Yazar "Baykara, Muhammet" seçeneğine göre listele
Listeleniyor 1 - 3 / 3
Sayfa Başına Sonuç
Sıralama seçenekleri
Öğe Cryptolog: A new approach to provide log security for digital forensics(Istanbul Univ, Fac Engineering, 2017) Baykara, Muhammet; Das, Resul; Tuna, GurkanAs security vulnerabilities generated by the developments in information and communication technologies as well as emerging technologies can lead to severe loss in terms of individual and institutional aspects, the importance of information security has been increasing in recent years. Nowadays, digital information is considered as an important asset which must be appropriately evaluated and protected against all forms of unauthorized access, use, disclosure, modification, destruction, or denial. Since information security is more prominent and more important now than ever before, this growing awareness of digital information security has led societies to develop innovative ways of protecting their sensitive information. On the other hand, in today's digital world, keeping sensitive information secure is not as easy as it was in the past. In this regard, it is obvious that for all types of institutions there is a need for security software which provides the necessary security measures and policies for the protection and retrieval of sensitive digital information. To ensure information security, security software must have the ability to make logging of certain events. Through log files, some analysis can be performed to find out what kind of attacks were done by which users and when. In this respect, this study proposes a novel approach of recording traffic flow on the log files stored on a server to determine the changes made by unauthorized people/users on the log records, and this way ensures the security of the log records and contributes to digital forensics processes in terms of accuracy, integrity and confidentiality of the log records.Öğe A novel approach to steganography: Enhanced least significant bit substitution algorithm integrated with self-determining encryption feature(C R L Publishing Ltd, 2019) Das, Resul; Baykara, Muhammet; Tuna, GurkanOne of the most well-known and used algorithms for Steganography is Least Significant Bit (LSB) substitution. Although LSB has several advantages such as simplicity, efficiency, and easy-to-do implementation, it has some distinct disadvantages such as it openness to miscellaneous attacks. In this study, we aim to improve the traditional LSB algorithm by eliminating its main disadvantage, being easy to detect, and this way propose an enhanced LSB algorithm called E-LSB. We mainly aim to minimize differences which are due to encryption and image hiding steps in LSB algorithm and make it more difficult to notice that some text has been hidden in the original cover image. As most of the researchers and practitioners in security field argue, stenographic techniques alone are not sufficient for protecting sensitive information and thus must be used together with encryption algorithms. Therefore, the proposed approach integrates E-LSB with an encryption algorithm. E-LSB does not modify the file size and allows the flexibility of choosing one of well-known encryption algorithms including RSA, AES and CAESAR, but others can be implemented in it. With a set of experiments, the proposed approach is compared with the traditional LSB based embedding approach, and its efficiency and usability is analyzed. A set of performance evaluations realized with the developed software tool based on E-LSB algorithm show that E-LSB is better than the traditional LSB algorithm from security point of view.Öğe Web Sunucu Erişim Kütüklerinden Web Ataklarının Tespitine Yönelik Web Tabanlı Log Analiz Platformu(2016) Baykara, Muhammet; Daş, Resul; Tuna, Gürkanİnternetin her alanda kullanıldığı ve yaşantımıza yön verdiği bir zamanda yaşamaktayız. Doğal olarak bu değişim bilgisayarları ve dijital dünyayı hayatımızın vazgeçilmezleri arasına yerleştirmiş ve sürekli bir ihtiyaç haline getirmiştir. Günümüzde hemen hemen her şey dijital ortamlarda yapılmaktadır. İşte dijital ortamların bu kadar yaygın olması ve günlük işlerin büyük çoğunluğunun buradan gerçekleştirilmesi, yapılan işlemlerin güvenliğini sağlamanın gerekliliğini de büyük oranda arttırmış, bilgilerin yetkisiz kişilerin eline geçmesini önlemek zorlaşmıştır. Bu sebeple bilgi güvenliğinin sağlanmasına yönelik yapılan çalışmalar da artmıştır. Bu çalışmada web sunucularına yönelik olarak gerçekleştirilen kötücül aktivitelerin tespitine yönelik bir log analiz ve takip yazılımı geliştirilmiştir. Web erişim kayıtlarının analiz edilmesi, sistem üzerinde yaşanabilecek olası saldırıların erken fark edilmesinde ve saldırı örüntülerinin tespit edilebilmesinde önemli bir rol oynamaktadır. Geliştirilen log analiz platformu ile web sunucularına yapılan saldırılar istatistiksel olarak rapor edilebilmektedir.