Arama Sonuçları

Listeleniyor 1 - 3 / 3
  • Yayın
    Ipwall design and implementation of a gateway frewall on linux
    (Işık Üniversitesi, 2004) Durak, Erdem; Yarman, Bekir Sıddık Binboğa; Işık Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği Yüksek Lisans Programı
    The aim of the this project is to develop a firewall which will have functionailities in a regular firewall also will have the missing functions like configuring firewall from any platform and any location via internet or local network. In the beginning of this project information is collected about firewalls and firewalls were examined that work on Windows and Linux operating systems in order to see the differences. On linux operating system source kernel allowed us to implement packet filtering firewall. IPWALL is a firewall which can be used as a gateway firewall also it can be used to secure a local area network. IPWALL key features are stablity, web-based interface which allows configuring firewall form any operating system; it is highly configurable and easy maintainable Linux Firewall. IPWALL communicates with kernel to check and manage network security with packet filtering. By web-based interface IPWALL provides easy and advanced configurable options for novice and expert users. The aim is to continue our improvements on IPWALL as gateway firewall and IPCUBE as personel firewall an share our knowledge of this project in open source community.
  • Yayın
    A robust Gradient boosting model based on SMOTE and NEAR MISS methods for intrusion detection in imbalanced data sets
    (Işık Üniversitesi, 2022-01-18) Arık, Ahmet Okan; Çavdaroğlu Akkoç, Gülsüm Çiğdem; Işık Üniversitesi, Lisansüstü Eğitim Enstitüsü, Enformasyon Teknolojileri Yüksek Lisans Programı
    Novel technologies cause many security vulnerabilities and zero-day attack risks. Intrusion Detection Systems (IDS) are developed to protect computer networks from threats and attacks. Many challenging problems need to be solved in existing methods. The class imbalance problem is one of the most difficult problems of IDS, and it reduces the detection rate performance of the classifiers. The highest IDS detection rate in the literature is 96.54%. This thesis proposes a new model called ROGONG-IDS (Robust Gradient Boosting) based on Gradient Boosting. ROGONGIDS model uses Synthetic Minority Over-Sampling Technique (SMOTE) and Near Miss methods to handle class imbalance. Three different gradient boosting-based classification algorithms (GBM, LightGBM, XGBoost) were compared. The performance of the proposed model on multiclass classification has been verified in the UNSW-NB15 dataset. It reached the highest attack detection rate and F1 score in the literature with a 97.30% detection rate and 97.65% F1 score. ROGONG-IDS provides a robust, efficient solution for IDS built on datasets with the imbalanced class distribution. It outperforms state-of-the-art and traditional intrusion detection methods.
  • Yayın
    Risk scalable and modular security architectures
    (Işık Üniversitesi, 2005-04) Kunter, Ünal; Koç, Çetin Kaya; Işık Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği Yüksek Lisans Programı
    Network security is ensuring the availability, the integrity and the confidentiality in the business activities. Network security is not only limiting acess to the resources; İt is mainly structring the acess to the match the business needs and ensure the availability of the resources. To demonstrate these principals, the deployment of a secure environment for different enterprises level companies will be examined. In this thesis, the acess requirement and restriction for the different group of security infrastructeres will be examined. The business operation will be detailed as well as the priority of the resources in terms of business interest in order to design a network that match the business model. An overview of the security layers will be shown. The intent is to demonstrate that no designs are perfect and may not resist to some type of attacks. In order to optimize the cost on security, the assets under risk should be taken into consideration. The case studies mentioned in the thesis vary from simple ones to more complicated ones. That is strongly related to what you store in databases. In all the cases it is considered that database is the core business and should be protected. Both inward and outward traffic should be under control in order to by-pass the attacks. There is never perfect security, but increasing the security for a small amount will result a bigger prevention against attacks