مشخصات مقاله | |
ترجمه عنوان مقاله | فایروال سایبری ملی ترکیه برای کاهش حملات سایبری در سراسر کشور |
عنوان انگلیسی مقاله | Turkish national cyber-firewall to mitigate countrywide cyber-attacks |
انتشار | مقاله سال 2019 |
تعداد صفحات مقاله انگلیسی | 17 صفحه |
هزینه | دانلود مقاله انگلیسی رایگان میباشد. |
پایگاه داده | نشریه الزویر |
نوع نگارش مقاله |
مقاله پژوهشی (Research Article) |
مقاله بیس | این مقاله بیس نمیباشد |
نمایه (index) | Scopus – Master Journal List – JCR |
نوع مقاله | ISI |
فرمت مقاله انگلیسی | |
ایمپکت فاکتور(IF) |
2.762 در سال 2018 |
شاخص H_index | 49 در سال 2019 |
شاخص SJR | 0.443 در سال 2018 |
شناسه ISSN | 0045-7906 |
شاخص Quartile (چارک) | Q2 در سال 2018 |
رشته های مرتبط | مهندسی کامپیوتر، مهندسی فناوری اطلاعات |
گرایش های مرتبط | برنامه نویسی کامپیوتر، مهندسی نرم افزار، اینترنت و شبکه های گسترده و امنیت اطلاعات، سامانه های شبکه ای |
نوع ارائه مقاله |
ژورنال |
مجله | کامپیوتر و مهندسی برق – Computers & Electrical Engineering |
دانشگاه | Department of Management Information Systems, Girne American University, Canterbury, United Kingdom |
کلمات کلیدی | فایروال سایبری ملی، شبکه های عصبی مصنوعی، تابع پایه شعاعی، ترکیه، حمله سایبری، سیستم تشخیص نفوذ، داس، امنیت ملی |
کلمات کلیدی انگلیسی | National cyber firewall، Artificial neural networks، Radial basis function، Turkey، Cyber-attack، Intrusion Detection System، DoS، National security |
شناسه دیجیتال – doi |
https://doi.org/10.1016/j.compeleceng.2018.11.008 |
کد محصول | E11294 |
وضعیت ترجمه مقاله | ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید. |
دانلود رایگان مقاله | دانلود رایگان مقاله انگلیسی |
سفارش ترجمه این مقاله | سفارش ترجمه این مقاله |
فهرست مطالب مقاله: |
Abstract
1- Introduction 2- Current state and recent initiatives of Turkey in cyberspace 3- Country-wide large-scale cyber-attacks in Turkey 4- National cyber firewall projects 5- Background of the study and related work 6- Seddulbahir – Turkey 7- Conclusion References |
بخشی از متن مقاله: |
Abstract This research introduces “Seddulbahir,” the first Turkish national cyber-firewall system. Proposed as the first of its kind, Seddulbahir resists possible cyber-attack threats against Turkey’s internet infrastructure. Seddulbahir uses the artificial neural network radial basis function (RBF-NN) approach to generate rules that can detect 21 different attacks classified as probing, DoS (Denial of Service), U2R (User-to-Root), and R2L (Remote-to-Local) through the analysis of 66 different network service flows and based on three communication protocols. Results indicate that our proposed approach detects abnormal traffic with high efficiency, low cost, and has a wide detection range, providing accurate, flexible, and effective results in contrast to traditional methods. This paper also outlines the current state of cyberspace in Turkey, provides an analysis and detailed model of the latest cyber-attacks generated against Turkey, and investigates the working mechanisms of national cyber firewall systems used by developed countries such as Russia, China, and the United States. Introduction In developed countries such as the U.S.A., U.S.S.R., the United Kingdom, and China and after World War II, the superpowers diversified their investments in various innovative cyber infrastructures. Since then, these governments have developed new cyber security approaches and policies, established cyber-armies, and designed new hardware and software technologies in order to emerge as global cyber-powers. The main theme behind these investments was not “how to harm” but “how to benefit by inflicting harm” through using aggressive Internet tactics that would hinder and/or stop potential perpetrators. One of the main reasons, among others, of this diversification of development in cyberspace is that traditional military strikes are observable by the people under attack at the moment they occur, and their effects can be anticipated. On the other hand, a cyber-weapon attack is not seen or easily anticipated, and the attack itself typically involves temporary damage and no permanent harm. The possible military wars that might occur between developed countries leads to permanent harm and considerable loss in terms of power, politic, demographic, societal, financial, economic and international dimensions, as experienced in WWII. For this reason, cyber weapons emerged and are used in war between developed countries. Today, these wars take place in the cyber world. However, in developing or underdeveloped countries, this advancement seems less while military battles continue. |