Advanced Search

Show simple item record

dc.contributor.authorTaşçı, Hatice Beyza
dc.contributor.authorGönen, Serkan
dc.contributor.authorBarışkan, Mehmet Ali
dc.contributor.authorKaracayılmaz, Gökçe
dc.contributor.authorAlhan, Birkan
dc.contributor.authorYılmaz, Ercan Nurcan
dc.date.accessioned2023-10-30T19:00:43Z
dc.date.available2023-10-30T19:00:43Z
dc.date.issued2021en_US
dc.identifier.issn2148-1830
dc.identifier.urihttps://hdl.handle.net/11363/6127
dc.description.abstractDeveloping information and technology has caused the digitization of data in all areas of our lives. While this digitization provides entirely new conveniences, speed, efficiency, and effectiveness in our current life, it also created a new environment, space, and ultimately a risk area for attackers. This new space is called cyberspace. There is a constant struggle between security experts and attackers in cyberspace. However, as in any environment, the attacker is always in an advantageous position. In this fight, the newest approach for security experts to catch attackers is to use technologies based on prediction and detection, such as artificial intelligence, machine learning, artificial neural networks. Only in this way will it be possible to fight tens of thousands of pests that appear every second. This study focuses on detecting password attack types (brute force attack, dictionary attack, and social engineering) on real systems using Cowrie Honeypot. The logs obtained during the said attacks were used in the machine learning algorithm, and subsequent similar attacks were classified with the help of artificial intelligence. Various machine learning algorithms such as Naive Bayes, Decision tree, Random Forest, and Support Vector Machine (SVM) have been used to classify these attacks. As a result of this research, it was determined that the password attacks carried out by the attacker were phishing attacks, dictionary attacks, or brute force attacks with high success rates. Determining the type of password attack will play a critical role in determining the measures to be taken by the target institution to close the vulnerabilities in which the attack can be carried out. It has been evaluated that the study will make significant contributions to cybersecurity and password attacks.en_US
dc.language.isoengen_US
dc.publisherMatematikçiler Derneğien_US
dc.relation.isversionof10.47000/tjmcs.971141en_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.rightsAttribution-NonCommercial-NoDerivs 3.0 United States*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/us/*
dc.subjectArtificial intelligenceen_US
dc.subjectCyber securityen_US
dc.subjectHoneypoten_US
dc.subjectPassword attacksen_US
dc.subjectSocial engineeringen_US
dc.titlePassword Attack Analysis Over Honeypot Using Machine Learning Password Attack Analysisen_US
dc.typearticleen_US
dc.relation.ispartofTurkish Journal of Mathematics and Computer Scienceen_US
dc.departmentMühendislik ve Mimarlık Fakültesien_US
dc.authoridhttps://orcid.org/0000-0003-4468-4267en_US
dc.authoridhttps://orcid.org/0000-0002-1417-4461en_US
dc.authoridhttps://orcid.org/0000-0001-8529-1721en_US
dc.authoridhttps://orcid.org/0000-0003-1511-0109en_US
dc.authoridhttps://orcid.org/0000-0001-9859-1600en_US
dc.identifier.volume13en_US
dc.identifier.issue2en_US
dc.identifier.startpage388en_US
dc.identifier.endpage402en_US
dc.relation.publicationcategoryMakale - Ulusal Hakemli Dergi - Kurum Öğretim Elemanıen_US
dc.institutionauthorTaşçı, Hatice Beyza
dc.institutionauthorBarışkan, Mehmet Ali
dc.institutionauthorAlhan, Birkan


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

info:eu-repo/semantics/openAccess
Except where otherwise noted, this item's license is described as info:eu-repo/semantics/openAccess