Muhsin Aldemir : Social Network Analysis of Malicious Websites for Detection and Characterization

Msc. Candidate: Muhsin Aldemir

Program: Information Systems

Date: 02.09.2019 15:30 p.m

Place: A-108

Abstract: Malicious websites pose major risks to users and businesses including economic damages, privacy breaches and loss of valuable data. Malicious actors use websites as a spreading medium for their motives. Analyzing the relationships between malicious websites and comparing them to benign ones can help understand the problem better, and enable detection and prevention of these websites more accurately. This thesis focuses on detection and characterization of malicious websites using Social Network Analysis (SNA). SNA provides powerful methodologies for discovering and visualizing the relationships between actors. By utilizing the links in between and among malicious and benign websites, graphs were constituted, whose nodes were websites and ties were hyperlinks between them. For this purpose, the data which included the snapshot of the pairwise links amongst millions of websites, the list of malicious websites and their types were obtained from the web. First, the same size networks of malicious and benign websites were characterised and compared using their descriptive properties. Then, using these networks new analyses were carried out to determine malicious websites and their types based on their network structures and link similarities. Results were presented showing the detection accuracies of applied methods.

Announcement Category

Multimedia Informatics 2nd Group PhD and MS Programs Interview Announcement

Related to the applications made to the Department of Modelling and Simulation Multimedia Informatics PhD and MS Programs for 2019-2020 Acadeic Year Fall Term, 2nd group interviews will be held on Tuesday, September 3, 2019.

Candidates listed below are expected to be present in front of Classroom II-01 (S-01) 15 minutes before of their scheduled time of interview.

 

SIRA NO

ADI

SOYADI

MÜLAKAT SAATİ

PROGRAM

1

Faraz

Badalı Naghadeh

10.00

Yüksek Lisans

2

Murat

Balcı

10.15

3

Damla Kıvılcım

Demir

10.30

4

Alperen

İnci

10.45

5

Osman

Kayataş

11.00

6

Bağışcan

Üzmez

11.15

7

Volkan

Pehlivan

11.30

8

Ayhan

Taşyurt

11.45

9

Kemal Aytuğ

Temizöz

12.00

10

Abbas

Türkoğlu

12.15

11

Muhammed Faruk

Uğurcalı

13.30

12

Burak

Kök

13.45

1

Nevin

Eryılmaz

14.00

Doktora

2

Nazire Merve

Önder

14.15


  

Announcement Category

Samet Albayrak , Semantic/Pragmatic Processing in Turkish Propositional Attitude Verbs: The Case of "Zannet"

Investigation of the Theory of Mind was conducted in a verbal setting. This setting is constructed with help of some cognitive propositional attitude verbs (bil, düşün, and zannet) because they are used for referring to mental states as ToM is used for inferring mental states. In addition to the evaluation of verbs, participants’ ability to process pragmatic inferences were measured and these two sets of data were investigated for any relationship between them.

Date: 09.09.2019 / 10:00 Place: A-108

English

Ahmet Serhat Demir : A Fully Decentralized Framework for Securely Sharing Digital Contents

Msc. Candidate: Ahmet Serhat Demir

Program: Cyber Security

Date: 04.09.2019 15:00 p.m

Place: A-212

Abstract: Blockchain technology is first known as the secure, immutable, distributed public ledger of the Bitcoin network, which enables value transfer without the need of a trusted third party. Besides cryptocurrencies and finance, blockchain technology has the potential to disrupt several industries, which is made possible with the advance of the smart contracts and decentralized applications. This thesis explores the blockchain technology, Ethereum smart contracts, and investigates the potential of Ethereum Web 3.0 stack for secure information and file sharing in a fully decentralized architecture. It is aimed to discard the need of a central authority in every layer of the application, and cope with the drawbacks of centralized content exchange platforms. Accordingly, a proof-of-concept of a decentralized application is designed. This design is implemented in Ethereum Web 3.0 stack using blockchain for the immutable distributed ledger, Ether for cash transfers, and smart contracts for application logic. Since data storage in blockchain is expensive, Swarm is used for decentralized reliable content storage system. Nevertheless, according to our research, permissionless systems in the Ethereum ecosystem lack necessary data privacy, which causes a risk for secure information exchange. In order to provide a secure way of content exchange, public key encryption is utilized to enable sensitive content delivery without the need of a pre-shared secret. Also, to protect both buyer and seller, a double escrow functionality is implemented. According to the validation and evaluation of our proof-of-concept, we successfully show that Ethereum Web 3.0 stack is applicable for securely sharing digital contents.

Announcement Category

Burak Çelik : OPTIMIZATION OF ADVANCED ENCRYPTION STANDARD (AES) ON CUDA

Msc. Candidate: Burak Çelik

Program: Cyber Security

Date: 04.09.2019 14:00 p.m

Place: A-212

Abstract: This thesis presents several optimization techniques of AES implementations on CUDA. 6 different CUDA kernels are implemented for AES-128 exhaustive search with different software designs and they are compared with each other using Nsight experiment results. Outcome of these results are used for finding the best CUDA implementation and from it, AES-128, AES-192 and AES-256 versions are created for exhaustive search, on the fly CTR and file encryption. They are compared with CPU implementations in order to decide whether GPU or CPU is the fastest considering these topics. For this comparison, two different type of CPU implementations are created which are AES-NI, using new instruction set of Intel, and basic C++. 1, 2, 4 and 8 threads versions of these implementations are compared with CUDA and results are shared. According to them, CUDA is 21, 19 and 18 times faster than the best CPU implementations for exhaustive search with respect to key length. These ratios are 4 times for CTR implementations in which 37.52 GBs of data can be encrypted each second while using CUDA. File encryption for CUDA is 22, 19 and 17 times faster than the best CPU implementations. CUDA can encrypt 31.24 GBs of data per second in this regard without considering I/O operations.

Announcement Category

Meriç Kınalı, Leveraging The Human Kinome for Anticancer Agent Cytotoxicity Potency Prediction

In this study, we presented a regression model, which was applied on cytotoxic bioactivity data obtained from HCC cells (from CanSyL dataset). Our objective was to predict off-target effects as potential new targets by regularizing the regression space based on the kinome tree topology. Our model was tested on the CanSyL dataset by applying LOOCV and achieved promising predictions. Then we scaled up our approach to the public datasets (CCLE and GDSC). Some kinase inhibitors were identified as outliers based on their individual RMSE. This difference suggests that outlier inhibitors are more specific inhibitors while non-outlier inhibitors are mostly multi-kinase inhibitors.

Date: 06.09.2019 / 10:00 Place: A-108

English

Cognitive Sciences PhD Program 2nd Group Interviews Announcement

Related to the applications for Cognitive Sciences PhD Program in 2019-2020 Academic Year Fall Term, 2nd group interviews will be held on Tuesday, September 3, 2019.

Candidates whose names are listed below are expected to be ready in front of Informatics Classroom II-03 at 10:00 AM.

Lejla Hasandecic-Dapo

Aida Ben Halima

Announcement Category

Department of Information Systems Graduate Programs 2nd Group Interviews Announcement

Related to the 2019-2020 Fall applications for Information Systems (MS/PhD) programs:

Interviews for MS and PhD in Information Systems will be held on August 29, 2019.

Note: Candidates who attended to interviews on June 27/28 don’t have obligation to attend the interview again.

Candidates listed below are expected to be present at II-02 and II-03.

            August 29, Thursday                 

14:00-16:00,  Class: II-02

  Surname

Name

AKYÜZ

MEHMET BERKTAY

BODUR

AHMET

DEMİR

EBUBEKİR

ERSOY

GÖKHAN

GENÇ

YASİN

GÜNGÖR

EDA CEREN

KORUK

TALHA

KÖKSAL

ASİYE TUBA

METO

SERPİL

ÖNDER

NAZIRE MERVE

ŞENGÜL

ZAFER

ULUOGLAKCI

CEM

UZUN

YILDIZ

August 29, Thursday 09:30-13:00,          Class: II-02 and II-03

Surname

Name

AKAR

SALİH

AKDOĞANBULUT

HANİFE

AKSOY

ONUR

ALATAŞ

ŞÜKRÜ

AVCI

FİKRET

AVCİ

CAN

AYDOĞDU

ŞÜKRÜ SİNAN

BALTACI

SENEM

BAYRAMÇAVUŞ

ALİ

BAYTEMİR

SADETTİN BURAK

BEKTAS

BARIŞ CEM

BİTLİSLİ ERDİVAN

HALİME EDA

CAMCI

NİLAY

COŞAR

İSMAİL YİĞİT

ÇAKICI

UĞUR

ÇELEBİ

ÖMER

ÇİFTÇİ

AHMET FURKAN

ÇİLEK

MUHAMMET FATİH

DİNÇ

DENİZ GÖRKEM

DİNÇER

ENES

DOĞANAY

DOĞAN

DURDURAN

MELİKE

EROFEEVA

IRİNA

ERSOY

ARDA ATACAN

FATİH

ŞENGÜL

GORMEZOGLU

MEHMET MELİH

GÖKDEMİR

ALİ

GÖKSU

DOĞUKAN

GURALLAR

MEHMET EGEMEN

GÜLBURUN

SERCAN

GÜNAYDIN

GÖKÇE

GÜNER

İREM

GÜNEŞ

HAKAN

GÜRCAN

MEHMET

GÜREŞÇİ

SEMİH

GÜVEN

ALİ

HASELTALAB

VAHID

İNCİ

ALPEREN

İYMEN

GÖKÇE

KAHRAMAN

ALKAN

KANICIOĞLU

ERDEM

KAPKİÇ

AHMET

KATIRCI

DUYGU

KIZILDAĞ

ARİF OZAN

KOCADAĞ

ŞEVKİ

KOÇ

MUSTAFA ONUR

KORKMAZ

SİNAN EMİR

KOYUNCU

MUSTAFA BEDİRHAN

MAHNAMFAR

AMİN

NAMAL

EREN KAĞAN

OKUR

CELİL

ORMAN

HASAN UMUT

ÖNEY

ÖZGÜR

ÖZKAN

ÖZGÜN

PEKER

OĞUZHAN

SEVİNÇ

ÇAĞLAR

SİVCAN

ZİŞAN

ŞİMŞEK

BUSE

TAŞ

CANER

TAŞYURT

AYHAN

TEKDAŞ

HÜSEYİN OKAN

TERZİOĞLU

ARİF CAN

TUNCER

MERVE

UĞURCALI

MUHAMMET FARUK

ÜZMEZ

BAĞIŞCAN

YILMAZ

MAHMUT

YILMAZ

DENİZCAN

YİĞİT

DİDEM

YURDAKUL

GÖKAY

ZEGLAM

MOHAMED


Announcement Category

Oğuzcan Ergün, Developing Building Information Modelling Based Virtual Reality and Mixed Reality Environments for Architectural Design and Improving User Interactions with Serious Games

In the first part of this thesis, a BIM based architectural visualization and design tool is developed for VR, MR and PC environments. BIM provides detailed information and tools to professionals so that they can develop and manage buildings and infrastructures efficiently. In the second part of this thesis, two tutorial-like serious games, based on VR and MR environments, are developed to improve the users’ overall experience and to ease the user interactions in virtual environments. The developed tool and the serious games were tested by architects and game developers, and were evaluated from presence, usability, and technology acceptance perspectives.

Date: 29.08.2019 / 16:00 Place: A-212

English

Atıl İlerialkan, Speaker and Posture Classification Using Instantaneous Acoustic Features of Breath Signals

Features extracted from speech are widely used for problems such as biometric speaker identification, but the use of speech data raises concerns about privacy. We propose a method for speech and posture classification using only breath data. The acoustical information was extracted from breath instances using the Hilbert-Huang transform and fed into our CNN-LSTM network for classification. We also created our publicly available dataset, BreathBase, which contains more than 4600 breath instances of 20 participants in 5 different postures with 4 different microphones. Using this data, 56% speaker classification and 96% posture classification accuracy is obtained.

Date: 02.09.2019 / 11:00 Place: A-212


English

Pages

Subscribe to Graduate School of Informatics RSS