• Türkçe
    • English
  • English 
    • Türkçe
    • English
  • Login
View Item 
  •   DSpace Home
  • Fen Fakültesi
  • Adli Bilimler Bölümü
  • Adli Bilimler Bölümü Tez Koleksiyonu
  • View Item
  •   DSpace Home
  • Fen Fakültesi
  • Adli Bilimler Bölümü
  • Adli Bilimler Bölümü Tez Koleksiyonu
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.

Nesnelerin İnterneti Sistemlerine Yapılan Saldırıların Analizi Üzerine Tuzak Sistemler ile Bir Durum Çalışması

View/Open
10299475.pdf (4.932Mb)
Date
2019-10-02
Author
Dal, Ferhat
xmlui.mirage2.itemSummaryView.MetaData
Show full item record
Abstract
With the development of technology, devices connected to the Internet are becoming increasingly widespread. Almost every field in the present day is making use of the opportunities provided by the Internet. With the increasing awareness of these devices, cyber attackers have also put these systems on the target board. These systems do not have the defense mechanisms that systems like computers or servers have. Therefore, classical techniques can’t be applied in defensive methods. In the simplest sense, the internet of things (IoT) can be any physical device connected to the internet. The resources of the sensor devices used on the Internet of things, namely memory (ROM and RAM), CPU and storage space are limited. Generally, sensors that collect data transmit data from the machine to the machine (M2M) and send the data to a specific center. Such devices form part of the Internet of Things (IOT) when connected to a network. One or more of the management protocols must be active in their systems to provide and manage access to these systems. In this work, an attack simulation environment and honeypot system is designed for the Telnet protocol of internet of things and the commonly used MQTT protocol. This study covers commonly known attack methods made by the aforementioned protocols. In the study, known attacks for each protocol were tried and the results were shared. In addition, various attacks were implemented to a real IP camera system and the results were shared.
URI
http://hdl.handle.net/11655/9274
xmlui.mirage2.itemSummaryView.Collections
  • Adli Bilimler Bölümü Tez Koleksiyonu [6]
Hacettepe Üniversitesi Kütüphaneleri
Açık Erişim Birimi
Beytepe Kütüphanesi | Tel: (90 - 312) 297 6585-117 || Sağlık Bilimleri Kütüphanesi | Tel: (90 - 312) 305 1067
Bizi Takip Edebilirsiniz: Facebook | Twitter | Youtube | Instagram
Web sayfası:www.library.hacettepe.edu.tr | E-posta:openaccess@hacettepe.edu.tr
Sayfanın çıktısını almak için lütfen tıklayınız.
Contact Us | Send Feedback



DSpace software copyright © 2002-2016  DuraSpace
Theme by 
Atmire NV
 

 


DSpace@Hacettepe
huk openaire onayı
by OpenAIRE

About HUAES
Open Access PolicyGuidesSubcriptionsContact

livechat

sherpa/romeo

Browse

All of DSpaceCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsTypeDepartmentPublisherLanguageRightsIndexing SourceFundingxmlui.ArtifactBrowser.Navigation.browse_subtypeThis CollectionBy Issue DateAuthorsTitlesSubjectsTypeDepartmentPublisherLanguageRightsIndexing SourceFundingxmlui.ArtifactBrowser.Navigation.browse_subtype

My Account

LoginRegister

Statistics

View Usage Statistics

DSpace software copyright © 2002-2016  DuraSpace
Theme by 
Atmire NV