SEARCH RESULT

Year

Subject Area

Broadcast Area

Document Type

Language

8 results listed

2018 Systematic Literature Review on Security Vulnerabilities and Attack Methods in Web Services

The using and importance of web services that flexibly meet the need for communication regardless of parameters such as platform, operating system are increasing day by day. In a simple sense, Web services carry a lot of data because they provide communication. With the increasing usage of web services and evolving technology, various methods have been developed to conceal data, to provide security and to prevent access by third parties in web services. At the same time, attack and injection methods for web service servers or web services have been developed. Some of these methods exploit the fact that the web services are XML-based. For example, XML injection, XPath (which stands for XML path language) injection are some of them. However, perhaps the most common type of attack are DOS and XDOS attacks. The purpose of this study is to gather the reasons of web service attacks, the precautions to be taken against the attack, the solutions for the exploits.

International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES

Furkan Sabaz Yüksel Çelik

418 584
Subject Area: Computer Science Broadcast Area: International Type: Oral Paper Language: English
2018 The Effects of Ransom Software on IoT (Internet of Things) Systems

In recent years, ransomware have become one of the most important threats facing both individuals and organizations. Attackers use strong encryption methods to create dangerous and comprehensive malware, making their ransom software flawless. Surveys indicate an increase in the number of assailants in parallel with the increase in the number of victims and the increase in illegal income. In the early years, especially at the risk of individual ransom viruses, more complex attacks are now beginning to appear that lead to the encryption of multiple machines targeting companies and every device connected to the Internet. In this study, ransom virus attacks against Internet of Things (IOT) network which is formed by connecting multiple devices with each other are examined and a study is presented about the measures to be taken.

International Conference on Advanced Technologies, Computer Engineering and Science
ICATCES

Semih Gençay Yüksel Çelik

335 277
Subject Area: Computer Science Broadcast Area: International Type: Oral Paper Language: English
2018 An inventive method for eco-efficient operation of home energy management system

Home energy management systems (HEMSs) based on demand response (DR) synergized with renewable energy sources (RESs) and energy storage systems (ESSs) optimal dispatch (DRSREOD) are used to implement demand-side management in homes. Such HEMSs benefit the consumer and the utility by reducing energy bills, reducing peak demands, achieving overall energy savings and enabling the sale of surplus energy. Further, a drastically rising demand of electricity has forced a number of utilities in developing countries to impose large-scale load sheddings (LSDs). A HEMS based on DRSREOD integrated with an LSD-compensating dispatchable generator (LDG) (DRSREODLDG) ensures an uninterrupted supply of power for the consumers subjected to LSD. The LDG operation to compensate the interrupted supply of power during the LSD hours; however, accompanies the release of GHGs emissions as well that need to be minimized to conserve the environment. A 3-step simulation based posteriori method is proposed to develop a scheme for eco-efficient operation of DRSREODLDG-based HEMS. The method provides the tradeoffs between the net cost of energy (CEnet) to be paid by the consumer, the time-based discomfort (TBD) due to shifting of home appliances (HAs) to participate in the HEMS operation and minimal emissions (TEMiss) from the local LDG. The search has been driven through multi-objective genetic algorithm and Pareto based optimization. The surface fit is developed using polynomial models for regression based on the least sum of squared errors and selected solutions are classified for critical tradeoff analysis to enable the consumer by choosing the best option and consulting a diverse set of eco-efficient tradeoffs between CEnet, TBD and TEMiss.

International Conference on Cyber Security and Computer Science
ICONCS

Bilal Hussain Nadeem Javaid Qadeer-ul Hasan Yüksel Çelik Asma Rafique

289 196
Subject Area: Computer Science Broadcast Area: International Type: Oral Paper Language: English
2018 An inventive method for eco-efficient operation of home energy management system

Home energy management systems (HEMSs) based on demand response (DR) synergized with renewable energy sources (RESs) and energy storage systems (ESSs) optimal dispatch (DRSREOD) are used to implement demand-side management in homes. Such HEMSs benefit the consumer and the utility by reducing energy bills, reducing peak demands, achieving overall energy savings and enabling the sale of surplus energy. Further, a drastically rising demand of electricity has forced a number of utilities in developing countries to impose large-scale load sheddings (LSDs). A HEMS based on DRSREOD integrated with an LSD-compensating dispatchable generator (LDG) (DRSREODLDG) ensures an uninterrupted supply of power for the consumers subjected to LSD. The LDG operation to compensate the interrupted supply of power during the LSD hours; however, accompanies the release of GHGs emissions as well that need to be minimized to conserve the environment. A 3-step simulation based posteriori method is proposed to develop a scheme for eco-efficient operation of DRSREODLDG-based HEMS. The method provides the tradeoffs between the net cost of energy (CEnet) to be paid by the consumer, the time-based discomfort (TBD) due to shifting of home appliances (HAs) to participate in the HEMS operation and minimal emissions (TEMiss) from the local LDG. The search has been driven through multi-objective genetic algorithm and Pareto based optimization. The surface fit is developed using polynomial models for regression based on the least sum of squared errors and selected solutions are classified for critical tradeoff analysis to enable the consumer by choosing the best option and consulting a diverse set of eco-efficient tradeoffs between CEnet, TBD and TEMiss.

International Conference on Cyber Security and Computer Science
ICONCS

Bilal Hussain Nadeem Javaid Qadeer-ul Hasan Yüksel Çelik Asma Rafique

376 303
Subject Area: Computer Science Broadcast Area: International Type: Article Language: English
2018 Optimal Foraging Algorithm (OFA) for Solving Constrained Optimization Problems

Performance optimization algorithm, the Optimal Foraging Algorithm (OFA) method to test Constrained Optimization problems for thirteen test functions from (g01) to (g13) to 30 runs then calculates the results and discussion of the comparison results between these problems. The OFA algorithm tested before for unconstrained optimization problems which it shows the perfect performance to solve these problems. In this research applying OFA to solve Constrained problems and compare the performance of this algorithm with another optimization algorithm to assess how to working

International Conference on Cyber Security and Computer Science
ICONCS

Yüksel Çelik SAEEDA

336 327
Subject Area: Computer Science Broadcast Area: International Type: Article Language: English
2018 Short-Term Load Forecasting by Knowledge Based Systems on the basis of Priority Index for Selection of Similar Days

In the modern day world and with growing technology, load forecasting is taken as the significant concerns in the power systems and energy management. The better precision of load forecasting minimizes the operational costs and enhances the scheduling of the power system. The literature has proposed different techniques for demand load forecasting like neural networks, fuzzy methods, Na ¨ ıve Bayes and regression based techniques. This paper proposes a novel knowledge based system for short-term load forecasting. The proposed system has minimum operational time as compared to other techniques used in the paper. Moreover, the precision of the proposed model is improved by a different priority index to select similar days. The similarity in climate and date proximity are considered all together in this index. Furthermore, the whole system is distributed in sub-systems (regions) to measure the consequences of temperature. Besides, the predicted load of the entire system is evaluated by the combination of all predicted outcomes from all regions. The paper employs the proposed knowledge based system on real time data. The proposed model is compared with Deep Belief Network and Fuzzy Local Linear Model Tree in terms of accuracy and operational cost. In addition, the proposed system outperforms other techniques used in the paper and also decreases the Mean Absolute Percentage Error (MAPE) on yearly basis. Furthermore, the proposed knowledge based system gives more efficient outcomes for demand load forecasting.

International Conference on Cyber Security and Computer Science
ICONCS

Mahnoor Khan Nadeem Javaid Yüksel Çelik Asma Rafique

419 504
Subject Area: Computer Science Broadcast Area: International Type: Article Language: English
2018 Endüstride Iot İle Güvenli Uzaktan Bakım Sistemi

Son yüzyılın en önemli teknolojik devrimleri arasında gösterilen nesnelerin interneti teknolojisi birçok endüstriyel alanda özellikle sürekli üretim yapan tesislerde cihazların birbirleri ile haberleşmesini sağlamak ve üretimi kontrol etmek için kullanılmaktadır. IoT teknolojisi ile üretim yapan fabrikalarda, verilerin doğruluğu, bütünlüğü ve gizliliği büyük önem taşımaktadır. Üretim verilerine zarar verebilecek durumlar sonucunda yaşanabilecek fabrika duruşları üretimi doğrudan etkileyerek yüksek üretim maliyetleri oluşturmaktadır. Bu çalışmada endüstriyel işletmelerin IoT teknolojisi ile elde edilen ve üretim süreçlerini etkileyen verilerin güvenlik açıklarını kapatmak için neler yapılabileceği, sisteme yapılabilecek olası saldırıların tespiti, tehditlerin sınıflandırılması ve saldırıların önlenmesi hususları araştırılmıştır. Bununla birlikte veri doğruluğu ve bütünlüğüne bağlı olarak uzaktan bakım proseslerinin oluşturulması ve bu sistemlerdeki veri kaybının temel sebepleri ile çözümleri araştırılmıştır. IoT verileri ile planlanan bakım süreçlerinde makine ekipmanları ve yedek parçalar için uzaktan izleme ve bakım sisteminin süreçlerini iyileştirmek için çalışmalar yapılmış yeni bir yaklaşımı ortaya koyulmuştur.

Akademik Bilişim
AB

Sefa ÇETİNKAYA Yüksel Çelik

267 291
Subject Area: Computer Science Broadcast Area: National Type: Oral Paper Language: Turkish
2018 Veri Tabanlarını Tehdit Eden Unsurlar Sql Enjeksiyonları

Dijital dünya artık bizim için sürekli ihtiyaç haline gelmiştir. Günümüzde artık birçok web sitesi kullanıcılarıyla etkileşim içinde olup onların istekleri doğrultusunda bilgi sunmaktadır. Özellikle son zamanlarda internet üzerinden erişilebilen veri tabanı içeren web uygulamalarının sayısı hızla arttığı gözlenmektedir. Bu artış ile güvenliğin önemi de kat kat artmaktadır. İnternet ağında olan bu veritabanları için hazırlanan güvenlik tedbirleri zaman zaman koruma sağlamamakta ve kötü niyetli kişilerin saldırılarına uğrayarak ihlaller yaşanmaktadır. Bu saldırılar kurumların güvenlik seviyelerine ve saldırganın becerisine göre büyük maddi zararlarla sonuçlanmaktadır. Hali hazırda profesyonel biçimde hizmet sunan web uygulamalarının oldukça büyük bir bölümü SQL standardını kullanmakta ve veri tabanı ile iletişimlerini bu sorgu dili olan sql ile yapmaktadırlar.[1] Web güvenliğinin korunması amacıyla güvenlik duvarları, saldırı tespit sistemi ve bunların engellenmesi gibi sistemler kullanılsa da bazen bu tedbirler yetersiz kalmaktadır. Web uygulamalarında saldırganların hazırladığı kötü niyetli yazılım ve kodlarla dinamik biçimde hazırlanan SQL sorguları engellenebilir veya değiştirilebilir. Tarayıcıların adres çubukları veya veri girişi yapılabilen alanlara bu kötü niyetli SQL kodları oluşturarak bilgi elde edinimi sağlanabilir. Bu elde edilen bilgilerle sadece yetkili kullanıcıların girişine izin verilen alanlara ve veri tabanında ki diğer bilgilere de ulaşabilir. Böylece saldırgan istenmeyen kodları çalıştırarak uygulamaya veya sunucuya zarar verir.Bu çalışmanın amacı MSSQL ve MYSQL gibi sorgu dilini kullanan ASP.NET ve PHP gibi uygulamalar için SQL enjeksiyon saldırılarının yapılış biçimi, tespit edilmesi ve bu saldırılardan korunma yöntemleri ve SQL enjeksiyonlarına karşı veritabanında uyulması gereken güvenlik kuralları ile bilgi güvenliği amaçlanmıştır. Ayrıca bir diğer amaç olarak web uygulamalarında veriler girilirken veyahut bir iş için veri sorgusu yapılırken SQL komutlarında oluşabilecek hata veya saldırı yapan kişiler tarafından sorguların değiştirilmesi ile muhtemel zararların önüne geçmektir.

Akademik Bilişim
AB

Tolga ENGİNSARIKAYA Yüksel Çelik

262 871
Subject Area: Computer Science Broadcast Area: National Type: Oral Paper Language: Turkish