Browsing by Author "Yücel, Çağatay"
Now showing 1 - 4 of 4
- Results Per Page
- Sort Options
Conference Object A Programmable Threat Intelligence Framework for Containerized Clouds(ACAD CONFERENCES LTD, 2018) Cagatay Yucel; Ahmet Koltuksuz; Murat Odemis; Anas Mu'aza Kademi; Gokhan Ozbilgin; Yücel, Çağatay; Özbilgin, Gökhan; Ödemiş, Murat; Kademi, Anas Muazu; Koltuksuz, Ahmet; JS Hurley; JQ ChenContemporarily one of the main challenges for information security community is the growing number of cyber threats. Large scaled globally orchestrated and constantly evolving attacks are affecting our information systems and technologies every day. Therefore collection and the exchange of cyber threat intelligence is of supreme importance. The term Cyber Threat Intelligence (CTI) has emerged with the contemporary because of merging the cyber intelligence concepts with the risk and threat management in cyber space. Today a number of security companies provide cyber threat intelligence with their sensors deployed worldwide Security Information and Event Management (SIEM) software and Intrusion Detection and Prevention Systems (IDPS) working collaboratively. The collection of Cyber Threat Intelligence is the process of collecting and producing actionable information of threats and threat actors aimed at increasing awareness and operational capabilities upon recognition of attack and attempt scenarios in a timely fashion. This research aims to investigate the recent developments of SDN and Containerized Clouds with a security perspective. The implementation of a containerized cloud with a programmable network of honeypot is implemented in this research. The implementation is tested with a scenario where a propagation of a worm that is originated from an infected container image. The security mechanisms on the cloud are fed with the collected CTI and results of the experiments along with discussions are presented.Article Citation - WoS: 22Citation - Scopus: 29Imaging and evaluating the memory access for malware(ELSEVIER SCI LTD, 2020) Cagatay Yucel; Ahmet Koltuksuz; Yücel, Çağatay; Koltuksuz, AhmetMalware analysis is a forensic process. After infection and the damage represented itself with the full scale then the analysis of the attack the structure of the executable and the aim of the malware can be discovered. These discoveries are converted into analysis reports and malware signatures and shared among antivirus databases and threat intelligence exchange platforms. This highly valuable information is then utilized in the detection mechanisms to prevent further dissemination and infections of malware. The types of analysis of the malware sample in this process can be grouped into two categories: static analysis and dynamic analysis. In static analysis the executable file is reverted to the source code through disassemblers and reverse engineering software and analyzed whereas dynamic analysis includes running the sample in an isolated environment and analyzing its behavior. Both static and dynamic analysis have limitations such as packing obfuscation dead code insertion sandbox detection and anti-debugging techniques. Memory operations on the other hand are not possible to hide by these limitations and inevitable for any software since the inventions of the computational models. Therefore in this research memory operations and access patterns for the malicious acts are examined and a contribution of a novel approach for extracting of memory access images is presented. In addition to extraction methods of how these images can be used for detection and comparison is introduced through an image comparison technique. (C) 2020 Elsevier Ltd. All rights reserved.Master Thesis Software Development for Transitions of Graphs from Discrete State into the Continous State(2012) Yücel, Çağatay; Koltuksuz, Ahmet H.The contemporary information model deals only with syntactics of information,such as frequency of the occurances of characters, length of words andcompression amount of documents. Computable models targeting semantic propertiesof information, such as relations between words, should be defined and studiedin order to improve the analysis and the retrieval of information.Manifolds are suitable differentiable mathematical objects for information to bedefined on. By their very definition they are non-euclidean in the global viewbut in local scales they resemble euclidean spaces. This property provides thatthe contemporary models can also be defined within the previsioned new modelsof information models.One of the most basic representation of information is through graphs. They arediscrete and highly computable mathematical bojects. In this thesis, the main aim is toinvestigate methods of embedding this simple piece of information ontomanifolds. This aim is supposed to lead us to defining the geometrical aspectsof information.Doctoral Thesis Zararlı yazılımlar için bellek erişimlerinin görüntülenmesi ve değerlendirilmesi(2019) Yücel, Çağatay; Koltuksuz, Ahmet HasanKötü amaçlı yazılım analizi adli bilişsel bir süreçtir. Zararlı yazılım; başarılı bir şekilde hedef bilgisayara bulaştıktan, amaçladığı zarar hedef bilgisayarda oluştuktan ve yazılım kendini tam ölçekte gösterdikten sonra ancak çalıştırılabilir dosyanın hedefi ve yapısı gerçek anlamda anlaşılabilir. Zararlı yazılım analizi ile elde edilen bu bulgular kötü amaçlı yazılım imzalarına dönüştürülmekte; antivirüs veritabanları ve tehdit istihbarat değişim platformları arasında paylaşılmaktadır. Bu çok değerli bilgiler daha sonra kötü amaçlı yazılımların daha fazla yayılmasını önlemek amacıyla saptama/önleme mekanizmalarında kullanılır. Bu süreçte kötü amaçlı yazılım örneğinin analizi iki kategoriye ayrılır: statik analiz ve dinamik analiz. Statik analizde çalıştırılabilir dosya, tersine mühendislik yazılımları aracılığıyla kaynak koduna geri döndürülüp analiz edilirken, dinamik analiz, çalıştırılabilir dosyanın dışarıya kapalı bir ortamda çalıştırılmasını ve davranışlarının analizini içerir. Hem statik hem de dinamik analiz, paketleme, perdeleme, ölü kod ekleme, sanal makinenin algılanması ve hata ayıklama önleme teknikleri gibi analiz önleme teknikleriyle sınırlıdır. Öte yandan bellek üzerinden gerçekleştirilen analiz işlemleri bu sınırlamalarla gizlenemez ve bilgisayar sistemlerinin modellerinin icadından bu yana herhangi bir yazılım için kaçınılmazdır. Bu nedenle, bu araştırmada, kötü niyetli eylemler için bellek işlemleri ve bellek erişim örüntüleri incelenmiş, bellek erişim görüntülerinin çıkarılması için yeni bir yaklaşımın katkısı litaretüre sunulmuştur. Bu çıkarma yöntemine ek olarak, bu görüntülerin tespiti ve karşılaştırma için nasıl kullanılabileceği görüntü karşılaştırma tekniği ile ortaya konulmuştur.

