DNS Güçlendirme Saldırısı RisN Analizi
Transkript
6. ULUSLARARASI %é/*é*µ9(1/éçéYH.5é372/2-é .21)(5$16, 6th INTERNATIONAL INFORMATION SECURITY & CRYPTOLOGY CONFERENCE '16*oOHQGLUPH6DOGÕUÕVÕ5LVN$QDOL]L Devrim Seral Özet—Son zamanlarda meydana gelen oRN E\N 'D÷ÕWÕN Servis EngellePH 6DOGÕUÕODUÕQÕQ DUGÕQGD DNS JoOHQGLUPH VDOGÕUÕODUÕQÕQ WHWLNoL ROGX÷X bilinmektedir. %X VDOGÕUÕ WU, GD÷ÕWÕN VHUYLV HQJHOOHPH VDOGÕUÕODUÕQÕ IDUNOÕ D÷ODUGDNL |]\LQHOHPH\H DoÕN '16 VXQXFXODUÕ DUDFÕ RODUDN NXOODQDUDN yerine getirmektedir. Bu sistemlerin tespit edilerek WDQÕPODQPDODUÕ X]XQ YH ]DKPHWOL ELU LúOHPGLU %X \]GHQ EX oDOÕúPDGD, çDOÕúPD NPHVL RODUDN .X]H\ .ÕEUÕV 7UN CumhuriyetiQGH IDDOL\HW J|VWHUHQ ELUL NDPX ROPDN ]HUH WRSODPGDVHNL]DGHWøQWHUQHW6HUYLV6D÷OD\ÕFÕD÷ÕNXOODQÕOPÕúWÕU GHOLúWLULOHQ ELU EHWLNOH EX D÷ODU ]HULQGH tespit edilen |]\LQHOHPH\H DoÕN '16 VXQXFXODUÕ ile ilgili toplanan bilgiler VXQXOPXúYH yaratabilecekleULULVNOHURUWD\DNRQPXúWXU Anahtar Kelimeler—''R6'16'16*oOHQGLUPH6DOGÕUÕVÕ Abstract— DNS amplification attacks are known as perpetrator of WRGD\¶V very huge Distributed Denial of Service attacks. This type of attack performs distributed denial of service attack through open recursive DNS servers located in different locations. Discovering and identifying open recursive DNS servers are time consuming and troublesome process. Therefore in this study we use eight Internet Service Provider (One of them government internet provider) networks that operate at Turkish Republic of Northern Cyprus as a working set. A script developed to identifying and collecting information for open recursive DNS servers that available in these networks and risks that sourced by these systems expressed. Index Terms—DDoS, DNS, DNS Amplification Attack I. *ø5øù ø NTERNET NXOODQÕPÕQÕQVUHNOLRODUDNDUWPDVÕLOHELUOLNWH VHUYLV YHUHQ NXUXP YH úLUNHWOHULQ HULúLOHELOLU ROPDVÕ JLWWLNoH GDKD GD |QHPOL ELU KDOH JHOPLúWLU 7UNL\H¶GH 2013 \ÕOÕ LON o D\OÕN G|QHPGH JHQLú EDQW øQWHUQHW DERQHVL VD\ÕVÕ PLO\RQNLúL\LDúPÕúYHEXDERQHOHULQJLELE\NELU NÕVPÕQÕQ 8Mbps KÕ]D NDGDU ED÷ODQWÕ VXQDQ SDNHWOHUL WHUFLK HWWLNOHUL J|UOPúWU >@ Ayni zamanda %DQNDODUDUDVÕ .DUW Merkezi verilerine g|UH \ÕOÕ VRQXQD NDGDU ønternet ]HULQGHQ KDUFDQPDVÕ EHNOHQHQ SDUD PLNWDUÕ PLO\DU 7/¶ye ve \DSÕODQ LúOHP PLNWDUÕQÕQ GD PLO\RQX EXOPDVÕ beklenmektedir [2]. 'Q\DQÕQ GL÷HU ONHOHULQGH GH ,78 (International Telecommunication Union) verilerinHJ|UH PLO\DU NLúLQLQ JHQLú EDQW øQWHUQHW ED÷ODQWÕVÕQD VDKLS ROGX÷X bilinmektedir [3]. 'L÷HU \DQGDQ \ÕOÕ LoLQGH e-ticaretin WULO\RQ GRODUOÕN ELU E\NO÷H XODúDFD÷Õ WDKPLQ edilmektedir [4]. %X ELOJLOHU ÕúÕ÷ÕQGD GQ\DQÕQ ELUoRN ONHVLQGH Jerek NDPX JHUHNVH |]HO úLUNHWOHUin oHYULPLoL hizmet VD\ÕVÕQÕ VUHNOL DUWÕUGÕ÷Õ NXúNX J|WUPH] ELU JHUoHNWLU. BX NDGDU ID]OD HNRQRPLN E\NO÷H YH NXOODQÕFÕ 'HYULP 6HUDO 8OXVODUDUDVÕ .ÕEUÕV hQLYHUVLWHVL 0KHQGLVOLN )DNOWHVL %LOLúLP 6LVWHPOHUL 0KHQGLVOL÷L /HINRúD-.ÕEUÕV¶WD |÷UHWLP \HVLGLU Hmail: [email protected]) 20-21 September /Eylül 2013 | Ankara / TURKEY VD\ÕVÕQD XODúDQ oHYULPLoL VHUYLVOHUH rekabetten, pazar SD\ODúÕPÕQGDQ ve hatta siyasi yada politik nedenlerle sorun oÕNDUPDN LVWH\HQOHULQ EXOXQPDVÕ NDoÕQÕOPD] ROPDNWDGÕU øQWHUQHW]HULQGHQYerilen servislere HULúLPLHQJHOOHPHNLoLQ NXOODQÕODQ HQ \D\JÕQ \|QWHPOHUGHQ ELUL Hizmet Engelleme SDOGÕUÕODUÕGÕU (Denial of Service). %X WUGHNL VDOGÕUÕODUGD VDOGÕUJDQ hizmeti veren sistemin D÷ ND\QDNODUÕQÕ yaGD GL÷HU ND\QDNODUÕQÕ KDIÕ]D LúOHPFL GLVN YV WNHWHUHN JHUoHN VLVWHP NXOODQÕFÕODUÕQÕQ øQWHUQHW VHUYLVOHULQH HULúLPLQL engellemektedir [5]. Hizmet (QJHOOHPH 6DOGÕUÕODUÕQÕQ JQP]GH HQ \D\JÕQ RODQÕ 'D÷ÕWÕN Hizmet Engelleme 6DOGÕUÕODUÕGÕU Distributed Denial of Service). 'D÷ÕWÕN +L]PHW (QJHOOHPH 6DOGÕUÕODUÕ |]HOOLNOH |]HO úLUNHWOHUH VDDWWH ¶GDQ EDúOD\DQ PLNWDUODUGD mali ND\ÕSODUD QHGHQ olabilmektedir [6]. %X WU VDOGÕUÕODU kurumlara mali ND\ÕSODUÕQ\DQÕQGDayUÕFDSUHVWLMND\EÕQDda \RODoPDNWDGÕU %X VDOGÕUÕODUÕQ QH WU VLVWHPOHUGHQ ND\QDNODQGÕ÷ÕQÕ ELOPHN VDOGÕUÕODUÕ |QOHPHN \DGD HQJHOOHQHELOPHVLQH \DUGÕPFÕ ROPDNWDGÕU gUQH÷LQ &ORXGIODUH úLUNHWLQLQ ELU PúWHULVLQH \ÕOÕQÕQ (\OO D\ÕQGD *ESV E\NO÷H XODúDQ YH 'D÷ÕWÕN +L]PHW (QJHOOHPH 6DOGÕUÕVÕQÕQ ELU WU RODQ '16 *oOHQGLUPH (Domain Name System Amplification) VDOGÕUÕVÕ ROGX÷X ILUPD WDUDIÕQGDQ WHVSLW HGLOPLúWLU [7]. DNS *oOHQGLUPH VDOGÕUÕODUÕ LOH LOJLOL |QHPOL ELU X\DUÕGD 0DUW ¶GH Amerika BirleúLN 'HYOHWOHUL &(57¶GHQ &RPSXWHU Emergency Readiness Team) JHOPLúWLU [8]. %X oDOÕúPDQÕQ WHPHO DPDFÕ øQWHUQHW VHUYLVOHULQGH FLGGL NHVLQWL\H \RO DoDELOHFHN '16 *oOHQGLUPH VDOGÕUÕVÕ KDNNÕQGD ELOJL VXQDUDNEXVDOGÕUÕQÕQWHWLNoLRODUDNNXOODQGÕ÷Õ|]\LQHOHPH\e DoÕN D÷ DODQ o|]POHPH VLVWHPOHUL LOH LOJLOL oDOÕúPD NPHVL RODUDNNXOODQÕODQVHNL]DGHWøQWHUQHW6HUYLV6D÷OD\ÕFÕD÷ÕQGDQ elde edilen bulgular SD\ODúÕODFDNWÕU. Makalenin bundan VRQUDNL E|OPOHUL úX úHNLOGHGLU %|OPGH DNS *oOHQGLUPH VDOGÕUÕVÕQÕQ oDOÕúPD \|QWHPL HOH DOÕQDFDN, 3. %|OPGHEXVDOGÕUÕWUQQDUDFÕRODUDNNXOODQGÕ÷ÕDoÕNDODQ DGÕ o|]FOHUL WHVSLWHWPHNLoLQJHOLúWLULOHQEHWLN YHoDOÕúPD NPHVL DQODWÕODFDN %|OPGH HOGH HGLOHQ YHULOHU SD\ODúÕODUDN ve son olarak 6RQXo NÕVPÕQGD EX EXOJXOar GH÷HUOHQGLULOHFHNWLU. II. DNS *hd/(1'ø50( SALDIRISI %XE|OPGH|QFH'16VLVWHPLQLQoDOÕúPDVÕLOHLOJLOLJHQHO ELOJL YHULOHFHN GDKD VRQUD '16 *oOHQGLUPH VDOGÕUÕVÕQÕQ oDOÕúPD\|QWHPLDQODWÕODFDNWÕU A. DNS Nedir? DNS øQWHUQHWLQoDOÕúPDVÕQÕVD÷OD\DQJL]Oi kahramanlardan biridir. DNS sisteminin WHPHO J|UHYL LVWHPFLOHUGHQ JHOHQ DODQ DGÕ \DGD VLVWHP LVLPOHULQL ELOJLVD\DUODUÕQ DQOD\DFD÷Õ DGUHVOHUH oHYLUPHNWLU [9]. Ayni zamanda gelen adres ELOJLOHULQL LVLPOHUH GH oHYLUHELOLU %X VLVWHPOHU LVWHPFL VXQXFX PLPDULVLQGH oDOÕúÕU YH LVWHN YH FHYDS ELOJLVLQL 8'3 83 Proceedings/Bildiriler Kitabı 6th INTERNATIONAL INFORMATION SECURITY & CRYPTOLOGY CONFERENCE (UVHU'DWDJUDP3URWRFROSURWRNRONXOODQDUDN WDúÕU '16VLVWHPOHULQLQ¶OL\ÕOODUGDQLWLEDUHQNXOODQÕOPD\D EDúODQPDVÕQGDQ VRQUD VUHNOL RODUDN \HQLOHQPLú YH EX DODQGD LON X\JXODPD %6' VLVWHPOHUL ]HULQGH JHOLúWirilen %,1'\D]ÕOÕPÕROPXúWXU>@ B. '16*oOHQGLUPH6DOGÕUÕVÕ1HGLU" øQWHUQHW NXOODQÕFÕ VD\ÕVÕ YH WUDIL÷LQLQ ¶OÕ \ÕOODUGD DUWPD\DEDúODPDVÕ ile birlikte DNS sistemleri JLWWLNoH|QHP ND]DQPÕúWÕU. %XQGDQ GROD\Õ DNS sistemlerinin oDOÕúPD GR÷DVÕQGDQ JHOHQ DoÕNODU oÕNPD\D EDúODPÕúWÕU \ÕOÕQGD Atkins ve Austein RFC 3833 belgesinde DNS sisteminin ]D\ÕIOÕNODUÕQÕQ analiziQL \DSPÕúODUGÕU >@ Bu belgenin +L]PHW (QJHOOHPH 6DOGÕUÕODUÕ NÕVPÕQGD '16 *oOHQGLUPH VDOGÕUÕVÕQÕQ \DSÕODELOHFH÷LQH GDLU ELOJL YHUPLúOerdir. 2006 \ÕOÕQGD \DSÕODQ GL÷HU bir oDOÕúPDGD '16 *oOHQGLUPH VDOGÕUÕVÕQÕQ QDVÕO \DSÕODELOHFH÷L LOH LOJLOL D\UÕQWÕOÕ ELOJL YHULOPLúWLU>@ '16*oOHQGLUPH6DOGÕUÕVÕLONHRODUDN6PXUIVDOGÕUÕVÕQÕQ bir benzerini ,&03 LVWH÷L \HULQH DNS istek paketleri kullanarak yerine getirmektedir [13]. '16 *oOHQGLUPH 6DOGÕUÕVÕQÕQ QDVÕO \DSÕOGÕ÷ÕQÕ ELU VHQDU\R LOH DQODWPDN GDKD kolay olacakWÕU ùHNLO ¶GH '16 *oOHQGLUPH 6DOGÕUÕ VHQDU\RVXQGD J|VWHULOGL÷L JLEL VDOGÕUJDQÕQ Botnet [14] ]HULQGHQbinlerce bilgisayarÕNRQWUROHWWL÷LQL %RWQHW¶HGDKLO olan FLKD]ODUÕQ ND\QDN DGUHVOHULQL NXUEDQÕQ DGUHVL RODUDN GH÷LúWLUHUHN binlerce DNS sorgusunu GÕúDUÕ |]\LQHOL VRUJXODPD\D DoÕN '16 VXQXFXODUÕQD J|QGHUGL÷LQL YDUVD\DOÕP %|\OH ELU VDOGÕUÕGD KHU ELU '16 LVWH÷LQLQ %\WH¶OÕN SDNHW ER\XWXQGD J|QGHULOHELOHFH÷LQL YDUVD\DUVDN VRUJXODPD\DSÕODQVXQXFXODUH÷HU('16>@IRUPDWÕQGDLVH FHYDEÕQER\XWX%\WH¶Õ DúDELOLU%XVD\HGH%\WH¶OÕN ELULVWHNNDWJoOHQHUHNNXUEDQÕQDGUHVLQHJHULG|QHELOLU. %|\OHFH %RWQHW ]HULQGHNL VDOGÕUÕ\D GDKLO RODQ KHU ELU PDNLQHQLQ UHWWL÷L LVWH÷LQ NDWÕ NDGDU WUDILN NXUEDQÕQ ]HULQH\|QOHQGLULOHELOPHNWHGLU [16]. 6. ULUSLARARASI %é/*é*µ9(1/éçéYH.5é372/2-é .21)(5$16, x '16 VXQXFXODU H÷HU |]\LQHOHPH LúOHPLQL WP LVWHPFLOHUH DoÕN WXWPDN ]RUXQGD\VD ELU LVWHPFLGHQ JHOHQ LVWHN VD\ÕVÕ EHOLUOL RUDQÕQ ]HULQGH ROPDVÕ durumda o istemciye cevap vermeyi kesebilir. x øVWHPFLOHUHøQWHUQHWHULúLPLYHUHQVHUYLVVD÷OD\ÕFÕODUÕQ IP KLOHNDUOÕ÷ÕQÕ VSRRILQJ |QOH\LFL \|QWHPOHU X\JXODPDVÕ III. g=<ø1(/(0(<( $d,. DNS SUNUCU 7(63ø7ø %X E|OPGH |]\LQHOHPH\H DoÕN '16 VXQXFXODUÕ tespit etmek LoLQ JHOLúWLULOHQ EHWLN YH oDOÕúPD NPHVL HOH DOÕQDFDNWÕU. A. Yöntem '16 *oOHQGLUPH 6DOGÕUÕODUÕQD olanak veren en temel neden |]\LQHOHPH\H DoÕN '16 VXQXFXODUGÕU øQWHUQHW ]HULQGHNL KHUKDQJL %RWQHW D÷ÕQGDQ \DQOÕú \DSÕODQGÕUPD \DGD EDúND QHGHQOHUOH VRUJX \DSDQ WP FLKD]ODUD |]\LQHOHPHOLRODUDNFHYDSYHUHQEXWUGHNL'16VXQXFXODUÕ GR÷UXGDQ EX 'D÷ÕWÕN 6HUYLV(QJHOOHPH6DOGÕUÕVÕQD\DUGÕPFÕ ROPDNWDGÕU %X \]GHQ ùHNLO ¶GH DNÕú úHPDVÕ YHULOHQ ELU EHWLN\DUGÕPÕLOHEXWUGHVDOGÕUÕODUDRODQDNYHUHQVunucular ED]Õ|]HOOLNOHULQHJ|UHWHVSLWHGLOPLúOHUGLU ùHNLOg]\LQHOHPH\HDoÕN'16VXQXFXODUÕWHVSLWHGHQEHWL÷LQDNÕúúHPDVÕ ùHNLO'16*oOHQGLUPH6DOGÕUÕVHQDU\RVX C. '16*oOHQGLUPH6DOGÕUÕVÕ 1DVÕO(QJHOOHQHELOLU" '16 *oOHQGLUPH 6DOGÕUÕODUÕ DúD÷ÕGD YHULOHQ \|QWHPOHUOH engellenebilir [12]: x g]\LQHOHPH \DSDQ '16 VXQXFXODUÕQ VDGHFH KL]PHW YHULOHQ LVWHPFL ,3 EORNODUÕQD FHYDS YHUHFHN úHNLOGH \DSÕODQGÕUÕOPDVÕ Proceedings/Bildiriler Kitabı 84 g]\LQHOHPH\H DoÕN '16 VXQXFXODUÕ WHVSLW HGHQ EHWL÷LQ oDOÕúPDDGÕPODUÕDúD÷ÕGDNLJLELGLU a) Betik, hedef olarak verilen sistemin DNS sorgu portuna (UDP/53) NHQGLNRQWUROQGHROPDVÕPPNQ ROPD\DQELUDODQDGÕLoLQgULVFRUJ'16LVWHPFLVL LOH VRUJX J|QGHULU (÷HU KHGHI VLVWHP '16 VRUJXODUÕQD |]\LQHOHPHOL RODUDN FHYDS YHUL\RUVD EX VLVWHP VDOGÕUÕ LoLQ X\JXQ RODUDN LúDUHWOHQLU &HYDS YHUPL\RUVD EHWLN GL÷HU VLVWHPOHUL NRQWUROH GHvam eder. b) g]\LQHOHPHOL RODUDN FHYDS DOÕQDQ KHGHI VLVWHPLQ GL÷HU NDUDNWHULVWLNOHULQL WHVSLW HWPHN LoLQ QPDS >17] 20-21 September /Eylül 2013 | Ankara / TURKEY 6. ULUSLARARASI %é/*é*µ9(1/éçéYH.5é372/2-é .21)(5$16, 6th INTERNATIONAL INFORMATION SECURITY & CRYPTOLOGY CONFERENCE port tarama uygXODPDVÕ LOH ED]Õ |QHPOL SRUWODUÕ WDUDQDUDNDOÕQDQVRQXoODUND\GHGLOLU c) '16 VRUJXODPD DUDoODUÕ LOH &+$26 VÕQÕIÕ NXOODQÕODUDNH÷HUPPNQVH'16VXQXFXQXQVUP tespit edilir [18]. d) Yine hedef sunucunun HTTP (Hyper Text Transfer 3URWRFRO SRUWX DoÕNVD ZHE VXQXFXQXQ WU WHVSLW edilir. B. Betik dDOÕúPD.PHVL g]\LQHOHPH\H DoÕN '16 VXQXFXODUÕ WHVSLW HWPHN ]DKPHWOL YH X]XQ VUHQ ELU LúOHP ROPDVÕQGDQ GROD\Õ, EHWL÷LQ oDOÕúma NPHVL olarak .X]H\ .ÕEUÕV 7UN &XPKXUL\HWL VÕQÕUODUÕ LoLQGH IDDOL\HW J|VWHUHQ ELUL NDPX ROPDN ]HUH sekiz adet øQWHUQHW6HUYLV6D÷OD\ÕFÕø66D÷ÕNXOODQÕOPÕúWÕU dDOÕúPDQÕQ \DSÕOGÕ÷Õ EX D÷ODU PRELO øQWHUQHW KDEHUOHúPH GÕúÕQGDNL \DNODúÕN RODUDN WP JHQLú EDQW øQWHUQHW DERQHOHULQL NDSVDPDNWDGÕU Toplamda test edilen IP DGUHVLVD\ÕVÕ DGHWROPXúWXU%HWLNoDOÕúPDVÕNRQWUROOELUúHNLOGH\DSÕODUDN WHVW \DSÕODQ D÷ODUÕQ EX LúOHPL VDOGÕUÕ \DGD NHúLI RODUDN DOJÕODPDPDVÕVD÷ODQPD\DoDOÕúÕOPÕúWÕU TABLO I $d,.32576$<,/$5, Port ftp 6D\Õ 138 telnet 111 ssh 51 smtp http 14 157 Ms-term server Netbios 23 8 <LQH ùHNLO ¶GH DoÕN RODQ SRUWODUÕQ GL÷HUOHULQH J|UH \]GHOLN GD÷OÕPÕ YHULOPLúWLU Bu bilJLOHU ÕúÕ÷ÕQGD g]\LQHOHPH\HDoÕN'16VXQXFXLoHUHQEXVLVWHPOHUGH8'3 GÕúÕQGDD\UÕFDKWWSYHIWSGDKDVRQUDWHOQHWSRUWXQXQDoÕN ROGX÷X WHVSLW HGLOPLúWLU KWWSWHOQHW YH VVK SRUWODUÕ EX VLVWHPOHULQ X]DNWDQ \|QHWLOHELOLU \DGD \|QHWLOPH\H PVDLW ROGXNODUÕQÕJ|VWHUPHNWHGLU)73SRUWXQXQDoÕNROPDVÕGDEX VLVWHPOHULQ VDGHFH EDVLW X]DNWDQ \|QHWLOHELOLU VLVWHPOHU ROPDGÕNODUÕQÕ EXQXQ \DQÕQGD NXUXOXP ELOJLOHULQLQ ya da GH÷LúWLULOHELOLU ZHE VD\IDODUÕ JLEL KL]PHWOHU GH YHUHELOGLNOHULQLJ|VWHUPHNWHGLU IV. g=<ø1(/(0(<( $d,. DNS SUNUCU BULGULARI *HOLúWLULOHQ EHWLN LOH WRSODQDQ YHULOHU EX E|OPGH verilecektir. A. g]\LQHOHPH\H$oÕN'166XQXFXVX2UDQODUÕ %|OP III¶GH D\UÕQWÕVÕ YHULOHQ EHWLN LOH \DSÕODQ DQDOL]OHU VRQUDVÕWRSODPGD,3¶GHQROXúDQYHGH÷LúLNER\XWODUGD D÷ODU LoHUHQ VHNL] D÷GD EXOXQDQ VLVWHPOHUGHQ VDGHFH ¶VL \DGD ¶VL g]\LQHOHPH\H DoÕN '16 VXQXFX RODUDN oDOÕúPDNWDGÕU%XRUDQùHNLO¶GHJ|VWHULOPLúWLU ùHNLO6LVWHPOHU]HULQGHDoÕNRODQSRUWODU C. HTTP Portu AoÕN6LVWHPOHUGHdDOÕúDQ:HE6XQXFX 7UOHUL +773SRUWX7&3DoÕNRODQVLVWHPOHU ]HULQGH+773 LVWH÷LQHYHULOHQFHYDSEDúOÕ÷Õ]HULQGH\DSÕODQDQDOL]VRQXFX tespit edilen web VXQXFXWUOHUL7DEOR,,¶GHYHULOPLúWLU TABLO II :(%6818&87h5/(5ø 7U Rom Pager Mini httpd MSIIS Uc httpd Apache Router OS Light httpd 6D\Õ 41 22 12 7 5 45 2 ùHNLO¶GH:HEVXQXFXWUOHULQLQ\]GHOHULJ|VWHULOPHNWHGLU ùHNLOg]\LQHOHPH\HDoÕN'16VXQXFXRUDQÕ B. g]\LQHOHPH\H$oÕN6LVWHPOHUh]HULQGHNL'L÷HU$oÕN Portlar DGHW PDNLQH ]HULQGH '16 GÕúÕQGD oDOÕúDQ GL÷HU VHUYLVOHUL GH WHVSLW HGHELOPHN ]HUH QPDS >@ SRUW WDUDPD X\JXODPDVÕ LOH HQ ID]OD NXOODQÕODQ 7&3SRUWODUÕQGDQ¶GHQ ¶H NDGDU YH SRUWODUÕ ]HULQGH WDUDPD \DSÕOPÕúWÕU Ayni zamanda YH 8'3 SRUWODUÕ GD WDUDQPDVÕQD UD÷PHQ 8'3 SURWRNROQQ GR÷DVÕ JHUH÷L EX SRUWODUÕQ GXUXPX KDNNÕQGD WDP DQODPÕ\OD GR÷UX ELU ELOJL DOÕQDPDPÕúWÕU Tablo I¶GHQPDSLOHWHVWHGLOHQYHDoÕNROGX÷X WHVSLWHGLOHQ7&3SRUWODUÕQVD\ÕODUÕJ|VWHULOPHNWHGLU 20-21 September /Eylül 2013 | Ankara / TURKEY +773 JHUL G|Qú EDúOÕN ELOJLVLQGHQ VDGHFH VLVWHPLQ ZHEVXQXFXWU|÷UHQLOHELOPLúWLU$QFDNLVtek sonucu cevap RODUDNJHOHQVD\IDYHULOHUL]HULQGH\DSÕODQDQDOL]OHDGHW VLVWHPLQ GH 0LNURWLN 5RXWHU26 LúOHWLP VLVWHPL ]HULQGH oDOÕúWÕ÷Õ WHVSLW HGLOPLúWLU %XUDGD GLNNDW oHNLFL RODQ :HE VXQXFXWUOHUL5RP3DJHU0LQL-KWWSGYH5RXWHU26úHNOLQGH VÕUDODQPDNWDGÕU .HQGLQL 5RP3DJHU \DGD PLQL-httpd olarak WDQÕWDQ VLVWHPOHU ]HULQH UDVWJHOH ZHE LVWHPFL LOH ED÷ODQWÕ \DSÕOGÕ÷ÕQGD EX FLKD]ODUÕQ $'6/ PRGHP FLKD]ODUÕ \DGD J|POVLVWHPOHUROGX÷XJ|UOPúWU5RXWHU26LVHJHQHOGH NDEORVX] VLVWHPOHUGH NXOODQÕODQ |]HO J|PO VLVWHPOHULQ LúOHWLPVLVWHPLGLU 85 Proceedings/Bildiriler Kitabı 'L÷HU 10 6. ULUSLARARASI %é/*é*µ9(1/éçéYH.5é372/2-é .21)(5$16, 6th INTERNATIONAL INFORMATION SECURITY & CRYPTOLOGY CONFERENCE ùHNLO6LVWHPOHU]HULQGHoDOÕúDQ'16VUPOHULQLQRUDQODUÕ ùHNLO6LVWHPOHU]HULQGHoDOÕúDQ+773VXQXFXWUOHUL D. DNS sürümü kontrolü '16VRUJXODPDDUDoODUÕLOH&+$26VÕQÕIÕNXOODQDUDN'16 SRUWX 8'3 DoÕN RODQ FLKD]ODUÕQ VUP ELOJLVL EHWLN LOH VRUJXODQPÕúWÕU Tablo III¶GH WHVSLW HGLOHELOHQ VXQXFX WUOHUL J|VWHULOPHNWHGLU 7HVSLW HGLOHQ VXQXFX WUOHULQH J|UH EX FLKD]ODUÕQ ¶VL 8QL[ \DGD WUHYL FLKD]ODU YH ,6& Bind VUPQ oDOÕúWÕUGÕ÷Õ J|UOPHNWHGLU øNL DGHW VXQXFX LVH 0LFURVRIW ILUPDVÕQÕQ ,,6 '16 VXQXFXVXQX oDOÕúWÕUPDNWDGÕU Dns-masq sunucular ise '16 VRUJXODUÕQÕ \|Qlendirerek \DSDQJHQHOGHJYHQOLNGXYDUÕVLVWHPOHUL]HULQGHNXOODQÕODQ sistemlerdir. Geriye kalan '16 VXQXFXODUÕ ise, Bind GÕúÕQGD PXKWHPHOHQ |]HO RODUDN J|PO VLVWHPOHU LoLQ WDVDUODQPÕúELU'16VXQXFXVXoDOÕúWÕUPDNWDGÕU 7(ù(..h5 %X oDOÕúPDGD sistemlerini ve øQWHUQHW ED÷ODQWÕVÕQÕ NXOODQPDPD L]LQ YHUHQ VD\ÕQ 0HKPHW $OSWUN¶H WHúHNNU ederim. KAYNAKLAR TABLO III '166818&87h5/(5ø 6HNW|UHO$UDúWÕUPDYH6WUDWHML*HOLúWLUPH%DúNDQOÕ÷Õ0DUW ho$\OÕN3D]DU9HULOHUL5DSRUX>dHYULPLoL@%D÷ODQWÕDGUHVL http://www.tk.gov.tr/kutuphane_ve_veribankasi/pazar_verileri/ucayli k13_1.pdf [2] %DQNDODUDUDVÕ .DUW 0HUNH]L +D]LUDQ +D]LUDQ $\OÕN %OWHQL >dHYULPLoL@ %D÷ODQWÕ DGUHVL http://www.bkm.com.tr/basin/bultenler/aylik_bulten_052013.pdf [3] ,78 ,&7 )DFW )LJXUHV >dHYULPLoL@ %D÷ODQWÕ DGUHVL http://www.itu.int/en/ITUD/Statistics/Documents/facts/ICTFactsFigures2013.pdf [4] T. Fredriksson (2013,Nisan). E-commerce and Development Key Trends and Issues [Sunum]. %D÷ODQWÕ DGUHVL http://www.wto.org/english/tratop_e/devel_e/wkshop_apr13_e/fredrik sson_ecommerce_e.pdf [5] CMU-CERT (1997,Ekim). Denial Of Service Attacks >dHYULPLoL@ %D÷ODQWÕDGUHVLhttp://www.cert.org/tech_tips/denial_of_service.html [6] Neustar (2013,Nisan). 2012 Annual DDOS Attack and Impact Survey: A Year-to-Year AnalyVLV >dHYULPLoL@ %D÷ODQWÕ DGUHVL http://www.neustar.biz/enterprise/docs/whitepapers/ddosprotection/2012-ddos-attacks-report.pdf [7] M. Prince (2012(\OO+RZWROXQFKD*ESV DDoS, and How to 6WRS 2QH >dHYULPLoL@ %D÷ODQWÕ DGUHVL http://blog.cloudflare.com/65gbps-ddos-no-problem [8] US-CERT (2013,Mart). Alert (TA13-088A) DNS Amplification DWWDFNV >dHYULPLoL@ %D÷ODQWÕ DGUHVL http://www.uscert.gov/ncas/alerts/TA13-088A [9] 3 0RFNDSHWULV .DVÕP 'RPDLQ 1DPHV – Concepts and )DFLOLWLHV >dHYULPLoL@ %D÷ODQWÕ DGUHVL http://tools.ietf.org/html/rfc882 [10] Douglas Brian Terry, Mark Painter, David W. Riggle and Songnian Zhou, The Berkeley Internet Name Domain Server, Proceedings USENIX Summer Conference, Salt Lake City, Utah, Haziran1984, Sayfa 23-31. [11] D. Atkins, R $XVWHLQ $÷XVtos). Threat Analysis of the Domain Name System (DNS) >dHYULPLoL@ %D÷ODQWÕ DGUHVL http://tools.ietf.org/html/rfc3833 [1] Sunucu Bind 9.3.x Bind 9.5.x Bind 9.7 Dns masq MS-IIS 6UP Yok 6D\Õ 28 24 2 7 2 424 ùHNLO ¶GD g]\LQHOHPH\H DoÕN '16 VXQXFXODUÕQ WHVSLW HGLOHQ'16VUPOHULQLQ\]GHOHUL J|VWHULOPHNWHGLU V. 6218d %X oDOÕúPDGD ..7&¶GH IDDOL\HW J|VWHUHQ ELUL NDPX toplamGD VHNL] DGHW E\N øQWHUQHW 6HUYLV 6D÷OD\ÕFÕ D÷ÕQD GDKLO RODQ ,3 QXPDUDVÕ ]HULQGH 'D÷ÕWÕN '16 *oOHQGLUPH 6DOGÕUÕVÕQD \DUGÕPFÕ RODELOHFHN g]\LQHOHPHOL '16oD÷UÕVÕQDDoÕN'16VXQXFXODUÕWHVSLWHGLOPLúWLUTespit edilen |]\LQHOHPH\H DoÕN DNS sunuculDUÕ KHU QH NDGDU GD EWQLoLQGH¶OLNELURUDQGDROVD da, EXFLKD]ODUÕQKHUELUL ]HULQGHQ EHOLUOHQPLú ELU NXUEDQD GR÷UX 0ESV VDOGÕUÕ \DSÕODELOLUVH, NXUEDQ ]HULQGH \DNODúÕN 0ESV¶OLN ELU 'D÷ÕWÕN 6HUYLV (QJHOOHPH 6DOGÕUÕVÕ JHUoHNOHúWLULOHELOLU %X b\NONWH JHUoHNOHúWLULOHELOHFHN ELU VDOGÕUÕ FR÷UDI\DPÕ]GD oR÷XúLUNHWYHNXUXPXQEDúHGHPH\HFH÷LELUWUDILNPLNWDUÕQÕ ifade etmektedir. 'L÷HU \DQGDQ |]\LQHOHPH\H DoÕN '16 sistemlerinin, QH WU FLKD]ODU ROGXNODUÕ JHOLúWLULOHQ ELU EHWLN ile tespit edilmeye oDOÕúÕOPÕúWÕU dDOÕúPDQÕQ G|UGQF E|OPQGH D\UÕQWÕODUÕ GD YHULOGL÷L ]HUH |]\LQHOHPH\H DoÕN '16 VXQXFXODUÕQ oRN E\N ELU NÕVPÕ |Q WDQÕPOÕ RODUDN GÕúDUÕ GR÷UX '16 oD÷UÕVÕQD L]LQ YHUHQ J|PO VLVWHPOHUGLU %XQODUÕQ GÕúÕQGD NDODQ '16 VXQXFXODUÕ LVH RSHUDW|UOHU WDUDIÕQGDQ\DQOÕúRODUDN\DGDJHUHNVLQLPGHQGROD\Õ Proceedings/Bildiriler Kitabı \DSÕODQGÕUÕOPÕú VXQXFXODUGÕU %X VDOGÕUÕ WUQQ EDúDUÕOÕ ROPDPDVÕLoLQDOÕQDFDNELULQFL|QOHP, RSHUDW|UOHULQNHQGLD÷ DGUHVOHULQL WDúÕPD\DQ DQFDN NHQGL D÷ODUÕQGDQ ND\QDNODQDQ D÷ WUDILNOHULQL HQJHOOHPHOHUL LNLQFLVL LVH RSHUDW|UOHU WDUDIÕQGDQ VRQ NXOODQÕFÕODUD VDWÕODQ \DGD YHULOHQ FLKD]ODUÕQ \DSÕODQGÕUPD \DSÕOÕUNHQ \HUHO D÷ GÕúÕQGD '16 VRUJXODUÕQD FHYDSYHUPHVLQLQHQJHOOHQPHVLLOHRODFDNWÕU 86 20-21 September /Eylül 2013 | Ankara / TURKEY 6th INTERNATIONAL INFORMATION SECURITY & CRYPTOLOGY CONFERENCE 6. ULUSLARARASI %é/*é*µ9(1/éçéYH.5é372/2-é .21)(5$16, [12] R. Vaughn, G. Evron (2006). “DNS amplification attacks,”. >dHYULPLoL@ %D÷ODQWÕ DGUHVL http://www.isotf.org/news/DNSAmplification-Attacks.pdf [13] CMU-CERT (1998,Ocak). Alert (CA-1998-01) Smurf IP Denial-of6HUYLFH $WWDFNV >dHYULPLoL@ %D÷ODQWÕ DGUHVL http://www.cert.org/advisories/CA-1998-01.html [14] % 0F&DUW\ ³%RWQHWV ELJ DQG ELJJHU´ Security & Privacy, IEEE (Volume:1 , Issue: 4 ), s. 87-90, Haziran-$÷XVWRV 2003. [15] P. Vixie, $÷XVWRV “Extension mechanisms for DNS ('16´ 5)&- >dHYULPLoL@ %D÷ODQWÕ DGUHVL http://www.ietf.org/rfc/rfc2671.txt [16] S. Changhua, L. Bin, S. Lei, "Efficient and low-cost hardware defense against DNS amplification attacks," in Proc. IEEE Global 7HOHFRPPXQLFDWLRQV&RQI*/2%(&20 $UDOÕNSS-5. [17] G. F. Lyon. “Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning” Insecure, 2009. [18] S.Woolf, D. Conrad (2007, Haziran). Requirements for Mechanism ,GHQWLI\LQJ D 1DPH 6HUYHU ,QVWDQFH >dHYULPLoL@ %D÷ODQWÕ DGUHVL http://tools.ietf.org/html/rfc4892 Devrim Seral \ÕOÕQGD .ÕEUÕV¶ÕQ /HINRúD úHKULQGH GR÷GX /LVDQV H÷LWLPLQL$QNDUD¶GDEXOXQDQ*D]LhQLYHUVLWHVL7HNQLN(÷LWLP)DNOWHVLQGH \ÕOÕQGD WDPDPODGÕNWDQ VRQUD D\QL QLYHUVLWHQLQ )HQ %LOLPOHUL (QVWLWVQGHQ \ÕOÕQGD 0DVWHU YH \ÕOÕQGD 'RNWRU XQYDQODUÕQÕ DODUDN PH]XQ ROGX 'RNWRUD H÷LWLPLQL VUGUG÷ VÕUDGD D\QÕ ]DPDQGD özel seNW|UGH ELOLúLP DODQÕQGD 6LVWHP 0KHQGLVL YH øQWHUQHW 0KHQGLVL RODUDN oDOÕúWÕ ùXEDW D\ÕQGD 8OXVODUDUDVÕ .ÕEUÕV hQLYHUVLWHVL 0KHQGLVOLN )DNOWHVLQGH |÷UHWLP J|UHYOLVL RODUDN DNDGHPLV\HQOLN KD\DWÕQD JHUL G|QG ùX DQGD D\QL QLYHUVLWHQLQ %LOLúLP 6LVtemleri 0KHQGLVOL÷LE|OPEDúNDQOÕ÷ÕQÕVUGUPHNWHGLU 'U6HUDOøúOHWLP6LVWHPOHUL<N'HQJHOHPH$÷JYHQOL÷LJLELNRQXODUGD oDOÕúPDNWD YH D\QL ]DPDQGD $VVRFLDWLRQ IRU &RPSXWLQJ 0DFKLQHU\ YH ,(((\HVLGLU 20-21 September /Eylül 2013 | Ankara / TURKEY 87 Proceedings/Bildiriler Kitabı
Benzer belgeler
KABAN-2 - CEUR
ROGX÷X J|]OHPOHQHQ 1[%UH>@ &/,;>13], RuleML[14,15], ARML[12], Starburst[11], Ariel>@ GHWD\OÕ úHNLOGH DQDOL] HGLOPLúWLU øOJLOL oDOÕúPDODUÕQ DUWÕODUÕ YH
HNVLOHULLUGHOHQHUHN.$%$1...
Özgün Bir Şifreleme Algoritması Kullanan Güvenli E
E-SRVWD LúOHPOHUL LoLQ NXOODQÕOPDNWD RODQ *PDLO
Siber Saldırı Hedefleri ve TürNiye`de Siber GüvenliN Stratejisi
øQJLOWHUH¶QLQ VDYXQPD VDQD\LVLQL YH DFLO \DUGÕP \|QHWLPLQL
KHGHI DODQ ELU \D]ÕOÕP VDOGÕUÕVÕ JHUoHNOHúWLULOPLú YH KDIWD
VUH\OH øQJLOL] .UDOL\HW 'RQDQPDVÕQÕQ SHUVRQHOL VLVWHPO...
1 - Klima
%(9QLWHVLELUoL]HOJHJ|VWHULUD\UÕQWÕODUÕ\ODELOJLDOPDNLoLQOWIHQ%(9QLWHVLQLQNDEORúHPDVÕQDEDNÕQ
0HUNH]LX]DNWDQNXPDQGDNXOODQÕOGÕ÷ÕQGDPRQWDMNÕODYX]XQDX\JXQRODUDNQLWH\HED÷OD\Õ...
Yolsuzlukla Mücadelede e-Yönetişim ve Kırgızistan
úúRODUDNGH÷HUOHQGLULOPHNWHGLU
Lokasyon Tabanlı Mobil Kampus Uygulaması ve - CEUR
JHOLúWLUPHRUWDPÕNXOODQÕODUDN5(67IXOprotokolünü kullanan servisler bulunup kullaQÕOPÕúWÕUVXQXFXWDUDIÕQGDJava programlama GLOLED]OÕ1HWEHDQV,'(LOHNDPSVZHE
servislerinin KD]ÕUODQPDVÕLú...
AES BloN Şifresinin Anahtar Genişletme Rutininin Geliştirilmesi ve
olarDN 7DEORODUGD NXOODQÕODQ WP LNLOL GH÷HUOHU hexadecimal
(h DOW VLPJHVL LOH J|VWHULOPLúWLU VD\Õ VLVWHPL LOH WHPVLO
edilmektedir.
Donanımsal Truva Atı Tespiti EtNinliN Analizi
7/¶ye ve \DSÕODQ LúOHP PLNWDUÕQÕQ GD PLO\RQX EXOPDVÕ
beklenmektedir [2]. 'Q\DQÕQ GL÷HU ONHOHULQGH GH ,78
(International Telecommunication Union) verilerinHJ|UH
PLO\DU NLúLQL...