Person: DOĞAN, BUKET
Loading...
Email Address
Birth Date
7 results
Search Results
Now showing 1 - 7 of 7
Publication Open Access Protecting android devices from malware attacks: a state-of-the-art report of concepts, modern learning models and challenges(2023-01-01) DOĞAN, BUKET; Bayazit E. C., Sahingoz O. K., DOĞAN B.Advancements in microelectronics have increased the popularity of mobile devices like cellphones, tablets, e-readers, and PDAs. Android, with its open-source platform, broad device support, customizability, and integration with the Google ecosystem, has become the leading operating system for mobile devices. While Android’s openness brings benefits, it has downsides like a lack of official support, fragmentation, complexity, and security risks if not maintained. Malware exploits these vulnerabilities for unauthorized actions and data theft. To enhance device security, static and dynamic analysis techniques can be employed. However, current attackers are becoming increasingly sophisticated, and they are employing packaging, code obfuscation, and encryption techniques to evade detection models. Researchers prefer flexible artificial intelligence methods, particularly deep learning models, for detecting and classifying malware on Android systems. In this survey study, a detailed literature review was conducted to investigate and analyze how deep learning approaches have been applied to malware detection on Android systems. The study also provides an overview of the Android architecture, datasets used for deep learning-based detection, and open issues that will be studied in the future.Publication Metadata only Data privacy in big data: Federated learning(Bilgi Kültür Sanat Yayınevi, 2023-06-01) BÜYÜKTANIR, BÜŞRA; DOĞAN, BUKET; Büyüktanır B., Doğan B.With the advancement of technology, the place of internet-based devices in our lives has increased day by day. With these devices, more data has been produced and thus the concept of big data has entered our lives. The big data produced includes various information as well as personal information. The working performance of artificial intelligence technology used in internet-based devices is directly proportional to large and various data. However, at this point, it is of great importance to ensure the privacy of the personal data used. Due to data privacy, in some organizations, data is used where it is produced, but data sharing is not done. This situation both negatively affects the development of artificial intelligence applications and limits the new productions that will emerge by processing the data produced in this field. As a solution to all these problems, federated learning technology has been developed. Federated learning is an up-to-date technology that enables model training without sacrificing data privacy. In this study, the working architectures of the big data concept and federated learning technology are explained, the current studies in the literature are reviewed and their usage areas are summarized. It is thought that this study will contribute to researchers who will work on federated learning for big data, which is up-to-date and open to development.Publication Open Access Topluluk sınıflandırma yöntemleri ve PCA kullanarak zararlı url tespiti(2021-12-01) ALTIKARDEŞ, ZEHRA AYSUN; DOĞAN, BUKET; Köksal K., Doğan B., Altıkardeş Z. A.Teknolojinin gelişmesi ve internet kullanıcı sayısındaki artışla orantılı olarak siber suçlarda da artış gözlemlenmiştir. Birçok farklı siber saldırı tekniği bulunmaktadır. Bu saldırı tekniklerinden biri olan kötü amaçlı web siteleri, siber saldırılar ve dolandırıcılık olaylarında önemli rol oynamaktadır. İnternette masum görünen bir bağlantıya tıklamak veya e-posta ve mesaj yoluyla gönderilen bir web sayfasını ziyaret etmek arka planda kimlik avı kampanyalarının başlatılmasına, kötü amaçlı yazılımların, casus yazılımların, fidye yazılımların indirilmesine ve ciddi parasal kayıplar oluşmasına yol açar. Dolayısıyla bu tehditlerin etkin bir şekilde tespit edilmesi ve önlenmesi bireyler, kurumlar ve hükümetler için oldukça önemli bir konu haline gelmiştir. Kara listeye dayalı yöntemler, kötü amaçlı URL\"leri tanımlamak için kullanılan standart yöntemlerden biridir. Ancak kara listeler hiçbir zaman kapsamlı değildir ve yeni oluşturulan URL\"leri algılama yeteneğinden yoksundur. Kara listeye dayalı yöntemlerin mevcut ihtiyacı ve eksiklikleri de göz önünde bulundurularak bu çalışmada toplulukla öğrenme yöntemleri kullanılarak bir sınıflandırma yaklaşımı önerilmiştir. Çalışmada iyi huylu ve kötü huylu URL’lerden elde edilmiş 79 sözcüksel özellik içeren Kanada Siber Güvenlik Enstitüsü\"nün URL veriseti (ISCX-URL-2016) üzerinde çalışılmıştır. Verisetinde benign, spam, phishing, malware ve defacement olmak üzere beş farklı URL türü bulunmaktadır. Toplam 7781 iyi huylu ve 28.917 tane zararlı URL kaydı üzerinde zararlı, zararsız etiketleri kullanılarak ikili sınıflandırma işlemi ve beş farklı etiket bilgisi kullanılarak çoklu sınıflandırma işlemi gerçekleştirilmiştir. Makine öğrenmesi yöntemlerinden Rastgele Orman algoritması uygulanan yöntemin başarısının sınanması için 10-katlamalı çapraz doğrulama (10-fold cross validation) ile birlikte kullanılmıştır ve 10 temel bileşen kullanılarak ikili sınıflandırma problemi için ortalama %99.42, çoklu sınıflandırma problemi için ortalama %95.68 doğruluk değeri elde edilmiştir. Böylece her gün yeni web sitelerinin katıldığı bu dinamik internet ağını kötü niyetli tasarlanmış web sitelerinden korumaya yönelik yüksek başarım oranına sahip bir model önerisi sunulmuştur.Publication Open Access Deep learning based malware detection for android systems: A comparative analysis(2023-04-01) DOĞAN, BUKET; Bayazit E. C., Sahingoz O. K., DOĞAN B.Nowadays, cyber attackers focus on Android, which is the most popular open-source operating system, as main target by applying some malicious software (malware) to access users\" private information, control the device, or harm end-users. To detect Android malware, security experts have offered some learning-based models. In this study, we developed an Android malware detection system that uses different machine\deep learning models by performing both dynamic analyses, in which suspected malware is executed in a safe environment for observing its behaviours, and static analysis, which examines a malware file without any execution on the Android device. The benefits and weaknesses of these models and analyses are described in detail in this comparative study, and directions for future studies are drawn. Experimental results showed that the proposed models gave better results than those in the literature, with 0.988 accuracy for LSTM on static analysis and 0.953 accuracy for CNN-LSTM on dynamic analysis.Publication Metadata only Municipal solid waste management: A case study utilizing DES and GIS(2023-10-02) ÇALIŞ USLU, BANU; DOĞAN, BUKET; ÜLKÜ, EYÜP EMRE; Çaliş Uslu B., Kerçek V. A., Şahin E., Perera T., Doğan B., Ülkü E. E.This research aims to compare two well-known solution methodologies, namely Geographical Information Systems (GIS) and Discrete Event Simulation (DES), which are used to design, analyze, and optimize the solid waste management system based on the locations of the garbage bins. A significant finding of the study was that the application of the simulation methodology for a geographical area of a size of 278km2was challenging in that the addition of the geographical conditions to the developed model proved to be time-consuming. On the other hand, the simulation model that was developed without adding geographical conditions revealed that the number of bins could be reduced by 60.3% depending on the population size and garbage density. However, this model could not be implemented since the required walking distance was higher than 75 m, which is greater than the distance the residents could be reasonably expected to travel to reach a bin. Thus, using a cutoff value of 75 m, the total number of bins can be reduced by 30% on average with regard to the result obtained from the GIS-based solution. This can lead to an annual cost reduction of 93.706 € on average in the collection process and carbon dioxide release reduction of 18% on average.Publication Open Access A deep learning based android malware detection system with static analysis(2022-01-01) DOĞAN, BUKET; Bayazit E. C. , Sahingoz O. K. , DOĞAN B.© 2022 IEEE.In recent years, smart mobile devices have become indispensable due to the availability of office applications, the Internet, game applications, vehicle guidance or similar most of our daily lives applications in addition to traditional services such as voice calls, SMSs, and multimedia services. Due to Android\"s open source structure and easy development platforms, the number of applications on Google Play, the official Android app store increased day by day. This also brig some security related issues for the end users. The increased popularity of Android operating system on mobile devices, and the associated financial benefits attracted attackers for developing some malware for these devices, which results a significant increase in the number of Android malware applications. To detect this type of security threats, signature based detection (static detection) in generally preferred due to its easy applicability and fast identification ability. Therefore in this study it is aimed to implement an up-to-date, effective, and reliable malware detection system with the help of some deep learning algorithms. In the proposed system, RNN-based LSTM, BiLSTM and GRU algorithms are evaluated on CICInvesAndMal2019 data set which contains 8115 static features for malware detection. Experimental results show that the BiLSTM model outperforms other proposed RNN-based deep learning methods with an accuracy rate of 98.85 %.Publication Metadata only Data privacy in big data: Federated learning(2023-06-25) BÜYÜKTANIR, BÜŞRA; DOĞAN, BUKET; Büyüktanır B., Doğan B.