Analysis of Different Types of Network Attacks on the GNS3 Platform
Abstract
Keywords
References
- “Cyber crime attacks experienced by global companies 2017”, Statista. [Çevrimiçi]. Erişim adresi: https://www.statista.com/statistics/474937/cyber-crime-attacks-experienced-by-global-companies/. [Erişim: 20-Ara-2019].
- “Snort - Network Intrusion Detection & Prevention System”. [Çevrimiçi]. Erişim adresi: https://www.snort.org/. [Erişim: 14-Oca-2020].
- N. Goksel ve M. Demirci, “DoS Attack Detection using Packet Statistics in SDN”, in 2019 International Symposium on Networks, Computers and Communications (ISNCC), ss. 1-6, 2019, doi: 10.1109/ISNCC.2019.8909114.
- Ş. Sağiroğlu, E. Yolaçan, ve U. Yavanoğlu, “Zeki saldırı tespit sistemi tasarımı ve gerçekleştirilmesi”, Gazi Üniversitesi Mühendislik Mimarlık Fakültesi Dergisi, c. 26, sy 2, 325-340, 2011
- I. Karadoğan ve R. Daş, “Analysis of attack types on TCP/IP based networks via exploiting protocols”, in 2015 23nd Signal Processing and Communications Applications Conference (SIU), Inonu University, Malatya, ss. 1785-1788, 2015, doi: 10.1109/SIU.2015.7130200.
- “Scapy”. [Çevrimiçi]. Erişim adresi: https://scapy.net/. [Erişim: 18-Ara-2019].
- R. Das ve G. Tuna, “Packet tracing and analysis of network cameras with Wireshark”, in 2017 5th International Symposium on Digital Forensic and Security (ISDFS), Romanya, ss. 1-6, 2017, doi: 10.1109/ISDFS.2017.7916510.
- R. Abdulhammed, M. Faezipour, H. Musafer, ve A. Abuzneid, “Efficient Network Intrusion Detection Using PCA-Based Dimensionality Reduction of Features”, in 2019 International Symposium on Networks, Computers and Communications (ISNCC), ss. 1-6, 2019, doi: 10.1109/ISNCC.2019.8909140.
Details
Primary Language
English
Subjects
Empirical Software Engineering , Computer Software , Software Architecture
Journal Section
Research Article
Publication Date
December 30, 2020
Submission Date
April 16, 2020
Acceptance Date
November 2, 2020
Published in Issue
Year 2020 Volume: 3 Number: 3
Cited By
NESNELERİN İNTERNETİ KAPSAMINDA KULLANILAN ARA KATMAN YAZILIMLARINA YÖNELİK AĞ BENZETİMİ
Konya Journal of Engineering Sciences
https://doi.org/10.36306/konjes.1076950Password Attack Analysis Over Honeypot Using Machine Learning Password Attack Analysis
Turkish Journal of Mathematics and Computer Science
https://doi.org/10.47000/tjmcs.971141A New Hybrid Approach Using GWO and MFO Algorithms to Detect Network Attack
Computer Modeling in Engineering & Sciences
https://doi.org/10.32604/cmes.2023.025212
