About

The aims of the Network and Information Security Laboratory are:

  • To produce solutions to up-to-date network and information security problems and to apply them
  • To train undergraduate students in the field of network and information security
  • To support the studies of graduate students in the field of network and information security
  • To meet the needs of information and resource of undergraduate graduation projects and graduate thesis studies in the field of cyber security
  • To meet the needs of information and resource of undergraduate graduation projects and graduate thesis studies in the field of cyber security
Nislab

Research Areas

Research studies in Nislab are carried out on the following topics:

  • Information security management and applications
  • Security studies in cloud computing
  • Security applications in social networks
  • Security applications in IoT
  • Digital signature research and applications
  • Security applications in wired and wireless networks
  • Biometric security applications
  • Malware analysis and detection
  • Intrusion detection
  • Vulnerability scanning applications
  • Cryptology-based security applications

Projects

October 2022 - February 2025

Developing Multipurpose Malware Detection and Prevention System

Developing a novel malware detection method and implementing it as a software product. This project focuses on metamorphic malware and ransomware.

Project Type: Scientific Research Project (ID: 2022-A-113-03)
Supporter: Gebze Technical University

  • ransomware
  • metamorphic malware
  • malware detection
  • antivirus

October 2017 - October 2019

Developing High Performance and Real time Method for Malware Detection and Implementation for Different Platforms

Developing a novel metamorphic malware detection method and implementing it as a software product.

Project Type: TUBITAK 1003 (ID: 116E539)
Supporter: TUBITAK

  • metamorphic malware
  • malware detection
  • antivirus

November 2008 - November 2010

Hi-AuthMe: Designing An Electronic Signature with Hierarchical Authorization Model and Implementation of The Model on Smart Card Systems

Designing an electronic signature with hierarchical authorization model: Hi-AuthME.

Project Type: TUBITAK 1001 (ID: 108E132)
Supporter: TUBITAK

  • Hi-AuthME
  • electronic signature
  • smart card
  • authorization

2007 - 2009

Designing Information Security Management System Which is Concordant to the International Standards and Application at GIT as a Case Study

Designing a practical and easy Institutional Information Security management System that is suitable to the standards of ISO/IEC 17799 and ISO/IEC 27001.

Project Type: Scientific Research Project (ID: 2007-A-19)
Supporter: Gebze Technical University

  • information security management
  • iso standards
  • isms

Publications

Academic articles published in the last 5 years are listed below.

Gulmez, S., Kakisim, A. G., & Sogukpinar, I. (2024). XRan: Explainable deep learning-based ransomware detection using dynamic analysis. Computers & Security, 139, 103703.

Theses

Theses written in the last 5 years are listed below.

2021

Graph-based malware detection using opcode analysis
Prepared by:Sibel GULMEZ
Advisor:Ibrahim SOGUKPINAR
Thesis Type:Master's Thesis
Language:Turkish


Abstract: With the rapid advancement of the technology and the increase in virtualization, the online security has become questionable. Digital platforms where all kind of information are shared, has become the target of the attackers and the cyber attacks has become a major threat. Malware is one of the most dangerous threats among them. Malware is a software which is written by a cyber attacker to perform unauthorized and dangerous operations. These softwares might perform costly attacks and therefore to detect them is becoming crucial. To detect them, the first step would be to understand the nature of the malware. Through two different analysis method called static and dynamic analysis, it is possible to examine malware and extract distinctive features and patterns. Dynamic analysis requires a real-time analysis and therefore it consumes more time and resource. Static analysis aims to access the source codes of the softwares and feature extracting through them. In this thesis research, opcode sequences of the softwares' are obtained through static analysis and then transformed to the graphs. As a result of the examination made on these graphs, a detection method that based on the degrees of nodes' is proposed. The proposed method is named ZAYCAT. ZAYCAT has a detection rate of up to %98 and it is able to detect packed malware without the need of unpacking.

2021

Smart event analysis and management in information systems
Prepared by:Atahan DUMAN
Advisor:Ibrahim SOGUKPINAR
Thesis Type:Master's Thesis
Language:Turkish


Abstract: Information systems and applications provide indispensable services at every stage of life, enabling us to carry out our activities more effectively and efficiently. Today, information technology systems produce many alarm and event records. These produced records often have a relationship with each other, and when this relationship is captured correctly, many interruptions that will harm institutions can be prevented before they occur. For example, an increase in the disk I/O speed of a server or a problem may cause the business software running on that server to slow down and cause different results in this slowness. Here, an institution's accurate analysis and management of all event records, and rule-based analysis of the resulting records in certain time periods and depending on certain rules will ensure efficient and effective management of millions of alarms. In addition, it will be possible to prevent possible problems by removing the relationships between events. Events that occur in IT systems are a kind of footprint. It is also vital to keep a record of the events in question, and when necessary, these event records can be analyzed to analyze the efficiency of the systems, harmful interferences, system failure tendency, etc. By understanding the undesirable situations such as taking the necessary precautions, possible losses can be prevented. In this study, the model developed for fault prediction in systems by performing event log analysis in information systems is explained and the experimental results obtained are given.

2020

Software behavior modeling and detection by using hybrid features
Prepared by:Mert NAR
Advisor:Ibrahim SOGUKPINAR
Thesis Type:Master's Thesis
Language:Turkish


Abstract: Malware poses a great danger to computers and systems due to their capabilities. They are also affected by the development of effective detection systems and become more dangerous and equipped. Defenders are the most effective weapon analysis tools in this cat and mouse game. In order to develop an automated detection system, malware should be well analyzed, and the development tendencies should be detected correctly. The effects of malicious software on the computer and code structure should be examined in detail and such precautions should be taken. Analysis studies are divided into 2 in the most general sense; static and dynamic analysis. The basis of static analysis is to examine the code and file structure of the software without running it. The underlying philosophy of dynamic analysis is to observe the working moment behavior of the pest and to reveal its effects. Both analysis approaches have advantages and weaknesses. The reason why it is impossible to replace each other is that each analysis technique brings the ability to examine malware from a different angle. In contrast, malware has developed several tactics to avoid analysis techniques. Attackers who are familiar with static and dynamic methods of analysis and work techniques have tactics to circumvent these methods or to create malware to conceal their true intentions. To detect malware, rather than repeating the existing methods, tactics and techniques to prevent them should be well known and taken precautions. In this study, malware structure and behavioral trends are examined. The hiding, hiding, and avoidance analysis tactics applied by malware have been investigated and discussed in detail. In the light of this knowledge and experience, malware detection system has been proposed. The proposed detection system makes a statistical meaning with the Markov chain method using both the behavior and code structure information of the malware. Then, model based on deep learning techniques was trained with hybrid data source and detection environment was prepared. As a result of our tests, the recommended detection method showed an accuracy of 96.8%.

2020

Analysis and detection of advanced social engineering attacks
Prepared by:Seydanur AHI
Advisor:Ibrahim SOGUKPINAR
Thesis Type:Master's Thesis
Language:Turkish


Abstract: Social engineering is the art of getting information (deception) from people with using technology or without using technology. The vast majority of the attacks facing today are human origin, and likewise, these attacks target computer users. Human being who is the weakest link in the security chain shows various weaknesses in the security process, due to human being's variable behavior in different times. Phishing that is a kind of social engineering attack is technically created to capture consumers' financial or personal information. Phishing is the one of the biggest challenges for the e commerce world. Many companies and individuals lose billions of dollars because of phishing attacks. This global impact of phishing attacks will continue to increase, therefore, more effective phishing detection techniques need to be developed to reduce threats. In this regard, various forms of Social Engineering techniques and tactics and how social engineers benefited from human security deficits, to discuss information about the measures to be taken against such attacks, and to identify such attacks, a detection method was proposed. Various deep learning models were trained using the features obtained from the head and body parts of incoming e-mails in the proposed method. As a result of the tests, a 96.84% success rate was achieved with this detection method proposed against phishing attacks.

2019

Unsupervised binary feature construction method for networked data
Prepared by:Arzu KAKISIM
Advisor:Ibrahim SOGUKPINAR
Thesis Type:Doctoral Thesis
Language:Turkish


Abstract: Networked data is data composed of network objects and links. Network objects are characterized by high dimensional attributes and by links indicating the relationships among these objects. However, traditional feature selection and feature extraction methods consider only attribute information, thus ignoring link information. In the presented work, we propose a new unsupervised binary feature construction method (NetBFC) for networked data that reconstructs attributes for each object by exploiting link information. By exploring similar objects in the network and associating them, our method increases the similarities between objects with high probability of being in the same group. The proposed method enables local attribute enrichment and local attribute selection for each object by aggregating the attributes of similar objects in order to deal with the sparsity of networked data. In addition, this method applies an attribute elimination phase to eliminate irrelevant and redundant attributes which decrease the performance of clustering algorithms. Experimental results on real-world data sets indicate that NetBFC significantly achieves better performance when compared to baseline methods.