{"id":5840,"date":"2019-04-05T13:48:53","date_gmt":"2019-04-05T10:48:53","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=5840"},"modified":"2022-05-05T14:25:24","modified_gmt":"2022-05-05T11:25:24","slug":"adaptive-anomaly-control-kesb","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/adaptive-anomaly-control-kesb\/5840\/","title":{"rendered":"\u0130\u015f istasyonlar\u0131n\u0131 koruma: Gere\u011finden fazla \u00f6zellik engellememek i\u00e7in ne yapabilirsiniz?"},"content":{"rendered":"<p>Siber su\u00e7lular i\u015f istasyonlar\u0131na nas\u0131l sald\u0131r\u0131r? Genellikle s\u0131k\u00e7a kullan\u0131lan programlardaki g\u00fcvenlik a\u00e7\u0131klar\u0131ndan veya potansiyel olarak tehlikeli \u00f6zelliklerden yararlan\u0131rlar. Siber su\u00e7lular bunlarla kalmaz, farkl\u0131 yollardan da faydalan\u0131r. Bunlar yaln\u0131zca kulland\u0131klar\u0131 en yayg\u0131n taktikler. Bu y\u00fczden, bu t\u00fcr yaz\u0131l\u0131mlar\u0131n kullan\u0131m\u0131n\u0131 k\u0131s\u0131tlamak mant\u0131kl\u0131 g\u00f6r\u00fcnebilir. Fakat bunu i\u015f s\u00fcre\u00e7lerine zarar vermeden nas\u0131l yapabilirsiniz? Yaz\u0131l\u0131m\u0131 dikkatsiz bir \u015fekilde engellemek i\u015finize ciddi zararlar verebilir; \u00e7al\u0131\u015fanlar\u0131n rollerindeki farkl\u0131l\u0131klar\u0131 g\u00f6z \u00f6n\u00fcnde bulundurman\u0131z gerekir. Yakla\u015f\u0131m\u0131m\u0131z, makine \u00f6\u011frenimi tekniklerini kullanarak uyarlanabilir anormallik kontrol\u00fc yoluyla sald\u0131r\u0131 y\u00fczeyini azaltmakt\u0131.<\/p>\n<p>MS Office uzun y\u0131llard\u0131r, g\u00fcvenlik a\u00e7\u0131klar\u0131ndan faydalan\u0131lan yaz\u0131l\u0131m olma konusunda ba\u015f\u0131 \u00e7ekerek olduk\u00e7a k\u00f6t\u00fc bir unvana sahip olmu\u015ftur. Ancak bu durum, yaz\u0131l\u0131m\u0131n kendisinin k\u00f6t\u00fc oldu\u011fu anlam\u0131na gelmez. G\u00fcvenlik a\u00e7\u0131klar\u0131 her yerdedir. MS Office\u2019in bu unvan\u0131 almas\u0131n\u0131n temel sebebi, kendisiyle ayn\u0131 kulvarda yer alan yaz\u0131l\u0131mlardan \u00e7ok daha yayg\u0131n olarak kullan\u0131lmas\u0131 ve bunun neticesinde siber su\u00e7lular taraf\u0131ndan \u00e7ok daha fazla tercih edilmesidir. \u015eirketiniz alternatif bir \u00e7\u00f6z\u00fcm kullanmak i\u00e7in \u00e7al\u0131\u015fanlar\u0131n\u0131 yeniden e\u011fitmek ad\u0131na b\u00fct\u00e7e ay\u0131rmaya istekli olsa bile farkl\u0131 bir verimlilik paketi pop\u00fclerlik kazan\u0131r kazanmaz Office, g\u00fcvenlik a\u00e7\u0131klar\u0131ndan yararlan\u0131lan yaz\u0131l\u0131mlar aras\u0131ndaki liderli\u011fini kaybedecektir.<\/p>\n<p>Baz\u0131 \u00fcr\u00fcnler a\u00e7\u0131k\u00e7a tehlikeli \u00f6zelliklere sahiptir. \u00d6rne\u011fin, ayn\u0131 Office yaz\u0131l\u0131m\u0131ndaki makrolar k\u00f6t\u00fc ama\u00e7l\u0131 kod y\u00fcr\u00fctmek i\u00e7in kullan\u0131labilir. Ancak bunlar\u0131 tamamen engellemek mant\u0131kl\u0131 bir se\u00e7im olmaz; finansal analistler ve muhasebeciler bu ara\u00e7lara g\u00fcnl\u00fck i\u015flerinde ihtiya\u00e7 duymaktad\u0131r.<\/p>\n<p>Ama\u00e7, bir \u015fekilde bu programlar\u0131 \u00e7ok s\u0131k\u0131 takip etmek ve sadece anormal bir hareket tespit edildi\u011finde m\u00fcdahale etmektir. Ancak bir sorun var.<\/p>\n<h3>Anormalli\u011fi nas\u0131l tan\u0131mlars\u0131n\u0131z?<\/h3>\n<p>Siber su\u00e7 etkinliklerinin \u00f6z\u00fc, g\u00fcvenlik sistemlerine yasal g\u00f6r\u00fcnmelerinde yatar. Bir siber g\u00fcvenlik sistemi, bir \u00e7al\u0131\u015fana g\u00f6nderilen bir mesaj\u0131n makro veya Truva at\u0131 i\u00e7eren \u00f6nemli bir belge i\u00e7erip i\u00e7ermedi\u011fini nas\u0131l belirleyebilir? Acaba o ki\u015fi .js dosyas\u0131n\u0131 i\u015f ama\u00e7l\u0131 m\u0131 g\u00f6nderdi yoksa dosya vir\u00fcs m\u00fc i\u00e7eriyor?<\/p>\n<p>En az\u0131ndan teoride, her \u00e7al\u0131\u015fan\u0131n \u00e7al\u0131\u015fmas\u0131n\u0131 manuel olarak analiz etmek, hangi ara\u00e7lara ihtiya\u00e7 duyduklar\u0131n\u0131 ve hangilerine duymad\u0131klar\u0131n\u0131 tespit etmek ve bu bilgilere dayanarak bir tehdit modeli olu\u015fturmak ve belirli program \u00f6zelliklerini profesyonel bir \u015fekilde engellemek m\u00fcmk\u00fcn olabilir.<\/p>\n<p>Ancak burada say\u0131s\u0131z sorun ortaya \u00e7\u0131k\u0131yor. Birincisi, \u015firket ne kadar b\u00fcy\u00fckse her \u00e7al\u0131\u015fan i\u00e7in do\u011fru bir model olu\u015fturmak da o kadar zor oluyor. \u0130kincisi, k\u00fc\u00e7\u00fck bir i\u015fletmede bile, manuel yap\u0131land\u0131rma y\u00f6neticiler i\u00e7in \u00e7ok fazla zaman ve \u00e7aba gerektiriyor. \u00dc\u00e7\u00fcnc\u00fcs\u00fc, kurumsal altyap\u0131 ya da ara\u00e7lar her de\u011fi\u015ftirildi\u011finde, s\u00fcrecin de tekrarlanmas\u0131 gerekiyor.<\/p>\n<p>Bu durumlar g\u00f6z \u00f6n\u00fcnde bulunduruldu\u011funda, y\u00f6neticilerin ve BT g\u00fcvenlik g\u00f6revlilerinin ak\u0131l sa\u011fl\u0131\u011f\u0131n\u0131 korumak i\u00e7in tek se\u00e7enek, k\u0131s\u0131tlamalar\u0131 yap\u0131land\u0131rma s\u00fcrecini otomatikle\u015ftirmektir.<\/p>\n<h3>Uyarlanabilir kontrol<\/h3>\n<p>Otomatikle\u015ftirme i\u015flemini \u015fu \u015fekilde ger\u00e7ekle\u015ftirdik: \u0130lk ad\u0131mda, makine \u00f6\u011frenimi ilkelerine dayanan sistemler, tehdit veritabanlar\u0131m\u0131z\u0131 tarad\u0131 ve potansiyel olarak zararl\u0131 hareketlerin standart modellerini olu\u015fturdu. Daha sonra, her bir i\u015f istasyonunda bu modellerin kesin olarak engellenmesini sa\u011flad\u0131k.<\/p>\n<p>\u0130kinci ad\u0131mda, kullan\u0131c\u0131 etkinli\u011fini analiz etmek ve hangi kurallar\u0131n uygulanabilece\u011fini ve hangilerinin normal \u00e7al\u0131\u015fmaya m\u00fcdahale edece\u011fini belirlemek i\u00e7in otomatik bir uyarlama modu (ba\u015fka bir deyi\u015fle Ak\u0131ll\u0131 Mod) olu\u015fturduk. Bu mod \u015fu \u015fekilde \u00e7al\u0131\u015f\u0131r: Sistem \u00f6ncelikle \u00f6\u011frenme modunda belirli bir s\u00fcre i\u00e7in kontrol kurallar\u0131n\u0131n tetiklenmesi ile ilgili istatistikleri toplar ve ard\u0131ndan kullan\u0131c\u0131n\u0131n veya grubun normal \u00e7al\u0131\u015fmas\u0131n\u0131n bir modelini olu\u015fturur (yasal senaryo). Daha sonra, \u00f6\u011frenme modu devre d\u0131\u015f\u0131 b\u0131rak\u0131l\u0131r ve yaln\u0131zca anormal eylemleri engelleyen kontrol kurallar\u0131 etkinle\u015ftirilir.<\/p>\n<p>Kullan\u0131c\u0131n\u0131n \u00e7al\u0131\u015fma modelinin de\u011fi\u015ftirilmesi durumunda, sistem \u00f6\u011frenme moduna geri d\u00f6nd\u00fcr\u00fclebilir ve yeni senaryoya uyarlanabilir. Buna ek olarak, istisnalar\u0131n eklenmesi gerekti\u011finde ince ayar se\u00e7ene\u011fi de bulunmaktad\u0131r.<\/p>\n<p>Bu her \u015feyin \u00e7\u00f6z\u00fcm\u00fc de\u011fildir, ancak olas\u0131 sald\u0131r\u0131lar\u0131n etkileyebilce\u011fi y\u00fczeyi \u00f6nemli \u00f6l\u00e7\u00fcde azalt\u0131r.<\/p>\n<p>Adaptive Anomaly Control (Uyarlanabilir Anormallik Kontrol\u00fc) (AAC) mod\u00fcl\u00fc, yak\u0131n zamanda genel olarak kamuoyuna sundu\u011fumuz g\u00fcncellenmi\u015f <a href=\"https:\/\/go.kaspersky.com\/TR_Trial_Advanced_SOC.html?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=tr_kesbkb_ey0081_organic&amp;utm_content=link&amp;utm_term=tr_kdaily_organic_ey0081_link_blog_kesbkb\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Endpoint Security for Business Advanced<\/a> \u00e7\u00f6z\u00fcm\u00fcn\u00fcn bir par\u00e7as\u0131n\u0131 olu\u015fturmaktad\u0131r. Bu teknolojinin uyguland\u0131\u011f\u0131 g\u00fcvenlik \u00fcr\u00fcn\u00fcn\u00fcn deneme s\u00fcr\u00fcm\u00fcn\u00fc indirmek i\u00e7in a\u015fa\u011f\u0131daki ba\u015fl\u0131\u011fa t\u0131klay\u0131n.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial-leadgen\">\n","protected":false},"excerpt":{"rendered":"<p>Siber su\u00e7lular i\u015f istasyonlar\u0131na nas\u0131l sald\u0131r\u0131r? Genellikle s\u0131k\u00e7a kullan\u0131lan programlardaki g\u00fcvenlik a\u00e7\u0131klar\u0131ndan veya potansiyel olarak tehlikeli \u00f6zelliklerden yararlan\u0131rlar. Siber su\u00e7lular bunlarla kalmaz, farkl\u0131 yollardan da faydalan\u0131r. Bunlar yaln\u0131zca kulland\u0131klar\u0131 en yayg\u0131n taktikler.<\/p>\n","protected":false},"author":2706,"featured_media":5841,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1194,1727],"tags":[1630,1498,1610,877,1742],"class_list":{"0":"post-5840","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-endpoint","10":"tag-machine-learning","11":"tag-makine-ogrenimi","12":"tag-sistem-aciklari","13":"tag-uc-nokta"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/adaptive-anomaly-control-kesb\/5840\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/adaptive-anomaly-control-kesb\/15553\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/adaptive-anomaly-control-kesb\/13097\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/adaptive-anomaly-control-kesb\/17474\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/adaptive-anomaly-control-kesb\/15622\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/adaptive-anomaly-control-kesb\/14195\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/adaptive-anomaly-control-kesb\/18025\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/adaptive-anomaly-control-kesb\/17038\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/adaptive-anomaly-control-kesb\/22425\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/adaptive-anomaly-control-kesb\/25966\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/adaptive-anomaly-control-kesb\/11520\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/adaptive-anomaly-control-kesb\/11661\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/adaptive-anomaly-control-kesb\/10472\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/adaptive-anomaly-control-kesb\/18749\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/adaptive-anomaly-control-kesb\/22796\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/adaptive-anomaly-control-kesb\/18122\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/adaptive-anomaly-control-kesb\/22405\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/adaptive-anomaly-control-kesb\/22341\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/endpoint\/","name":"Endpoint"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/5840","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2706"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=5840"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/5840\/revisions"}],"predecessor-version":[{"id":6811,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/5840\/revisions\/6811"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/5841"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=5840"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=5840"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=5840"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}