BibTex RIS Kaynak Göster

PCAP PAKETLER İLE RESTFULL API’Yİ GERÇEK ZAMANLI DİNLEM

Yıl 2016, Cilt: 2 Sayı: 2, 150 - 156, 19.10.2016

Öz

Sosyal medya kullanım oranı, internet ve mobil cihaz kullanımının hızla artmasıyla birlikte artmaktadır. Birçok kişi sosyal medya hesaplarında kişisel bilgilerini paylaşmakta veya kişisel yazışmalar yapmaktadır. Yaptığımız çalışma bulunduğumuz ağı dinleyen ve ağdan geçen iletişim paketlerini (PCAP) elde ederek kullanıcıların özel sosyal medya ağındaki verilerini almayı ve çözmeyi amaçlar. Çalışmada sadece sosyal ağlar için değil, aynı zamanda yerel ağ içinde iletişim kurup bilgi alışverişi yapan iki sistem arasındaki veri iletişiminin dinlenip, kişisel bilgilerin kolayca elde edilebileceği gösterilmiştir.

                Anahtar Kelimeler: Paket Yakalama, Paket Koklama, Restfull, Ağ Dinleme

Kaynakça

  • Bilizzard Support. “Restfull Character”, https://us.battle.net/support/en/article/200576, 25 Mayıs 2016.
  • Binti A. S., Selvakumar M. and Mohammed K. M., A Study on Packet Capture Mechanisms in Real Time Network Traffic, Advanced Computer Science Applications and Technologies (ACSAT) International Conference, 23-24 Dec 2013, Kuching, pp. 456-460.
  • Chen X. ve Chan X., Study on Layout Strategy of Transit Hub Network, Industrial Control and Electronics Engineering (ICICEE), 2012 International Conference, 23-25 Aug. 2012, Xi’an, 258-261.
  • Daiki C., Kazuhiro T., Tatsuya M. and Shigeki G., Detecting Malicious Websites by Learning Ip Address Features, Applications and the Internet IEEE/IPSJ on 12th International Symposium , 16-20 July 2012, Izmir, pp. 29-39.
  • Friedl M. A. ve Brodley C. E., “Decision tree classification of land cover from remotely sensed data,” Remote Senss. Environ., vol. 61, no. 3, pp. 399–409, 1997.
  • Ibrahim G. and Vaclav P., DNS traffic analysis for malicious domains detection, Signal Processing and Integrated Networks on 2nd International Conference, 19-20 Feb 2015, Noida, pp. 613-918.
  • Iyer S. and MCKeown N. W., Analysis of the parallel packet switch architecture, IEEE/ACM Transactions on Networking, Apr 2013, 314-324.
  • Jarray A. and Jaumard B., Exact ILP solution for the grooming problem in WDM ring Networks, IEEE International Conference on Communications, 16-20 May 2005, 1708-1712.
  • Kraijak S. and Tuwanut P., A survey on IoT architectures, protocols, applications, security, privacy, real-world implementation and future trends, 11th International Conference on Wireless Communications, Networking and Mobile Computing, 21-23 Sept 2015, Shanghai, 1-6.
  • Lanjuan L., SCM Security Solution Based on SSL Protocol, 2006 IEEE International Conference on Service Operations and Logistics, and Informatics, 21-23 June 2006, Shanghai, 814-817.
  • Li Li, Wu Chou, Wei Zhou and Min Luo, Design Patterns and Extensibility of REST API for Networking Applications, IEEE Transactions on Network and Service Management , 12 Jan 2016, 154-167.
  • Libpcap. https://sourceforge.net/projects/libpcap/, 29 Mayıs 2016.
  • Lu X., Sun W. and Li H., Design and research based on WinPcap network protocol analysis system, 2010 International Conference on Computer, Mechatronics, Control and Electronic Engineering, 24-26 Aug 2010, Changchun, 486-488.
  • Meethaisong W. and Premchaiswadi W., Applying social network miner on medical event logs using handover of work metric, ICT and Knowledge Engineering (ICT & Knowledge Engineering 2015) 13th International Conference, 18-20 Nov. 2015, Bangkok, 116-120.
  • Pcapdotnet. http://pcapdotnet.codeplex.com/, 29 Mayıs 2016.
  • Razieh S., Ferhat K., Roch G. and Fatna B., A RESTfull architecture for enabling rapid development and deployment of companion robot applications, Computing, Networking and Communications (ICNC), 2014 International Conference on, 3-6 Feb. 2014, 971-976.
  • Sinha R. and Gupta S. C., Performance evaluation of a protocol for packet radio network in mobile computer communications, IEEE Transactions on Vehicular Technology, 33(3): 250-258.
  • Takeuchi Y., Okamoto T., Yokoyama K. and Matsuda S., A differential-analysis approach for improving SOAP processing performance, IEEE International Conference on e-Technology, e-Commerce and e-Service, 29 March- 1 April 2005, 472-479.
  • Waheed A. H. M. and Belaton B., Improving accuracy of applications fingerprinting on local networks using NMAP-AMAP-ETTERCAP as a hybrid framework, Control System, Computing and Engineering (ICCSCE) IEEE International Conference, 29 Nov.- 1 Dec. 2013, Mindeb, 403-407.
  • Wang S., Xu D. and Yan S., Analysis and application of Wireshark in TCP/IP protocol teaching, E-Health Networking, Digital Ecosystems and Technologies (EDT) International Conference, 17-18 April 2010, Shenzhen, 269-272.
  • Wang S., Xu D. and Yan S., Analysis and application of Wireshark in TCP/IP protocol teaching, E-Health Networking, Digital Ecosystems and Technologies (EDT), 2010 International Conference, 17-18 April 2010, Shenzhen, 269-272.
Yıl 2016, Cilt: 2 Sayı: 2, 150 - 156, 19.10.2016

Öz

Kaynakça

  • Bilizzard Support. “Restfull Character”, https://us.battle.net/support/en/article/200576, 25 Mayıs 2016.
  • Binti A. S., Selvakumar M. and Mohammed K. M., A Study on Packet Capture Mechanisms in Real Time Network Traffic, Advanced Computer Science Applications and Technologies (ACSAT) International Conference, 23-24 Dec 2013, Kuching, pp. 456-460.
  • Chen X. ve Chan X., Study on Layout Strategy of Transit Hub Network, Industrial Control and Electronics Engineering (ICICEE), 2012 International Conference, 23-25 Aug. 2012, Xi’an, 258-261.
  • Daiki C., Kazuhiro T., Tatsuya M. and Shigeki G., Detecting Malicious Websites by Learning Ip Address Features, Applications and the Internet IEEE/IPSJ on 12th International Symposium , 16-20 July 2012, Izmir, pp. 29-39.
  • Friedl M. A. ve Brodley C. E., “Decision tree classification of land cover from remotely sensed data,” Remote Senss. Environ., vol. 61, no. 3, pp. 399–409, 1997.
  • Ibrahim G. and Vaclav P., DNS traffic analysis for malicious domains detection, Signal Processing and Integrated Networks on 2nd International Conference, 19-20 Feb 2015, Noida, pp. 613-918.
  • Iyer S. and MCKeown N. W., Analysis of the parallel packet switch architecture, IEEE/ACM Transactions on Networking, Apr 2013, 314-324.
  • Jarray A. and Jaumard B., Exact ILP solution for the grooming problem in WDM ring Networks, IEEE International Conference on Communications, 16-20 May 2005, 1708-1712.
  • Kraijak S. and Tuwanut P., A survey on IoT architectures, protocols, applications, security, privacy, real-world implementation and future trends, 11th International Conference on Wireless Communications, Networking and Mobile Computing, 21-23 Sept 2015, Shanghai, 1-6.
  • Lanjuan L., SCM Security Solution Based on SSL Protocol, 2006 IEEE International Conference on Service Operations and Logistics, and Informatics, 21-23 June 2006, Shanghai, 814-817.
  • Li Li, Wu Chou, Wei Zhou and Min Luo, Design Patterns and Extensibility of REST API for Networking Applications, IEEE Transactions on Network and Service Management , 12 Jan 2016, 154-167.
  • Libpcap. https://sourceforge.net/projects/libpcap/, 29 Mayıs 2016.
  • Lu X., Sun W. and Li H., Design and research based on WinPcap network protocol analysis system, 2010 International Conference on Computer, Mechatronics, Control and Electronic Engineering, 24-26 Aug 2010, Changchun, 486-488.
  • Meethaisong W. and Premchaiswadi W., Applying social network miner on medical event logs using handover of work metric, ICT and Knowledge Engineering (ICT & Knowledge Engineering 2015) 13th International Conference, 18-20 Nov. 2015, Bangkok, 116-120.
  • Pcapdotnet. http://pcapdotnet.codeplex.com/, 29 Mayıs 2016.
  • Razieh S., Ferhat K., Roch G. and Fatna B., A RESTfull architecture for enabling rapid development and deployment of companion robot applications, Computing, Networking and Communications (ICNC), 2014 International Conference on, 3-6 Feb. 2014, 971-976.
  • Sinha R. and Gupta S. C., Performance evaluation of a protocol for packet radio network in mobile computer communications, IEEE Transactions on Vehicular Technology, 33(3): 250-258.
  • Takeuchi Y., Okamoto T., Yokoyama K. and Matsuda S., A differential-analysis approach for improving SOAP processing performance, IEEE International Conference on e-Technology, e-Commerce and e-Service, 29 March- 1 April 2005, 472-479.
  • Waheed A. H. M. and Belaton B., Improving accuracy of applications fingerprinting on local networks using NMAP-AMAP-ETTERCAP as a hybrid framework, Control System, Computing and Engineering (ICCSCE) IEEE International Conference, 29 Nov.- 1 Dec. 2013, Mindeb, 403-407.
  • Wang S., Xu D. and Yan S., Analysis and application of Wireshark in TCP/IP protocol teaching, E-Health Networking, Digital Ecosystems and Technologies (EDT) International Conference, 17-18 April 2010, Shenzhen, 269-272.
  • Wang S., Xu D. and Yan S., Analysis and application of Wireshark in TCP/IP protocol teaching, E-Health Networking, Digital Ecosystems and Technologies (EDT), 2010 International Conference, 17-18 April 2010, Shenzhen, 269-272.
Toplam 21 adet kaynakça vardır.

Ayrıntılar

Bölüm Makaleler
Yazarlar

Eda Sena Karaağaçlı Bu kişi benim

Ahmet Anıl Müngen

Hakan Erdöl Bu kişi benim

Yayımlanma Tarihi 19 Ekim 2016
Yayımlandığı Sayı Yıl 2016 Cilt: 2 Sayı: 2

Kaynak Göster

APA Karaağaçlı, E. S., Müngen, A. A., & Erdöl, H. (2016). PCAP PAKETLER İLE RESTFULL API’Yİ GERÇEK ZAMANLI DİNLEM. Yönetim Bilişim Sistemleri Dergisi, 2(2), 150-156.