should be thoroughly investigated. The main purpose of this study is to show that the patches released for existing vulnerabilities at the operating system (OS) level and in software programs does not completely prevent cyber-attack. Instead, producing specific patches for each company and fixing software bugs by being aware of the software running on each specific system can provide a better result. This study also demonstrates that firewalls, antivirus software, Windows Defender and other prevention techniques are not sufficient to prevent attacks. Instead, this study examines different aspects of penetration testing to determine vulnerable applications and hosts using the Nmap and Metasploit frameworks. For a test case, a virtualized system is used that includes different versions of Windows and Linux OS.Öğe Performance Comparison of Static Malware Analysis Tools Versus Antivirus Scanners To Detect Malware(2017-11) Aslan, ömerAny software which executes malicious payloads on victim machines is considered as a malware such as the following: Viruses, worms, Trojan horses, rootkits, backdoor and ransomware. In recent years, the number and the severity of these malicious software have been increasing rapidly. The harm that malware inflicts on the world economy and private companies’ assets is increasing every day. Thus, there is an urgent need to detect and prevent malware before damaging to the important assets in world wide. There are lots of different methods and tools to combat against malware. In this paper, static malware analysis tools such as (Peid, PEview, Bintext, MD5deep, Dependency walker, and IDA Pro) and antivirus scanner tools such as (Norton, McAfee, Kaspersky, Avast, Avira, Bitdefender, and ClamAV) have been examined. In a test case, 200 malware and benign were collected from different sources and analyzed under different version of Window machines. Test results show that for existing malware, antivirus software detect malware fast and efficient when compared to static analysis tools. However, for unknown malware static analysis tools performed reasonably better than antivirus software.