Please use this identifier to cite or link to this item:
https://hdl.handle.net/20.500.11851/7293
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kaya, Ahmet Selim | - |
dc.contributor.author | Selçuk, Ali Aydın | - |
dc.date.accessioned | 2021-09-11T15:56:17Z | - |
dc.date.available | 2021-09-11T15:56:17Z | - |
dc.date.issued | 2020 | en_US |
dc.identifier.citation | 5th International Conference on Computer Science and Engineering (UBMK) -- SEP 09-11, 2020 -- Diyarbakir, TURKEY | en_US |
dc.identifier.isbn | 978-1-7281-7565-2 | - |
dc.identifier.uri | https://hdl.handle.net/20.500.11851/7293 | - |
dc.description.abstract | This article covers the default security features of MySQL, a very popular open-source database management system, and what types of attacks an attacker can perform after successfully connecting to a database. In this context, it introduces Zephyr, a platform we developed, which automatically performs the types of scanning and attacks caused by incorrect or incomplete security configurations. We demonstrate an analysis of the security of MySQL usage in Turkey over Zephyr. | en_US |
dc.description.sponsorship | IEEE Turkey Sect, Istanbul Teknik Univ, Gazi Univ, Atilim Univ, Dicle Univ, Turkiye Bilisim Vakfi, Kocaeli Univ | en_US |
dc.language.iso | en | en_US |
dc.publisher | IEEE | en_US |
dc.relation.ispartof | 2020 5Th International Conference On Computer Science And Engineering (Ubmk) | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | MySQL attacks | en_US |
dc.subject | post-connection attacks | en_US |
dc.subject | Shodan | en_US |
dc.subject | user defined feature library | en_US |
dc.subject | reverse shell connection | en_US |
dc.subject | system takeover | en_US |
dc.title | Post Connection Attacks in Mysql | en_US |
dc.type | Conference Object | en_US |
dc.department | Faculties, Faculty of Engineering, Department of Computer Engineering | en_US |
dc.department | Fakülteler, Mühendislik Fakültesi, Bilgisayar Mühendisliği Bölümü | tr_TR |
dc.identifier.startpage | 268 | en_US |
dc.identifier.endpage | 273 | en_US |
dc.identifier.wos | WOS:000629055500052 | en_US |
dc.identifier.scopus | 2-s2.0-85095700097 | en_US |
dc.institutionauthor | Selçuk, Ali Aydın | - |
dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
dc.relation.conference | 5th International Conference on Computer Science and Engineering (UBMK) | en_US |
item.openairetype | Conference Object | - |
item.languageiso639-1 | en | - |
item.grantfulltext | none | - |
item.fulltext | No Fulltext | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.cerifentitytype | Publications | - |
crisitem.author.dept | 02.3. Department of Computer Engineering | - |
Appears in Collections: | Bilgisayar Mühendisliği Bölümü / Department of Computer Engineering Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection |
CORE Recommender
WEB OF SCIENCETM
Citations
1
checked on Dec 21, 2024
Page view(s)
58
checked on Dec 23, 2024
Google ScholarTM
Check
Altmetric
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.