Analysis of Attacks Against an Educational Institution

Huseyin Cakır, Celebi Uluyol, Hüsameddin Demir, Alpaslan Durmuş

Abstract


In this study, attacks on an educational institution over network were analyzed. In this study, it is aimed to guide to the other institutions in terms of security. For security reasons, the name of the institution where the work was made is not included. Fourteen-day log records obtained from the firewalls were used in examining the attacks on the institution. The attacks examined in these records are; attack method, target port, target type, service, source country and danger level. According to the results of the research, it was seen that the attacks concentrated on the sites prepared with CMS (Content Management Systems) and it was seen that the service disruption and SQL Injection attack experiments are weighted. Considering all these factors, it was determined that there are security vulnerabilities of  prepared sites by CMS and that websites need to be eliminate these shortcomings.. As a result, it is stated that institutions should take security measures against the network attacks used presenting this study analysis.


Keywords


network, attack, analysis, security.

Full Text:

PDF

References


Altuntaş A. (2016). Kali Linux. (Dördüncü Baskı). İstanbul: Kodlab Yayınevi, 78-98.

Arora K. ve Kumar K. (2015). Impact Analysis Of Recent Ddos Attacks. International Journal On Computer Science And Engineering, Vol. 3 No. 2 (877-884).

Canbek G. ve Sağıroğlu Ş. (2007). Bilgisayar Sistemlerine Yapılan Saldırılar Ve Türleri: Bir İnceleme. Erciyes Üniversitesi Fen Bilimleri Enstitüsü Dergisi, 23 1 - 12.

Ciylan B. (2017). Bilgi Güvenliği Ders Notu (Yayınlanmamış) Gazi Üniversitesi Adli Bilişim Anabilim Dalı 1-8.

Contar F. (2016). Ağ Ve Yazılım Güvenliği. (Dördüncü Baskı). İstanbul: Kodlab Yayınevi, 51-82.

Demir, H., Kapukaya, K., & Ozfidan, B. (2015). Yabanci diller yüksek okullarinda görev yapan ingilizce okutmanlarinin sorunlari. Mustafa Kemal Üniversitesi Sosyal Bilimler Enstitüsü Dergisi, 12(30), 113-138.

Demir, N. (2009). Gömülü Güvenlik Duvarı Yazılım Paketi, Yüksek Lisans Tezi, Dokuz Eylül Üniversitesi Fen Bilimleri Enstitüsü Bilgisayar Mühendisliği Anabilim Dalı, İzmir.

Elbahadır H. (2016). Hacking Interface. (Onikinci Baskı). İstanbul: Kodlab Yayınevi, 57-125.

Garnaeva M., Sinitsyn F. Ve Y. Namestnikov (2016) Kaspersky Security Bulletin Overall Statıstıcs For 2016.

Gezgin D. ve Buluş E. (2013). Kablosuz Ağlar İçin Bir Dos Saldırısı Tasarımı. Bilişim Teknolojileri Dergisi, Cilt: 6, Sayı: 3.

İnternet: “Smurf Attacks” ISP ‘leri Nasıl Sakatlar? URL: http://ekinoks.cu.edu.tr/internet/konu_46.htm Son Erişim Tarihi:19.12.2017.

İnternet: Antoniou, S. The PING of Death and Other DoS Network Attacks. URL: https://www.pluralsight.com/blog/it-ops/ping-of-death-and-dos-attacks, Son Erişim Tarihi:19.12.2017.

Kaspersky Lab (2017) Threat Landscape Forındustrıal Automatıon Systems In The Second Half Of 2016: АО Kaspersky Lab.

Mohan V. and Anuradha J. (2015). Network Security And Types Of Attacks In Network. Procedia Computer Science, 48 ( 2015 ) 503 – 506.

Nakato, H. (2016). Ağ Güvenliği: Saldırılar Ve Zeki Güvenlik Duvarı Etmeni İle Savunma Mekanizmaları, Yüksek Lisans Tezi, Sakarya Üniversitesi Fen Bilimleri Enstitüsü Bilgisayar Ve Bilişim Mühendisliği Anabilim Dalı, Sakarya.

Oktay, U. (2013). Bulut Bilişimde Vekil Ağ Saldırı Tespit Sistemi, Yüksek Lisans Tezi, Hava Harp Okulu Havacılık Ve Uzay Teknolojileri Enstitüsü, İstanbul.

Ozfidan, B., Savas, A. C., & Demir, H. (2019). The moderating effect of organizational justice on the relationship between integrity and organizational citizenship behavior in educational institutions. Revista de Cercetare si Interventie Sociala, 66, 75.

Richhariya V. and Kaushik P. (2014). A Survey On Network Attacks In Mobile Ad Hoc Networks. International Journal Of Advanced Research In Computer Science And Software Engineering, Volume 4, Issue 5.

STM Savunma Teknolojileri (2016) 2016 Ekim-Aralık Dönemi Siber Tehdit Durum Raporu.

STM Savunma Teknolojileri (2016) 2016 Türkiye Siber Tehdit Durum Raporu.

Tanrıkulu, H. (2009). Saldırı Tespit Sistemlerinde Yapay Sinir Ağlarının Kullanılması, Yüksek Lisans Tezi, Ankara Üniversitesi Fen Bilimleri Enstitüsü, Ankara.

Vacca J. (2009). Network And System Security. Oxford: Syngress, 259-260.


Refbacks

  • There are currently no refbacks.


Copyright (c) 2021 Electronic International Journal of Education, Arts, and Science (EIJEAS)

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.