no code implementations • 16 Feb 2024 • Sarah Al-Shareeda, Sema F. Oktug, Yusuf Yaslan, Gokhan Yurdakul, Berk Canberk
These findings provide insights for efficient vehicular communication and underscore the potential of virtual twins in enhancing vehicular networks in crowded areas while emphasizing the importance of considering real-world factors when making deployment decisions.
no code implementations • 1 Feb 2024 • Kiymet Kaya, Elif Ak, Sumeyye Bas, Berk Canberk, sule gunduz oguducu
The effectiveness of Intrusion Detection Systems (IDS) is critical in an era where cyber threats are becoming increasingly complex.
no code implementations • 1 Feb 2024 • Elif Ak, Kiymet Kaya, Eren Ozaltun, sule gunduz oguducu, Berk Canberk
Addressing this gap, our study introduces a novel approach for Black Hole detection in backbone networks using specialized Yet Another Next Generation (YANG) data models with Black Hole-sensitive Metric Matrix (BHMM) analysis.
no code implementations • 28 Jan 2024 • Lal Verda Cakir, Kubra Duran, Craig Thomson, Matthew Broadbent, Berk Canberk
This is caused by the lack of right-time data capturing in traditional approaches, resulting in inaccurate modelling and high resource and energy consumption challenges.
no code implementations • 24 Nov 2023 • Kubra Duran, Matthew Broadbent, Gokhan Yurdakul, Berk Canberk
Within the proposed DT-native architecture, we implement a TCP-based data flow pipeline and a Reinforcement Learning (RL)-based learner model.
no code implementations • 19 Oct 2023 • Yagmur Yigit, Bahadir Bal, Aytac Karameseoglu, Trung Q. Duong, Berk Canberk
Our contributions are three-fold: we first design a DDoS detection architecture based on the digital twin for ISP core networks.
no code implementations • 19 Oct 2023 • Emre Horsanali, Yagmur Yigit, Gokhan Secinti, Aytac Karameseoglu, Berk Canberk
As the current detection solutions of distributed denial of service attacks (DDoS) need additional infrastructures to handle high aggregate data rates, they are not suitable for sensor networks or the Internet of Things.
no code implementations • 19 Oct 2023 • Yagmur Yigit, Omer Kemal Kinaci, Trung Q. Duong, Berk Canberk
We show that under simultaneous internal and external attacks on the system, our solution successfully detects internal and external attacks.