The necessity of conducting business processes of institutions and individuals with information technologies has brought risks and threats. Cyber-attacks may lead to hard-to-recover results. Although many security systems have been developed against to these attacks, attacks and security breaches of information systems are increasing rapidly. In this study, it is aimed to understand the security weaknesses and vulnerabilities, which is one of the most important issues at the point of providing cyber security, and to detect cyber-attacks. Using physical networks to test cyber-attack methods is a very costly and time consuming process. In this paper, as a different method, a cyber-attack simulation model has been developed using the DEVS modelling approach to simulate and test cyber-attack scenarios and evaluate the results. An application has been developed that simulates an attack scenario in a virtual network and evaluates detector alerts by generating appropriate intrusion detection system signals. The DEVS-Suite simulation environment was used as a development environment. Comparisons were made with different cyber-attack simulation applications and their differences were revealed.
Bilindiği gibi Selçuklular, Sünnî ekollerden Hanefîlik mezhebine mensupturlar. Hanefîlerin önemli bir kısmı Maturidîlik ortaya çıkmadan önce Mu'tezile mezhebinin görüşlerini kabul etmiştir. Hanefîliğin rey ekolü olması, bu konuda önemli bir rol oynamıştır. Dönemin kaynaklarının verdiği bilgilere göre, özellikle Harezm bölgesi Hanefîleri aynı zamanda Mu'tezile'ye mensupturlar. Bu nedenle başta Harezm bölgesinden olmak üzere, Horasan ve Maveraünnehir bölgesinden çok sayıda Hanefî-Mutezilî alim, özellikle Moğol istilası önünden kaçarak Anadolu'ya gelmiştir. Ayrıca, bazı Selçuklu sultanları da Hanefîlikle birlikte Mu'tezile mezhebine mensup olmuşlardır. Böylece Anadolu'da Mu'tezile ekolü ortaya çıkmıştır. Ancak çeşitli sebeplerle bu ekol kendini gösterememiştir. Makalemizde bunun nedenleri üzerinde de durulmuştur.
Abstract. There are regular developments and changes in cities. Developments in cities have affected transportation, and traffic control tools have changed. Traffic signs and traffic lights have been used to direct pedestrians and vehicles correctly. Traffic light control systems are used to ensure the safety of vehicles and pedestrians, increase the fluency in traffic, guide them in transportation, warn pedestrians and drivers, and regulate and control transportation disruptions. In order to facilitate people's lives, it is desired to control the traffic components autonomously with the developments in autonomous systems. Cyber threats arise due to the active use of the internet and signals or frequencies in the use of modules that will provide communication with traffic lights, traffic signs, and vehicles, which are traffic components at the inter-sections of many roads in the control of central systems. The study is limited to smart traffic lights, which are traffic components. If we examine the cyber-attacks, we can see that Malware Attacks, Buffer Overflow Attacks, DoS attacks, and Jamming Attacks can be made. Network-Based Intrusion Detection Systems and Host-Based Intrusion Detection Systems can be used to detect and stop Malware Attacks, Buffer Overflow Attacks, DoS attacks, and Jamming Attacks. Intrusion detection systems tell us whether the data poses a threat or does not pose after the data passing through the system is examined. In this way, system protection is ensured by controlling the data traffic in the system.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.