Research Article

TYPOLOGIES OF CRIME IN CYBER SPACE AND ANALYSIS OF CYBER COMMUNICATION BASED ANALYSIS MODEL

Volume: 27 Number: 4 December 3, 2024
EN TR

TYPOLOGIES OF CRIME IN CYBER SPACE AND ANALYSIS OF CYBER COMMUNICATION BASED ANALYSIS MODEL

Abstract

The rapid transformation of Internet-based network technologies increases the participation of individuals in virtual environments day by day. The internet environment is also used extensively by individuals who aim to illegally obtain other people's data. In the cyber world, the problematic of acquisition behavior and piracy is shifting from physical to digital spaces. In this study, query monitoring was carried out through the customized Domain Name System introduced against illegal transactions in cyberspace. During the implementation process, queries and other analyses were tracked using a one-month set of fully measured and precise data streams. Follow content primarily conducted through the application specified in the scope of the analysis for filtering, filtering in the list according to the analysis of a total of 64, 48 foreign filter (%87,3) Turkish as a filter 7 units (%12,7), and 9 common feature filters which filter typology emerges. Regarding the query; four basic value systems have been created and the system has been created in the form of the Number of Domain Name System Queries, the Number of Obstacles, Malware and Phishing, and Adult Content Sites. In the study, the levels of crime typologies are statistically analyzed through IP and DNS samples over the relevant directive.

Keywords

Thanks

Y.MÜH.VEDAT FETAH

References

  1. Abdüsselam, M. S., Burnaz, E., Ayyıldız, H., & Demir, İsmail K. (2015). web teknolojilerinin e-ticaret ortamlarında kullanımı ile ilgili içerik analizi: Türkiye’deki ilk 500 e-tı̇caret sitesi. KTÜ, SBE Sos. Bil. Dergisi, 2015(10), 263-284.
  2. Abide, Ö. F., & Gelişli, Y. (2020). Sosyal bilgiler ders kitaplarının ve öğretim programlarının çocukların güvenli internet kullanımları açısından incelenmesi. JRES, 7(1), 248-269.
  3. Akbanov, M., Vassilakis, V.G., & Logothetis, M.D. (2019). Ransomware detection and mitigation using software-defined networking: The case of WannaCry. Computers & Electrical Engineering, 76, 111-121. https://doi.org/10.1016/j.compeleceng.2019.03.012
  4. Akbulut, Y., Dursun, Ö.Ö., Dönmez, O., & Şahin, Y.L. (2016). In search of a measure to investigate cyberloafing in educational settings. Computers in Human Behavior, 55, 616-625.
  5. Akgün, E. (2022). Güvenli internet ile ilgili tezlerdeki yöntemsel eğilimlerin sistematik incelenmesi. Instructional Technology and Lifelong Learning, 3(1), 64-87. https://doi.org/10.52911/itall.1062981
  6. Akman, T. (1982). bilimler bilimi sibernetik. Karacan Yayıncılık.
  7. Akyüz, A., & Koç, Z. (2020). Empati yönelimli siber zorbalık psiko-eğitim programının lise 9. ve 10. sınıf öğrencilerinin siber zorbalık ve empati düzeylerine etkisi. Gazi Üniversitesi Gazi Eğitim Fakültesi Dergisi, 40(1), 75-111. https://doi.org/10.17152/gefad.695923
  8. Alan, H. (2019). Sosyal ağ kullanımı yoğunluğu ve sanal kaytarma davranışları: Üniversite öğrencileri üzerine bir inceleme. Çağdaş Yönetim Bilimleri Dergisi, 6(2), 112-129. https://dergipark.org.tr/tr/pub/cybd/issue/49666/495333

Details

Primary Language

Turkish

Subjects

Information Systems Development Methodologies and Practice

Journal Section

Research Article

Publication Date

December 3, 2024

Submission Date

May 2, 2024

Acceptance Date

July 22, 2024

Published in Issue

Year 1970 Volume: 27 Number: 4

APA
Aydemir, M. (2024). SİBERUZAMDA SUÇ TİPOLOJİLERİ VE SİBER İLETİŞİM TABANLI ÇÖZÜMLEME MODELİNİN ANALİZİ. Kahramanmaraş Sütçü İmam Üniversitesi Mühendislik Bilimleri Dergisi, 27(4), 1375-1400. https://doi.org/10.17780/ksujes.1477116