Network Forensics of RPL-Based Attacks
dc.contributor.author | Yılmaz, Ercan Nurcan | |
dc.contributor.author | Gönen, Serkan | |
dc.contributor.author | Artuner, Harun | |
dc.contributor.author | Karacayılmaz, Gökçe | |
dc.contributor.author | Sindiren, Erhan | |
dc.contributor.author | Sayan, Hasan Hüseyin | |
dc.date.accessioned | 2023-04-10T20:25:52Z | |
dc.date.available | 2023-04-10T20:25:52Z | |
dc.date.issued | 2020 | |
dc.department | Rektörlük, Rektörlüğe Bağlı Birimler, Düzce Üniversitesi Dergileri | en_US |
dc.description.abstract | IoT devices, which are increasing in highly manner day by day, are now in everywhere in our life. WSNs are usedtogether with IoT devices to monitor real environments. In this study, attacks against WSNs were carried out. Theattack chosen for this study is a flood attack. In addition, solution suggestions for this attack are presented. In thiscontext, firstly reference and attack packages have been collected, and then the collected packages have beencompared with the reference packages and forensic investigations have been carried out. The result of theevaluation has shown the importance continuous monitoring on 24/7 basis and detecting abnormal behaviors inIoT traffic with forensics analysis for preventing attacks. | en_US |
dc.identifier.doi | 10.29130/dubited.788006 | |
dc.identifier.endpage | 2376 | en_US |
dc.identifier.issn | 2148-2446 | |
dc.identifier.issue | 4 | en_US |
dc.identifier.startpage | 2366 | en_US |
dc.identifier.trdizinid | 390809 | en_US |
dc.identifier.uri | http://doi.org/10.29130/dubited.788006 | |
dc.identifier.uri | https://search.trdizin.gov.tr/yayin/detay/390809 | |
dc.identifier.uri | https://hdl.handle.net/20.500.12684/11673 | |
dc.identifier.volume | 8 | en_US |
dc.indekslendigikaynak | TR-Dizin | en_US |
dc.language.iso | en | en_US |
dc.relation.ispartof | Düzce Üniversitesi Bilim ve Teknoloji Dergisi | |
dc.relation.publicationcategory | Makale - Ulusal Hakemli Dergi - Kurum Öğretim Elemanı | en_US |
dc.rights | info:eu-repo/semantics/openAccess | en_US |
dc.title | Network Forensics of RPL-Based Attacks | en_US |
dc.type | Article | en_US |
Dosyalar
Orijinal paket
1 - 1 / 1
Yükleniyor...
- İsim:
- 11673.pdf
- Boyut:
- 1.52 MB
- Biçim:
- Adobe Portable Document Format
- Açıklama:
- Tam Metin / Full Text