فایروال سایبری ملی ترکیه برای کاهش حملات سایبری
ترجمه نشده

فایروال سایبری ملی ترکیه برای کاهش حملات سایبری

عنوان فارسی مقاله: فایروال سایبری ملی ترکیه برای کاهش حملات سایبری در سراسر کشور
عنوان انگلیسی مقاله: Turkish national cyber-firewall to mitigate countrywide cyber-attacks
مجله/کنفرانس: کامپیوتر و مهندسی برق - Computers & Electrical Engineering
رشته های تحصیلی مرتبط: مهندسی کامپیوتر، مهندسی فناوری اطلاعات
گرایش های تحصیلی مرتبط: برنامه نویسی کامپیوتر، مهندسی نرم افزار، اینترنت و شبکه های گسترده و امنیت اطلاعات، سامانه های شبکه ای
کلمات کلیدی فارسی: فایروال سایبری ملی، شبکه های عصبی مصنوعی، تابع پایه شعاعی، ترکیه، حمله سایبری، سیستم تشخیص نفوذ، داس، امنیت ملی
کلمات کلیدی انگلیسی: National cyber firewall، Artificial neural networks، Radial basis function، Turkey، Cyber-attack، Intrusion Detection System، DoS، National security
نوع نگارش مقاله: مقاله پژوهشی (Research Article)
شناسه دیجیتال (DOI): https://doi.org/10.1016/j.compeleceng.2018.11.008
دانشگاه: Department of Management Information Systems, Girne American University, Canterbury, United Kingdom
صفحات مقاله انگلیسی: 17
ناشر: الزویر - Elsevier
نوع ارائه مقاله: ژورنال
نوع مقاله: ISI
سال انتشار مقاله: 2019
ایمپکت فاکتور: 2/762 در سال 2018
شاخص H_index: 49 در سال 2019
شاخص SJR: 0/443 در سال 2018
شناسه ISSN: 0045-7906
شاخص Quartile (چارک): Q2 در سال 2018
فرمت مقاله انگلیسی: PDF
وضعیت ترجمه: ترجمه نشده است
قیمت مقاله انگلیسی: رایگان
آیا این مقاله بیس است: خیر
کد محصول: E11294
فهرست مطالب (انگلیسی)

Abstract

1- Introduction

2- Current state and recent initiatives of Turkey in cyberspace

3- Country-wide large-scale cyber-attacks in Turkey

4- National cyber firewall projects

5- Background of the study and related work

6- Seddulbahir - Turkey

7- Conclusion

References

بخشی از مقاله (انگلیسی)

Abstract

This research introduces “Seddulbahir,” the first Turkish national cyber-firewall system. Proposed as the first of its kind, Seddulbahir resists possible cyber-attack threats against Turkey's internet infrastructure. Seddulbahir uses the artificial neural network radial basis function (RBF-NN) approach to generate rules that can detect 21 different attacks classified as probing, DoS (Denial of Service), U2R (User-to-Root), and R2L (Remote-to-Local) through the analysis of 66 different network service flows and based on three communication protocols. Results indicate that our proposed approach detects abnormal traffic with high efficiency, low cost, and has a wide detection range, providing accurate, flexible, and effective results in contrast to traditional methods. This paper also outlines the current state of cyberspace in Turkey, provides an analysis and detailed model of the latest cyber-attacks generated against Turkey, and investigates the working mechanisms of national cyber firewall systems used by developed countries such as Russia, China, and the United States.

Introduction

In developed countries such as the U.S.A., U.S.S.R., the United Kingdom, and China and after World War II, the superpowers diversified their investments in various innovative cyber infrastructures. Since then, these governments have developed new cyber security approaches and policies, established cyber-armies, and designed new hardware and software technologies in order to emerge as global cyber-powers. The main theme behind these investments was not “how to harm” but “how to benefit by inflicting harm” through using aggressive Internet tactics that would hinder and/or stop potential perpetrators. One of the main reasons, among others, of this diversification of development in cyberspace is that traditional military strikes are observable by the people under attack at the moment they occur, and their effects can be anticipated. On the other hand, a cyber-weapon attack is not seen or easily anticipated, and the attack itself typically involves temporary damage and no permanent harm. The possible military wars that might occur between developed countries leads to permanent harm and considerable loss in terms of power, politic, demographic, societal, financial, economic and international dimensions, as experienced in WWII. For this reason, cyber weapons emerged and are used in war between developed countries. Today, these wars take place in the cyber world. However, in developing or underdeveloped countries, this advancement seems less while military battles continue.