{"id":2543,"date":"2021-10-21T11:12:01","date_gmt":"2021-10-21T11:12:01","guid":{"rendered":"https:\/\/bulutistan.com\/blog\/?p=2543"},"modified":"2024-01-20T11:03:30","modified_gmt":"2024-01-20T11:03:30","slug":"ddos-nedir","status":"publish","type":"post","link":"https:\/\/bulutistan.com\/blog\/ddos-nedir\/","title":{"rendered":"DDOS Nedir? DDOS Sald\u0131r\u0131lar\u0131ndan Korunman\u0131n 12 Yolu"},"content":{"rendered":"\r\n<p>Uzmanlar, 2018\u2019de toplam 7,9 milyon olan DDoS sald\u0131r\u0131 say\u0131s\u0131n\u0131n 2023&#8217;e kadar iki kat\u0131na \u00e7\u0131karak 15 milyonu a\u015faca\u011f\u0131na inan\u0131yor. Bu \u00f6nemli art\u0131\u015f\u0131n, DDoS sald\u0131r\u0131lar\u0131n\u0131 ger\u00e7ekle\u015ftirmenin olduk\u00e7a kolay olmas\u0131ndan kaynakland\u0131\u011f\u0131 d\u00fc\u015f\u00fcn\u00fcl\u00fcyor.<\/p>\r\n\r\n\r\n\r\n<div class=\"wp-block-image\">\r\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"650\" height=\"339\" class=\"wp-image-2547 aligncenter\" src=\"https:\/\/bulutistan.com\/blog\/wp-content\/uploads\/2021\/10\/ddos-saldirilarinin-yillara-gore-oranlari.png\" alt=\"Cisco Annual Internet Report\" srcset=\"https:\/\/bulutistan.com\/blog\/wp-content\/uploads\/2021\/10\/ddos-saldirilarinin-yillara-gore-oranlari.png 650w, https:\/\/bulutistan.com\/blog\/wp-content\/uploads\/2021\/10\/ddos-saldirilarinin-yillara-gore-oranlari-300x156.png 300w, https:\/\/bulutistan.com\/blog\/wp-content\/uploads\/2021\/10\/ddos-saldirilarinin-yillara-gore-oranlari-380x198.png 380w, https:\/\/bulutistan.com\/blog\/wp-content\/uploads\/2021\/10\/ddos-saldirilarinin-yillara-gore-oranlari-550x287.png 550w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/figure>\r\n<\/div>\r\n\r\n\r\n\r\n<p>Yap\u0131lan ara\u015ft\u0131rmalar, k\u00fc\u00e7\u00fck i\u015fletmelerin DDoS sald\u0131r\u0131s\u0131 ba\u015f\u0131na 120.000 dolara kadar zarar g\u00f6rebilece\u011fini, kurumsal d\u00fczeyde sald\u0131r\u0131lar\u0131n ise, 2 milyon dolara kadar \u00e7\u0131kabilece\u011fini belirtiyor.<\/p>\r\n\r\n\r\n\r\n<p>T\u00fcm bu rakamlar\u0131 g\u00f6z \u00f6n\u00fcne alarak \u015funu s\u00f6yleyebiliriz ki, DDoS sald\u0131r\u0131s\u0131na u\u011framak i\u00e7in k\u00fc\u00e7\u00fck bir i\u015fletme veya \u00e7ok uluslu b\u00fcy\u00fck bir holding olman\u0131z ger\u00e7ekten \u00f6nemli de\u011fildir, \u00f6l\u00e7e\u011finiz ne olursa olsun \u00e7evrimi\u00e7i hizmetleriniz bir DDoS sald\u0131r\u0131s\u0131 taraf\u0131ndan yava\u015flat\u0131labilir veya tamamen engellenebilir.<\/p>\r\n\r\n\r\n\r\n<h2 id=\"ddos-nedir\" class=\"wp-block-heading\">DDoS Nedir?<\/h2>\r\n\r\n\r\n\r\n<p><strong>DDoS<\/strong> yani <strong>distributed-denial-of-service (da\u011f\u0131t\u0131lm\u0131\u015f hizmet reddi)<\/strong>, \u00e7evrimi\u00e7i bir hizmeti sahte trafikle doldurarak kesintiye u\u011fratma giri\u015fimidir.<\/p>\r\n\r\n\r\n\r\n<p><strong>Bir DDoS sald\u0131r\u0131s\u0131n\u0131n amac\u0131<\/strong>, bir i\u015fletmenin kullan\u0131c\u0131lar\u0131na hizmet verme yetene\u011fini bozmakt\u0131r. K\u00f6t\u00fc niyetli ki\u015filer, DDoS sald\u0131r\u0131lar\u0131n\u0131 a\u015fa\u011f\u0131dakiler i\u00e7in kullan\u0131r:<\/p>\r\n\r\n\r\n\r\n<ul>\r\n<li>Sabotaj<\/li>\r\n<li>\u0130ntikam<\/li>\r\n<li>Devlet faaliyetleri<\/li>\r\n<li>Karga\u015fa\/kaos<\/li>\r\n<\/ul>\r\n\r\n\r\n\r\n<h2 id=\"ddos-saldirisi-nasil-calisir\" class=\"wp-block-heading\">DDoS Sald\u0131r\u0131s\u0131 Nas\u0131l \u00c7al\u0131\u015f\u0131r?<\/h2>\r\n\r\n\r\n\r\n<p>Botnetleri anlamadan DDoS sald\u0131r\u0131lar\u0131n\u0131 anlamak m\u00fcmk\u00fcn de\u011fildir. Bu y\u00fczden \u00f6nce Botnet&#8217;in tan\u0131m\u0131 ile i\u015fe ba\u015flayal\u0131m.<\/p>\r\n\r\n\r\n\r\n<p>Botnet, k\u00f6t\u00fc niyetli ki\u015filerin bilgisayarlar\u0131 uzaktan kontrol etmelerini sa\u011flayan k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m bula\u015fm\u0131\u015f bilgisayarlardan olu\u015fan bir a\u011fd\u0131r. Bu botnet&#8217;ler &#8220;da\u011f\u0131t\u0131l\u0131r&#8221; \u00e7\u00fcnk\u00fc herhangi bir yerde bulunabilir ve herhangi birine ait olabilirler. Vir\u00fcs bula\u015fm\u0131\u015f bilgisayarlar\u0131n sahipleri, sistemlerinin bir botnet&#8217;in par\u00e7as\u0131 oldu\u011funu asla bilemez.<\/p>\r\n\r\n\r\n\r\n<p>G\u00fcvenli\u011fi ihlal edilmi\u015f milyonlarca cihazdan olu\u015fan devasa bir botnet olu\u015fturduktan sonra, bir DDoS sald\u0131rgan\u0131 her bir botu hedefin IP adresine istek g\u00f6ndermesi i\u00e7in uzaktan y\u00f6nlendirir. Ama\u00e7, y\u00fcksek say\u0131da ba\u011flant\u0131 iste\u011fi veya veriyle, kurban\u0131n web kaynaklar\u0131n\u0131n kapasite s\u0131n\u0131rlar\u0131n\u0131 a\u015fmas\u0131n\u0131 sa\u011flamak ve hizmetlerini nihai olarak durdurmakt\u0131r.<\/p>\r\n<p><span style=\"font-weight: 400;\">Bulutistan hizmetlerinin detaylar\u0131na ula\u015fmak i\u00e7in<\/span><a href=\"https:\/\/bulutistan.com\/cloud\/\"> <span style=\"font-weight: 400;\">t\u0131klay\u0131n\u0131z<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\r\n\r\n\r\n\r\n<h2 id=\"ddos-saldirilari-turleri\" class=\"wp-block-heading\">DDoS Sald\u0131r\u0131lar\u0131 T\u00fcrleri\u00a0<\/h2>\r\n<p><b>Volume Based DDoS (Birim Tabanl\u0131 DDoS):<\/b><span style=\"font-weight: 400;\"> Bu sald\u0131r\u0131 t\u00fcr\u00fc, hedefin a\u011f\u0131n\u0131 y\u00fcksek trafik ile bo\u011fmak ve me\u015fru trafi\u011fin ge\u00e7mesini imkans\u0131z hale getirmek i\u00e7in tasarlanm\u0131\u015ft\u0131r. Birim tabanl\u0131 sald\u0131r\u0131lar, b\u00fcy\u00fck miktarda trafik olu\u015fturmak i\u00e7in genellikle bot a\u011flar\u0131, b\u00fcy\u00fctme teknikleri veya di\u011fer y\u00f6ntemleri kullan\u0131r.<\/span><\/p>\r\n<p><b>Protocol Based DDoS (Protokol Tabanl\u0131 DDoS): <\/b><span style=\"font-weight: 400;\">Protokol tabanl\u0131 sald\u0131r\u0131lar, hedefin a\u011f\u0131 taraf\u0131ndan kullan\u0131lan ileti\u015fim protokollerindeki g\u00fcvenlik a\u00e7\u0131klar\u0131ndan yararlan\u0131r. Bu sald\u0131r\u0131lar, hedefin sunucular\u0131na hatal\u0131 bi\u00e7imlendirilmi\u015f veya ge\u00e7ersiz paketler g\u00f6ndererek bunlar\u0131n \u00e7\u00f6kmesine veya yan\u0131t vermemesine neden olabilir.\u00a0<\/span><\/p>\r\n<p><b>Application Layer DDoS (Uygulama Katman\u0131 Sald\u0131r\u0131lar\u0131): <\/b><span style=\"font-weight: 400;\">Uygulama katman\u0131 sald\u0131r\u0131lar\u0131, web sunucular\u0131, DNS sunucular\u0131 veya e-posta sunucular\u0131 gibi hedefin sunucular\u0131nda \u00e7al\u0131\u015fan belirli uygulama veya hizmetleri hedefler. Bu sald\u0131r\u0131lar genellikle uygulamaya \u00f6zel haz\u0131rlanm\u0131\u015f istek veya komutlar g\u00f6ndermeyi i\u00e7erir ve uygulaman\u0131n \u00e7\u00f6kmesine veya yan\u0131t vermemesine neden olur.<\/span><\/p>\r\n<p><b>SYN Flood DDoS: <\/b><span style=\"font-weight: 400;\">SYN flood DDoS sald\u0131r\u0131s\u0131, ba\u011flant\u0131 kurulurken bir istemci ile sunucu aras\u0131nda ger\u00e7ekle\u015fen TCP\/IP el s\u0131k\u0131\u015fma s\u00fcrecini hedefleyen bir DDoS sald\u0131r\u0131s\u0131 t\u00fcr\u00fcd\u00fcr. TCP\/IP el s\u0131k\u0131\u015fma i\u015flemi \u00fc\u00e7 ad\u0131mdan olu\u015fur: <strong>SYN (e\u015fzamanla), SYN-ACK (e\u015fzamanla-onay) ve ACK (onayla).<\/strong><\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">Bir SYN flood DDoS sald\u0131r\u0131s\u0131nda, bilgisayar korsan\u0131 hedefin sunucusuna \u00e7ok say\u0131da SYN paketi g\u00f6nderir, ancak sunucunun yan\u0131t olarak g\u00f6nderdi\u011fi SYN-ACK paketlerine bilgisayar korsan\u0131 yan\u0131t vermez. Bu, sunucunun ACK paketini beklerken ba\u011flant\u0131y\u0131 a\u00e7\u0131k tutmas\u0131na, sunucu kaynaklar\u0131n\u0131 ba\u011flamas\u0131na ve yasal kullan\u0131c\u0131lar\u0131n sunucuya ba\u011flanmas\u0131n\u0131 engellemesine neden olur.<\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">Sald\u0131r\u0131, tek bir cihazdan ba\u015flat\u0131labilir, ancak daha s\u0131kl\u0131kla, bilgisayar korsan\u0131n\u0131n kontrol\u00fc alt\u0131ndaki g\u00fcvenli\u011fi ihlal edilmi\u015f cihazlardan olu\u015fan bir a\u011f olan bir botnet&#8217;ten ba\u015flat\u0131l\u0131r. Bilgisayar korsan\u0131, bir botnet kullanarak \u00e7ok say\u0131da SYN paketi olu\u015fturabilir ve hedefin sunucusunu bunaltabilir.<\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">Bir SYN flood DDoS sald\u0131r\u0131s\u0131n\u0131 azaltman\u0131n birka\u00e7 yolu vard\u0131r:<\/span><\/p>\r\n<ul>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">IP adresi filtreleme veya h\u0131z s\u0131n\u0131rlama gibi teknikleri kullanarak hedefin sunucusuna gelen trafi\u011fi filtreleme.<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Sunucu taraf\u0131ndan al\u0131nan her SYN paketi i\u00e7in benzersiz bir tan\u0131mlama bilgisi olu\u015fturan bir teknik olan SYN tan\u0131mlama bilgilerini uygulama. Bu, sunucunun ba\u011flant\u0131lar\u0131 \u00e7ok uzun s\u00fcre a\u00e7\u0131k tutmas\u0131n\u0131 \u00f6nlemeye yard\u0131mc\u0131 olur.<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Sald\u0131r\u0131 s\u0131ras\u0131nda artan trafik y\u00fck\u00fcn\u00fcn \u00fcstesinden gelmek i\u00e7in CPU, bellek veya bant geni\u015fli\u011fi gibi sunucu kaynaklar\u0131n\u0131 art\u0131rmak.<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">SYN trafi\u011fini tespit etmek ve engellemek i\u00e7in g\u00fcvenlik duvarlar\u0131 veya izinsiz giri\u015f \u00f6nleme sistemleri (IPS) gibi \u00f6zel DDoS azaltma ara\u00e7lar\u0131n\u0131 kullanma.<\/span><\/li>\r\n<\/ul>\r\n<p><b>UDP Flood DDoS:<\/b><span style=\"font-weight: 400;\"> UDP (User Datagram Protocol) flood DDoS sald\u0131r\u0131s\u0131, DNS (Domain Name System) sunucular\u0131, VoIP (Voice over Internet Protocol) sunucular\u0131 veya \u00e7evrimi\u00e7i oyun sunucular\u0131 gibi UDP tabanl\u0131 hizmetleri hedefleyen bir DDoS sald\u0131r\u0131s\u0131 t\u00fcr\u00fcd\u00fcr. TCP&#8217;den farkl\u0131 olarak UDP, veri iletmeden \u00f6nce ba\u011flant\u0131 kurmayan ba\u011flant\u0131s\u0131z bir protokold\u00fcr. Bunun yerine, UDP paketleri herhangi bir el s\u0131k\u0131\u015fma i\u015flemi olmadan do\u011frudan hedefin sunucusuna g\u00f6nderilir.<\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">Bir UDP flood DDoS sald\u0131r\u0131s\u0131nda, bilgisayar korsan\u0131 hedefin sunucusuna \u00e7ok say\u0131da UDP paketi g\u00f6ndererek sunucuyu trafikle bo\u011far ve sunucunun yan\u0131t vermemesine neden olur. Bilgisayar korsan\u0131, hedefin sald\u0131r\u0131n\u0131n kayna\u011f\u0131n\u0131 belirlemesini zorla\u015ft\u0131rmak i\u00e7in paketlerin kaynak IP adresini taklit edebilir.<\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">UDP flood sald\u0131r\u0131lar\u0131, tek bir cihazdan ba\u015flat\u0131labilir, ancak daha s\u0131kl\u0131kla, bilgisayar korsan\u0131n\u0131n kontrol\u00fc alt\u0131ndaki g\u00fcvenli\u011fi ihlal edilmi\u015f cihazlardan olu\u015fan bir a\u011f olan bir botnet&#8217;ten ba\u015flat\u0131l\u0131r. Bilgisayar korsan\u0131 bir botnet kullanarak \u00e7ok say\u0131da UDP paketi olu\u015fturabilir ve hedefin sunucusunu a\u015fabilir.<\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">Bir UDP flood DDoS sald\u0131r\u0131s\u0131n\u0131 azaltman\u0131n birka\u00e7 yolu vard\u0131r. Bunlar a\u015fa\u011f\u0131daki \u015fekildedir:<\/span><\/p>\r\n<ul>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">IP adresi filtreleme veya h\u0131z s\u0131n\u0131rlama gibi teknikleri kullanarak hedefin sunucusuna gelen trafi\u011fi filtreleme.<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Belirli kriterlere uymayan gelen UDP paketlerini d\u00fc\u015f\u00fcren bir teknik olan UDP paket filtrelemeyi uygulama.<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Tek bir IP adresinden al\u0131nabilecek DNS sorgular\u0131n\u0131n say\u0131s\u0131n\u0131 s\u0131n\u0131rlayan DNS h\u0131z s\u0131n\u0131rlamas\u0131 veya Response Policy Zones (RPZ) uygulamak.<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Sald\u0131r\u0131 s\u0131ras\u0131nda artan trafik y\u00fck\u00fcn\u00fcn \u00fcstesinden gelmek i\u00e7in CPU, bellek veya bant geni\u015fli\u011fi gibi sunucu kaynaklar\u0131n\u0131 art\u0131rmak.<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">UDP trafi\u011fini alg\u0131lamak ve engellemek i\u00e7in g\u00fcvenlik duvarlar\u0131 veya sald\u0131r\u0131 \u00f6nleme sistemleri (IPS) gibi \u00f6zel DDoS azaltma ara\u00e7lar\u0131n\u0131 kullanmak.<\/span><\/li>\r\n<\/ul>\r\n<p><b>Ping Flood:<\/b><span style=\"font-weight: 400;\"> Ping Flood DDoS sald\u0131r\u0131s\u0131, &#8220;ping&#8221; olarak da bilinen b\u00fcy\u00fck hacimli ICMP (Internet Control Message Protocol) Echo Request paketleriyle bir sunucuyu veya a\u011f\u0131 hedefleyen bir DDoS sald\u0131r\u0131s\u0131 t\u00fcr\u00fcd\u00fcr. Bilgisayar korsan\u0131, hedefin sunucusuna \u00e7ok say\u0131da ping paketi g\u00f6ndererek sunucuyu trafikle doldurur ve sunucunun yan\u0131t vermemesine neden olur.<\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">Bir Ping Flood DDoS sald\u0131r\u0131s\u0131nda, bilgisayar korsan\u0131 genellikle \u00e7ok say\u0131da IP adresinden b\u00fcy\u00fck hacimli ping paketleri olu\u015fturmak i\u00e7in bir botnet kullan\u0131r ve bu da hedefin sald\u0131r\u0131y\u0131 engellemesini zorla\u015ft\u0131r\u0131r. Hedefin sald\u0131r\u0131n\u0131n kayna\u011f\u0131n\u0131 belirlemesini zorla\u015ft\u0131rmak i\u00e7in ping paketleri de sahte olabilir.<\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">Ping Flood sald\u0131r\u0131lar\u0131, \u00f6zellikle d\u00fc\u015f\u00fck bant geni\u015fli\u011fine sahip sunuculara veya a\u011flara kar\u015f\u0131 etkili olabilir \u00e7\u00fcnk\u00fc \u00f6nemli miktarda trafik olu\u015fturmak i\u00e7in b\u00fcy\u00fck miktarda bant geni\u015fli\u011fi gerektirmezler.<\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">Bir Ping Flood DDoS sald\u0131r\u0131s\u0131n\u0131 hafifletmenin birka\u00e7 yolu vard\u0131r. Bunlar a\u015fa\u011f\u0131daki \u015fekildedir:<\/span><\/p>\r\n<ul>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">IP adresi filtreleme veya h\u0131z s\u0131n\u0131rlama gibi teknikleri kullanarak hedefin sunucusuna gelen trafi\u011fi filtreleme.<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Belirli kriterlere uymayan gelen ICMP paketlerini d\u00fc\u015f\u00fcren ICMP paket filtrelemeyi uygulamak.<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Sald\u0131r\u0131 s\u0131ras\u0131nda artan trafik y\u00fck\u00fcn\u00fcn \u00fcstesinden gelmek i\u00e7in CPU, bellek veya bant geni\u015fli\u011fi gibi sunucu kaynaklar\u0131n\u0131 art\u0131rmak.<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Ping Flood trafi\u011fini alg\u0131lamak ve engellemek i\u00e7in g\u00fcvenlik duvarlar\u0131 veya izinsiz giri\u015f \u00f6nleme sistemleri (IPS) gibi \u00f6zel DDoS azaltma ara\u00e7lar\u0131n\u0131 kullanma.<\/span><\/li>\r\n<\/ul>\r\n<p><span style=\"font-weight: 400;\">Genel olarak, bir Ping Flood DDoS sald\u0131r\u0131s\u0131 \u00e7ok y\u0131k\u0131c\u0131 olabilir ve hedefin sunucusunda \u00f6nemli hasara neden olabilir. Bu t\u00fcr sald\u0131r\u0131lar\u0131n etkisini \u00f6nlemek veya s\u0131n\u0131rlamak i\u00e7in etkili hafifletme tekniklerinin uygulanmas\u0131 \u00f6nemlidir.<\/span><\/p>\r\n\r\n\r\n\r\n<h2 id=\"ddos-saldirilari-neden-tehlikelidir\" class=\"wp-block-heading\">DDoS Sald\u0131r\u0131lar\u0131 Neden Tehlikelidir?<\/h2>\r\n\r\n\r\n\r\n<p>DDoS sald\u0131r\u0131lar\u0131n\u0131n tehlikeli olmas\u0131n\u0131n temel nedenlerinden biri basit olmas\u0131d\u0131r. Bir <strong>DDoS sald\u0131r\u0131s\u0131 olu\u015fturmak<\/strong> ve ba\u015flatmak i\u00e7in ciddi d\u00fczeyde karma\u015f\u0131k teknikler ve bir bilgisayar korsan\u0131n\u0131n hedef sunucuya herhangi bir kod y\u00fcklemesi gerekmez. Tek gereken, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m bula\u015fm\u0131\u015f bilgisayarlardan olu\u015fan a\u011f\u0131, ayn\u0131 anda hedeflenen web sunucusuna milyonlarca ping g\u00f6nderecek \u015fekilde kontrol edebilmektir.\u00a0<\/p>\r\n\r\n\r\n\r\n<p>Gelen trafik da\u011f\u0131t\u0131ld\u0131\u011f\u0131 i\u00e7in DDoS sald\u0131r\u0131lar\u0131na kar\u015f\u0131 savunma yapmak da zordur. Botnet&#8217;teki g\u00fcvenli\u011fi ihlal edilmi\u015f &#8220;zombi&#8221; makinelerin farkl\u0131 IP adresleri vard\u0131r. \u015e\u00fcpheli IP adreslerinden gelen istekleri engellemek i\u00e7in filtreler eklemek bir \u00f6nlemdir, ancak bu t\u00fcr milyonlarca IP adresi oldu\u011funda, bu, s\u00fcrd\u00fcr\u00fclebilir bir savunma stratejisi olamaz.<\/p>\r\n\r\n\r\n\r\n<p>Daha da k\u00f6t\u00fcs\u00fc, DDoS sald\u0131r\u0131lar\u0131ndaki potansiyel sald\u0131r\u0131 vekt\u00f6rleri her ge\u00e7en g\u00fcn art\u0131yor. Her g\u00fcn t\u00fcketicilerin elinde daha fazla cihaz olduk\u00e7a ve IoT pazar\u0131 daha fazla cihaz t\u00fcr\u00fcn\u00fc kapsayacak \u015fekilde geni\u015fledik\u00e7e, bunlardan kaynaklanan potansiyel DDoS sald\u0131r\u0131lar\u0131na kar\u015f\u0131 savunma yapmak daha zor hale gelecek. Bu cihazlar, standart bir bilgisayar veya sunucuya k\u0131yasla geli\u015fmi\u015f g\u00fcvenlik yaz\u0131l\u0131m\u0131na sahip olmayaca\u011f\u0131 i\u00e7in botnet&#8217;in bir par\u00e7as\u0131n\u0131 olu\u015fturmak i\u00e7in sald\u0131r\u0131ya u\u011framaya ve g\u00fcvenli\u011fi ihlal edilmeye kar\u015f\u0131 savunmas\u0131z kalabilir.<\/p>\r\n<h2 id=\"ddos-saldirilari-neden-yapilir\">DDOS Sald\u0131r\u0131lar\u0131 Neden Yap\u0131l\u0131r?<\/h2>\r\n<p><span style=\"font-weight: 400;\">DDoS (Da\u011f\u0131t\u0131lm\u0131\u015f Hizmet Reddi) sald\u0131r\u0131lar\u0131 \u00e7e\u015fitli nedenlerle ger\u00e7ekle\u015fir, ancak bu sald\u0131r\u0131lar\u0131n arkas\u0131ndaki birincil sebep, bir web sitesinin veya hizmetin normal i\u015fleyi\u015fini bozmakt\u0131r. DDoS sald\u0131r\u0131lar\u0131n\u0131n ger\u00e7ekle\u015fmesinin baz\u0131 nedenleri a\u015fa\u011f\u0131dakileri i\u00e7erir:<\/span><\/p>\r\n<h3 id=\"1-hacktivizm\">1. Hacktivizm<\/h3>\r\n<p><span style=\"font-weight: 400;\">Baz\u0131 DDoS sald\u0131r\u0131lar\u0131 politik olarak motive edilir ve bilgisayar korsanlar\u0131 bunlar\u0131 fikirlerini dile getirmek veya belirli bir \u015firkete, h\u00fck\u00fcmete veya ki\u015fiye kar\u015f\u0131 protesto etmek i\u00e7in bir ara\u00e7 olarak kullan\u0131r.<\/span><\/p>\r\n<h3 id=\"2-fidye\">2. Fidye<\/h3>\r\n<p><span style=\"font-weight: 400;\">Bilgisayar korsanlar\u0131 bir \u015firkete kar\u015f\u0131 bir DDoS sald\u0131r\u0131s\u0131 ba\u015flatabilir ve sald\u0131r\u0131y\u0131 durdurmak i\u00e7in \u00f6deme talep edebilir. Bu t\u00fcr sald\u0131r\u0131 fidye DDoS veya RDoS olarak bilinir.<\/span><\/p>\r\n<h3 id=\"3-rekabet-avantaji\">3. Rekabet Avantaj\u0131<\/h3>\r\n<p><span style=\"font-weight: 400;\">DDoS sald\u0131r\u0131lar\u0131, rakip bir \u015firkete kar\u015f\u0131 rekabet avantaj\u0131 elde etmek i\u00e7in kullan\u0131labilir. \u00d6rne\u011fin, bir \u015firket, m\u00fc\u015fterilerin eri\u015fememesi i\u00e7in rakip bir web sitesine kar\u015f\u0131 bir DDoS sald\u0131r\u0131s\u0131 ba\u015flatabilir.<\/span><\/p>\r\n<h3 id=\"4-bot-aglari\">4. Bot A\u011flar\u0131<\/h3>\r\n<p><span style=\"font-weight: 400;\">Bot a\u011flar\u0131, DDoS sald\u0131r\u0131lar\u0131n\u0131 ba\u015flatmak i\u00e7in kullan\u0131labilen g\u00fcvenli\u011fi ihlal edilmi\u015f cihazlar\u0131n a\u011flar\u0131d\u0131r. Siber su\u00e7lular, se\u00e7tikleri hedeflere kar\u015f\u0131 DDoS sald\u0131r\u0131lar\u0131 ba\u015flatmak i\u00e7in bot a\u011flar\u0131 kiralayabilir veya bunlar\u0131 dark web\u2019de satabilir.<\/span><\/p>\r\n<h3 id=\"5-intikam\">5. \u0130ntikam<\/h3>\r\n<p><span style=\"font-weight: 400;\">Baz\u0131 ki\u015filer, yanl\u0131\u015f alg\u0131lanan baz\u0131 ki\u015filer i\u00e7in bir intikam eylemi olarak bir \u015firkete veya ki\u015fiye kar\u015f\u0131 bir DDoS sald\u0131r\u0131s\u0131 ba\u015flatabilir.<\/span><\/p>\r\n<h3 id=\"6-guvenligi-test-etme\">6. G\u00fcvenli\u011fi Test Etme<\/h3>\r\n<p><span style=\"font-weight: 400;\">Baz\u0131 durumlarda, bir web sitesinin veya sunucunun g\u00fcvenlik savunmas\u0131n\u0131 test etmek i\u00e7in bir DDoS sald\u0131r\u0131s\u0131 kullan\u0131labilir. Siber su\u00e7lular, daha sonra yararlan\u0131labilecek g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 belirlemek i\u00e7in k\u00fc\u00e7\u00fck \u00f6l\u00e7ekli bir DDoS sald\u0131r\u0131s\u0131 ba\u015flatabilir.<\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">Genel olarak, DDoS sald\u0131r\u0131lar\u0131 \u00e7e\u015fitli nedenlerle ba\u015flat\u0131labilir, ancak as\u0131l amac\u0131 bir web sitesinin veya hizmetin normal i\u015fleyi\u015fini bozmak, hedefe rahats\u0131zl\u0131k veya mali zarar vermektir.<\/span><\/p>\r\n<h2 id=\"ddos-saldirisi-nasil-anlasilir\">DDOS Sald\u0131r\u0131s\u0131 Nas\u0131l Anla\u015f\u0131l\u0131r?<\/h2>\r\n<p><span style=\"font-weight: 400;\">Da\u011f\u0131t\u0131lm\u0131\u015f Hizmet Reddi (DDoS) sald\u0131r\u0131s\u0131n\u0131 tespit etmek zor olabilir, \u00e7\u00fcnk\u00fc sald\u0131r\u0131 trafi\u011fi temel olarak birden \u00e7ok kayna\u011fa da\u011f\u0131l\u0131r ve bu da sald\u0131r\u0131n\u0131n kayna\u011f\u0131n\u0131n ve do\u011fas\u0131n\u0131n belirlenmesini zorla\u015ft\u0131r\u0131r. Bununla birlikte, DDoS sald\u0131r\u0131lar\u0131n\u0131 tespit etmek ve azaltmak i\u00e7in kullan\u0131labilecek birka\u00e7 teknik vard\u0131r. Bunlar a\u015fa\u011f\u0131daki \u015fekildedir:<\/span><\/p>\r\n<h3 id=\"1-trafik-analizi\">1. Trafik Analizi<\/h3>\r\n<p><span style=\"font-weight: 400;\">A\u011f trafi\u011fi kal\u0131plar\u0131n\u0131 izleyerek ve anormal trafik hacim veya kal\u0131plar\u0131n\u0131 arayarak bir DDoS sald\u0131r\u0131s\u0131n\u0131 tespit etmek m\u00fcmk\u00fcn olabilir. \u00d6rne\u011fin, belirli bir IP adresinden veya a\u011fdan gelen trafi\u011fin aniden normalden \u00e7ok daha y\u00fcksek olmas\u0131, bir DDoS sald\u0131r\u0131s\u0131na i\u015faret edebilir.<\/span><\/p>\r\n<h3 id=\"2-ag-izleme-araclari\">2. A\u011f \u0130zleme Ara\u00e7lar\u0131<\/h3>\r\n<p><span style=\"font-weight: 400;\">\u0130zinsiz giri\u015f tespit sistemleri (IDS) ve sald\u0131r\u0131 \u00f6nleme sistemleri (IPS) gibi a\u011f izleme ara\u00e7lar\u0131, a\u011f trafi\u011fini ger\u00e7ek zamanl\u0131 olarak analiz ederek ve g\u00fcvenlik ekiplerini potansiyel tehditlere kar\u015f\u0131 uyararak DDoS sald\u0131r\u0131lar\u0131n\u0131 tespit etmeye ve engellemeye yard\u0131mc\u0131 olabilir.<\/span><\/p>\r\n<h3 id=\"3-davranis-analizi\">3. Davran\u0131\u015f Analizi<\/h3>\r\n<p><span style=\"font-weight: 400;\">A\u011fdaki bireysel kullan\u0131c\u0131lar\u0131n veya cihazlar\u0131n davran\u0131\u015flar\u0131n\u0131 analiz ederek bir DDoS sald\u0131r\u0131s\u0131n\u0131n belirtilerini tespit etmek m\u00fcmk\u00fcn olabilir. \u00d6rne\u011fin, belirli bir cihaz belirli bir sunucuya \u00e7ok say\u0131da istek olu\u015fturuyorsa, bu bir siber sald\u0131r\u0131n\u0131n g\u00f6stergesi olabilir.<\/span><\/p>\r\n<h3 id=\"4-akis-analizi\">4. Ak\u0131\u015f Analizi<\/h3>\r\n<p><span style=\"font-weight: 400;\">A\u011f ak\u0131\u015f verilerini analiz ederek, bir DDoS sald\u0131r\u0131s\u0131n\u0131n g\u00f6stergesi olan kal\u0131plar\u0131 tespit etmek m\u00fcmk\u00fcn olabilir. \u00d6rne\u011fin, belirli bir sunucuya \u00e7ok say\u0131da paket g\u00f6nderiliyorsa, bu bir siber sald\u0131r\u0131n\u0131n g\u00f6stergesi olabilir.<\/span><\/p>\r\n<h3 id=\"5-cdn\">5. CDN<\/h3>\r\n<p><span style=\"font-weight: 400;\">\u0130\u00e7erik da\u011f\u0131t\u0131m a\u011flar\u0131nda (CDN&#8217;ler), DDoS koruma hizmetleri ve g\u00fcvenlik duvarlar\u0131 gibi DDoS sald\u0131r\u0131lar\u0131n\u0131 azaltmaya yard\u0131mc\u0131 olabilecek \u00e7e\u015fitli ara\u00e7 ve hizmetler mevcuttur. Bu ara\u00e7lar, k\u00f6t\u00fc ama\u00e7l\u0131 trafi\u011fi filtreleyerek ve engelleyerek me\u015fru trafi\u011fin ge\u00e7mesine izin vererek \u00e7al\u0131\u015f\u0131r.<\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">Genel olarak, DDoS sald\u0131r\u0131lar\u0131n\u0131 tespit etmek ve hafifletmek, teknik ve ara\u00e7lar\u0131n bir kombinasyonunun yan\u0131 s\u0131ra a\u011f trafi\u011fi modellerinin s\u00fcrekli olarak izlenmesini ve analiz edilmesini gerektirir. \u0130\u015fletmeler, potansiyel tehditleri izleme konusunda proaktif ve dikkatli davranarak DDoS sald\u0131r\u0131lar\u0131n\u0131n zararl\u0131 etkilerine kar\u015f\u0131 kendilerini korumaya yard\u0131mc\u0131 olabilir.<\/span><\/p>\r\n\r\n\r\n\r\n<h2 id=\"dos-saldirisi-ile-ddos-saldirisi-arasindaki-fark-nedir\" class=\"wp-block-heading\">DOS Sald\u0131r\u0131s\u0131 ile DDoS Sald\u0131r\u0131s\u0131 Aras\u0131ndaki Fark Nedir?<\/h2>\r\n\r\n\r\n\r\n<p>DDoS sald\u0131r\u0131lar\u0131 birden fazla sistemden ba\u015flat\u0131l\u0131rken, DOS (hizmet reddi) sald\u0131r\u0131lar\u0131 yaln\u0131zca bir sistemden kaynaklan\u0131r. DDoS sald\u0131r\u0131lar\u0131n\u0131 engellemek, DOS sald\u0131r\u0131lar\u0131ndan daha h\u0131zl\u0131 ve daha zordur. DOS sald\u0131r\u0131lar\u0131n\u0131 engellemek daha kolayd\u0131r, \u00e7\u00fcnk\u00fc tan\u0131mlanacak tek bir sald\u0131r\u0131 vard\u0131r.<\/p>\r\n<p><span style=\"font-weight: 400;\">Bulutistan hizmetlerinin detaylar\u0131na ula\u015fmak i\u00e7in<\/span><a href=\"https:\/\/bulutistan.com\/cloud\/\"> <span style=\"font-weight: 400;\">t\u0131klay\u0131n\u0131z<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\r\n\r\n\r\n\r\n<h2 id=\"ddos-saldirilari-neden-buyuyen-bir-tehdittir\" class=\"wp-block-heading\">DDoS Sald\u0131r\u0131lar\u0131 Neden B\u00fcy\u00fcyen Bir Tehdittir?<\/h2>\r\n\r\n\r\n\r\n<p>Say\u0131s\u0131 h\u0131zla artan DDoS sald\u0131r\u0131lar\u0131, 2018&#8217;de FBI&#8217;\u0131n karanl\u0131k a\u011fdaki en b\u00fcy\u00fck kiral\u0131k DDoS sitelerini kapatt\u0131\u011f\u0131 bir d\u00fc\u015f\u00fc\u015fe ra\u011fmen, 2020&#8217;nin ilk yar\u0131s\u0131nda %151 artt\u0131.\u00a0<\/p>\r\n\r\n\r\n\r\n<p>Bu y\u00fckseli\u015fi sa\u011flayan \u015fey, Nesnelerin \u0130nterneti&#8217;nin (IoT) benimsenmesidir. \u00c7o\u011fu IoT cihaz\u0131nda yerle\u015fik \u00fcr\u00fcn yaz\u0131l\u0131m\u0131 veya g\u00fcvenlik kontrol\u00fc yoktur. IoT cihazlar\u0131 \u00e7ok say\u0131da oldu\u011fundan ve genellikle g\u00fcvenlik testlerine ve kontrollerine tabi tutulmadan uyguland\u0131\u011f\u0131ndan, DDoS sald\u0131r\u0131lar\u0131 riskini art\u0131r\u0131r.<\/p>\r\n\r\n\r\n\r\n<p>Artan bir di\u011fer zay\u0131f nokta ise, API&#8217;ler veya uygulama programlama aray\u00fczleridir. API&#8217;ler, farkl\u0131 sistemlerin verileri payla\u015fmas\u0131na izin veren k\u00fc\u00e7\u00fck kod par\u00e7alar\u0131d\u0131r. \u00d6rne\u011fin, havayolu tarifelerini yay\u0131nlayan bir seyahat sitesi, bu verileri havayollar\u0131n\u0131n sitelerinden seyahat sitesinin web sayfalar\u0131na almak i\u00e7in API&#8217;leri kullan\u0131r. Herkesin kullan\u0131m\u0131na a\u00e7\u0131k olan genel API&#8217;ler yetersiz \u015fekilde korunabilir. Tipik g\u00fcvenlik a\u00e7\u0131klar\u0131 aras\u0131nda zay\u0131f kimlik do\u011frulama kontrolleri, yetersiz u\u00e7 nokta g\u00fcvenli\u011fi, sa\u011flam \u015fifreleme eksikli\u011fi ve kusurlu i\u015f mant\u0131\u011f\u0131 bulunur.<\/p>\r\n\r\n\r\n\r\n<h2 id=\"ddos-saldirisinin-isaretleri-nelerdir\" class=\"wp-block-heading\">DDoS Sald\u0131r\u0131s\u0131n\u0131n \u0130\u015faretleri Nelerdir?<\/h2>\r\n\r\n\r\n\r\n<p>DDoS sald\u0131r\u0131lar\u0131n\u0131n kurbanlar\u0131 genellikle a\u011flar\u0131n\u0131n, web sitelerinin veya cihazlar\u0131n\u0131n yava\u015f \u00e7al\u0131\u015ft\u0131\u011f\u0131n\u0131 veya hizmet vermedi\u011fini fark eder. Bununla birlikte, bu belirtiler DDoS sald\u0131r\u0131lar\u0131na \u00f6zg\u00fc de\u011fildir; ar\u0131zal\u0131 bir sunucu, yasal trafikte bir art\u0131\u015f ve hatta kopmu\u015f bir kablo gibi bir\u00e7ok \u015feyden kaynaklanabilir. Bu nedenle, yaln\u0131zca manuel g\u00f6zlemlere g\u00fcvenemezsiniz. Bunun yerine da\u011f\u0131t\u0131lm\u0131\u015f hizmet reddi sald\u0131r\u0131lar\u0131n\u0131 tespit etmek i\u00e7in bir trafik analizi arac\u0131ndan yararlanman\u0131z gerekir.<\/p>\r\n\r\n\r\n\r\n<h2 id=\"ddos-saldirilarindan-korunmanin-12-yolu\" class=\"wp-block-heading\">DDoS Sald\u0131r\u0131lar\u0131ndan Korunman\u0131n 12 Yolu<\/h2>\r\n\r\n\r\n\r\n<p>DDoS azaltma ve savunma, \u00e7ok y\u00f6nl\u00fc bir yakla\u015f\u0131m gerektirir. Tek bir ara\u00e7 veya y\u00f6ntem, her t\u00fcr DDoS sald\u0131r\u0131s\u0131na kar\u015f\u0131 tam korumay\u0131 garanti edemez. Bu y\u00fczden uygulaman\u0131z gereken birden fazla taktik vard\u0131r:<\/p>\r\n\r\n\r\n\r\n<h3 id=\"1-aginizin-trafigini-bilin\" class=\"wp-block-heading\">1. A\u011f\u0131n\u0131z\u0131n Trafi\u011fini Bilin<\/h3>\r\n\r\n\r\n\r\n<p>Her i\u015fletmenin altyap\u0131s\u0131n\u0131n tipik internet trafi\u011fi kal\u0131plar\u0131 vard\u0131r. \u0130\u015fletmenizin normal trafik d\u00fczenini anlad\u0131\u011f\u0131n\u0131zda, bir temeliniz olur. Bu \u015fekilde, ola\u011fand\u0131\u015f\u0131 bir etkinlik meydana geldi\u011finde, bir DDoS sald\u0131r\u0131s\u0131n\u0131n belirtilerini tan\u0131mlayabilirsiniz.<\/p>\r\n\r\n\r\n\r\n<h3 id=\"2-hizmet-reddi-yanit-plani-olusturun\" class=\"wp-block-heading\">2. Hizmet Reddi Yan\u0131t Plan\u0131 Olu\u015fturun<\/h3>\r\n\r\n\r\n\r\n<p>Bir DDoS sald\u0131r\u0131s\u0131 oldu\u011funda ya da olursa, ne olaca\u011f\u0131n\u0131 biliyor musunuz ya da i\u015fletmeniz bu sald\u0131r\u0131ya nas\u0131l yan\u0131t verecek?\u00a0<\/p>\r\n\r\n\r\n\r\n<p>\u00d6nceden bir plan tan\u0131mlayarak, a\u011f\u0131n\u0131z hedeflendi\u011finde h\u0131zl\u0131 ve verimli bir \u015fekilde yan\u0131t verebilirsiniz.<\/p>\r\n\r\n\r\n\r\n<p>Bu biraz planlama gerektirebilir; altyap\u0131n\u0131z ne kadar karma\u015f\u0131ksa, DDoS m\u00fcdahale plan\u0131n\u0131z o kadar ayr\u0131nt\u0131l\u0131 olacakt\u0131r. Ancak \u015firketinizin b\u00fcy\u00fckl\u00fc\u011f\u00fcnden ba\u011f\u0131ms\u0131z olarak plan\u0131n\u0131z a\u015fa\u011f\u0131dakileri i\u00e7ermelidir:<\/p>\r\n\r\n\r\n\r\n<ul>\r\n<li>Bir sistem kontrol listesi<\/li>\r\n<li>E\u011fitimli bir m\u00fcdahale ekibi<\/li>\r\n<li>\u0130yi tan\u0131mlanm\u0131\u015f bildirimler ve ad\u0131m ad\u0131m prosed\u00fcrler<\/li>\r\n<li>Sald\u0131r\u0131 hakk\u0131nda bilgilendirilmesi gereken dahili ve harici ki\u015filerin listesi<\/li>\r\n<li>M\u00fc\u015fteriler veya sat\u0131c\u0131lar gibi di\u011fer t\u00fcm payda\u015flar i\u00e7in bir ileti\u015fim plan\u0131<\/li>\r\n<\/ul>\r\n\r\n\r\n\r\n<h3 id=\"3-aginizi-esnek-hale-getirin\" class=\"wp-block-heading\">3. A\u011f\u0131n\u0131z\u0131 Esnek Hale Getirin<\/h3>\r\n\r\n\r\n\r\n<p>Altyap\u0131n\u0131z DDoS sald\u0131r\u0131lar\u0131na kar\u015f\u0131 m\u00fcmk\u00fcn oldu\u011funca dayan\u0131kl\u0131 olmal\u0131d\u0131r. Bu, g\u00fcvenlik duvarlar\u0131ndan daha fazlas\u0131 anlam\u0131na gelir \u00e7\u00fcnk\u00fc baz\u0131 DDoS sald\u0131r\u0131lar\u0131 g\u00fcvenlik duvarlar\u0131n\u0131 hedef al\u0131r. Bunun yerine, t\u00fcm yumurtalar\u0131n\u0131z\u0131 ayn\u0131 sepette tutmad\u0131\u011f\u0131n\u0131zdan emin olun ve veri merkezlerini farkl\u0131 a\u011flara koyun. Yani t\u00fcm veri merkezlerinizin ayn\u0131 fiziksel konumda olmad\u0131\u011f\u0131ndan emin olun.<\/p>\r\n\r\n\r\n\r\n<h3 id=\"4-bant-genisliginizi-artirin\" class=\"wp-block-heading\">4. Bant Geni\u015fli\u011finizi Art\u0131r\u0131n<\/h3>\r\n\r\n\r\n\r\n<p>DDoS a\u011f\u0131n\u0131zda bir trafik s\u0131k\u0131\u015f\u0131kl\u0131\u011f\u0131 yarat\u0131yorsa, bu trafik s\u0131k\u0131\u015f\u0131kl\u0131\u011f\u0131n\u0131 daha az \u015fiddetli hale getirmenin bir yolu da bant geni\u015fli\u011fini art\u0131rmakt\u0131r. Daha fazla bant geni\u015fli\u011fi ekleyerek, i\u015fletmenize daha b\u00fcy\u00fck bir trafik hacmi yaratabilirsiniz. Ancak bu \u00e7\u00f6z\u00fcm, t\u00fcm DDoS sald\u0131r\u0131lar\u0131n\u0131 durdurmaz. \u00c7\u00fcnk\u00fc hacimsel DDoS sald\u0131r\u0131lar\u0131n\u0131n boyutu art\u0131yor. \u00d6rne\u011fin 2018&#8217;de bir DDoS sald\u0131r\u0131s\u0131 ilk kez 1 Tbps&#8217;yi a\u015ft\u0131. Bu o an i\u00e7in bir rekordu. Fakat birka\u00e7 g\u00fcn sonra 1.7 Tbps\u2019lik bir sald\u0131r\u0131 ger\u00e7ekle\u015fti.<\/p>\r\n\r\n\r\n\r\n<h3 id=\"5-ddos-karsiti-donanim-ve-yazilimlardan-yararlanin\" class=\"wp-block-heading\">5. DDoS Kar\u015f\u0131t\u0131 Donan\u0131m ve Yaz\u0131l\u0131mlardan Yararlan\u0131n<\/h3>\r\n\r\n\r\n\r\n<p>Belirli protokol ve uygulama sald\u0131r\u0131lar\u0131n\u0131 p\u00fcsk\u00fcrtmek veya azaltmak i\u00e7in haz\u0131rlanm\u0131\u015f bir\u00e7ok \u00fcr\u00fcn vard\u0131r. Bu ara\u00e7lardan yararlanabilirsiniz.<\/p>\r\n\r\n\r\n\r\n<h3 id=\"6-bir-saldirinin-belirtilerini-bilin\" class=\"wp-block-heading\">6. Bir Sald\u0131r\u0131n\u0131n Belirtilerini Bilin<\/h3>\r\n\r\n\r\n\r\n<p>A\u011f\u0131n\u0131z anla\u015f\u0131lmaz bir \u015fekilde yava\u015fl\u0131yor, web sitesi kapan\u0131yor ya da birdenbire \u00e7ok fazla spam al\u0131yorsan\u0131z; bunlar\u0131n hepsi bir DDoS sald\u0131r\u0131s\u0131n\u0131n i\u015faretleri olabilir.\u00a0<\/p>\r\n\r\n\r\n\r\n<h3 id=\"7-ddos-korumanizi-disaridan-temin-edin\" class=\"wp-block-heading\">7. DDoS Koruman\u0131z\u0131 D\u0131\u015far\u0131dan Temin Edin<\/h3>\r\n\r\n\r\n\r\n<p>Baz\u0131 \u015firketler Hizmet olarak DDoS sunar. Bu \u015firketlerden baz\u0131lar\u0131, bir sald\u0131r\u0131ya yan\u0131t vermek i\u00e7in kaynaklar\u0131 \u00f6l\u00e7eklendirme konusunda uzmanla\u015fm\u0131\u015ft\u0131r. Bu sayede savunmay\u0131 g\u00fc\u00e7lendirir ve devam eden bir sald\u0131r\u0131n\u0131n zarar\u0131n\u0131 azalt\u0131r.<\/p>\r\n\r\n\r\n\r\n<h3 id=\"8-olagandisi-etkinlik-icin-izleme\" class=\"wp-block-heading\">8. Ola\u011fand\u0131\u015f\u0131 Etkinlik \u0130\u00e7in \u0130zleme<\/h3>\r\n\r\n\r\n\r\n<p>Tipik aktivitenizi ve bir sald\u0131r\u0131n\u0131n i\u015faretlerini \u00f6\u011frendikten sonra, a\u011f\u0131n\u0131zda garip trafik olup olmad\u0131\u011f\u0131n\u0131 izleyin. Trafi\u011fi ger\u00e7ek zamanl\u0131 olarak izledi\u011finizde, i\u015fletmeniz bir DDoS sald\u0131r\u0131s\u0131n\u0131 ba\u015flad\u0131\u011f\u0131nda tespit edebilecek ve azaltabilecektir.<\/p>\r\n\r\n\r\n\r\n<h3 id=\"9-web-uygulamasi-guvenlik-duvari-web-application-firewall-waf\" class=\"wp-block-heading\">9. Web Uygulamas\u0131 G\u00fcvenlik Duvar\u0131 (Web Application <a href=\"https:\/\/bulutistan.com\/blog\/firewall\/\">Firewall<\/a>&#8211; WAF)<\/h3>\r\n\r\n\r\n\r\n<p>Bir WAF, gelen HTTP trafik talebini izlemek ve k\u00f6t\u00fc niyetli trafi\u011fi filtrelemek i\u00e7in kullan\u0131ld\u0131\u011f\u0131 i\u00e7in web uygulamalar\u0131 i\u00e7in bir kontrol noktas\u0131 gibidir. Bir uygulama katman\u0131 DDoS sald\u0131r\u0131s\u0131 tespit edildi\u011finde, Eri\u015fim Kontrol Listenizi (ACL) g\u00fcncelleyerek istek oran\u0131n\u0131 s\u0131n\u0131rlamak ve k\u00f6t\u00fc niyetli trafi\u011fi engellemek i\u00e7in WAF ilkelerini h\u0131zla de\u011fi\u015ftirilebilir.<\/p>\r\n\r\n\r\n\r\n<h3 id=\"10-guvenlik-bilgileri-ve-olay-yonetimi-security-information-and-event-management-siem\" class=\"wp-block-heading\">10. G\u00fcvenlik Bilgileri ve Olay Y\u00f6netimi (Security Information and Event Management &#8211; SIEM)<\/h3>\r\n\r\n\r\n\r\n<p>SIEM, bir ortam\u0131n her k\u00f6\u015fesinden veri \u00e7eken ve bunlar\u0131 tek bir merkezi arabirimde toplayan, uyar\u0131lar\u0131 nitelendirmek, raporlar olu\u015fturmak ve olay\u0131 desteklemek i\u00e7in kullan\u0131labilecek k\u00f6t\u00fc ama\u00e7l\u0131 etkinliklere g\u00f6r\u00fcn\u00fcrl\u00fck sa\u011flayan bir ara\u00e7t\u0131r.\u00a0<\/p>\r\n\r\n\r\n\r\n<h3 id=\"11-cdn-yuk-dengeleyiciler\" class=\"wp-block-heading\">11. CDN\/Y\u00fck Dengeleyiciler<\/h3>\r\n\r\n\r\n\r\n<p>\u0130\u00e7erik Da\u011f\u0131t\u0131m A\u011flar\u0131 (CDN) ve y\u00fck dengeleyiciler, trafik ak\u0131\u015flar\u0131n\u0131 birden \u00e7ok sunucu aras\u0131nda otomatik olarak da\u011f\u0131tarak sunucu a\u015f\u0131r\u0131 y\u00fcklenme riskini ve m\u00fcteakip performans\/kullan\u0131labilirlik sorunlar\u0131n\u0131 azaltmak i\u00e7in kullan\u0131labilir.<\/p>\r\n\r\n\r\n\r\n<h3 id=\"12-altyapiyi-buluta-tasima\" class=\"wp-block-heading\">12. Altyap\u0131y\u0131 Buluta Ta\u015f\u0131ma<\/h3>\r\n\r\n\r\n\r\n<p>DDoS sald\u0131r\u0131lar\u0131n\u0131 ortadan kald\u0131rmasa da buluta ge\u00e7i\u015f sald\u0131r\u0131lar\u0131 azaltabilir. Bulut, \u015firket i\u00e7i kaynaklardan daha fazla bant geni\u015fli\u011fine sahiptir ve bulutun do\u011fas\u0131, bir\u00e7ok sunucunun ayn\u0131 yerde bulunmad\u0131\u011f\u0131 anlam\u0131na gelir.<\/p>\r\n\r\n\r\n\r\n<p><strong>Bulutistan gibi bir bulut hizmet sa\u011flay\u0131c\u0131s\u0131<\/strong>, g\u00fcvenlik altyap\u0131s\u0131nda bulunan geli\u015fmi\u015f \u201cDDoS Atak \u00d6nleme\u201d ile i\u015fletmenize g\u00fcvenli bir koruma sa\u011flar ve sizi DDoS sald\u0131r\u0131lar\u0131na kar\u015f\u0131 korur.<\/p>\r\n\r\n\r\n\r\n<p>Bu amaca y\u00f6nelik olarak olu\u015fturulmu\u015f bulut \u00e7\u00f6z\u00fcmleri, sald\u0131r\u0131 d\u00fczeyini azalt\u0131r, en karma\u015f\u0131k sald\u0131r\u0131lara kar\u015f\u0131 dayan\u0131kl\u0131l\u0131\u011f\u0131 art\u0131r\u0131r ve b\u00fcy\u00fck hacimli DDoS sald\u0131r\u0131lar\u0131na kar\u015f\u0131 daha g\u00fc\u00e7l\u00fc koruma sa\u011flar.\u00a0<\/p>\r\n\r\n\r\n\r\n<p>E\u011fer siz de altyap\u0131n\u0131z\u0131 buluta ta\u015f\u0131mak ve Bulutistan&#8217;\u0131n altyap\u0131 g\u00fcvenli\u011finden yararlanmak istiyorsan\u0131z, hemen bizimle <a href=\"https:\/\/bulutistan.com\/bize-ulasin\/\" target=\"_blank\" rel=\"noreferrer noopener\">ileti\u015fime <\/a>ge\u00e7ebilirsiniz.<\/p>\r\n<h2 id=\"iot-cihazlarini-ddos-saldirilarindan-koruma\">IOT Cihazlar\u0131n\u0131 DDOS Sald\u0131r\u0131lar\u0131ndan Koruma<\/h2>\r\n<p><span style=\"font-weight: 400;\">DDoS (Da\u011f\u0131t\u0131lm\u0131\u015f Hizmet Reddi) sald\u0131r\u0131lar\u0131, genellikle geleneksel bilgisayar ve sunuculardan daha az g\u00fcvenli olan IoT (Nesnelerin \u0130nterneti) cihazlar\u0131nda \u00f6nemli hasara neden olabilir. IoT cihazlar\u0131n\u0131 DDoS sald\u0131r\u0131lar\u0131ndan korumaya yard\u0131mc\u0131 olabilecek baz\u0131 ad\u0131mlar a\u015fa\u011f\u0131dakileri i\u00e7erir:<\/span><\/p>\r\n<h3 id=\"1-urun-yazilimini-duzenli-olarak-guncelleyin\">1. \u00dcr\u00fcn yaz\u0131l\u0131m\u0131n\u0131 d\u00fczenli olarak g\u00fcncelleyin<\/h3>\r\n<p><span style=\"font-weight: 400;\">\u00dcreticiler, cihazlar\u0131n\u0131n yaz\u0131l\u0131mlar\u0131ndaki g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 gidermek i\u00e7in genellikle g\u00fcvenlik yamalar\u0131 ve g\u00fcncellemeler yay\u0131nlar. Bu y\u00fczden IoT cihaz\u0131n\u0131z\u0131n donan\u0131m yaz\u0131l\u0131m\u0131n\u0131 en son s\u00fcr\u00fcm \u00e7\u0131kar \u00e7\u0131kmaz g\u00fcncelledi\u011finizden emin olun.<\/span><\/p>\r\n<h3 id=\"2-guclu-parolalar-kullanin\">2. G\u00fc\u00e7l\u00fc parolalar kullan\u0131n<\/h3>\r\n<p><span style=\"font-weight: 400;\">Zay\u0131f parolalar, internete ba\u011fl\u0131 herhangi bir cihazda \u00f6nemli bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131d\u0131r. Bu y\u00fczden her cihaz i\u00e7in benzersiz, karma\u015f\u0131k parolalar kullan\u0131n ve parolalar\u0131 g\u00fcvenli bir \u015fekilde olu\u015fturmak ve saklamak i\u00e7in bir parola y\u00f6neticisi kullanmay\u0131 d\u00fc\u015f\u00fcn\u00fcn.<\/span><\/p>\r\n<h3 id=\"3-iki-faktorlu-kimlik-dogrulamayi-etkinlestirin\">3. \u0130ki fakt\u00f6rl\u00fc kimlik do\u011frulamay\u0131 etkinle\u015ftirin<\/h3>\r\n<p><span style=\"font-weight: 400;\">\u0130ki fakt\u00f6rl\u00fc kimlik do\u011frulama, IoT cihaz\u0131n\u0131za fazladan bir g\u00fcvenlik katman\u0131 ekler. Birisi \u015fifrenizi tahmin etmeyi veya \u00e7almay\u0131 ba\u015farsa bile, telefonunuza g\u00f6nderilen bir kod gibi ikinci bir fakt\u00f6r olmadan cihaza eri\u015femez.<\/span><\/p>\r\n<h3 id=\"4-guvenlik-duvari-kullanin\">4. G\u00fcvenlik duvar\u0131 kullan\u0131n<\/h3>\r\n<p><span style=\"font-weight: 400;\">G\u00fcvenlik duvar\u0131 yetkisiz trafi\u011fi ve bilgisayar korsanlar\u0131n\u0131n IoT cihazlar\u0131n\u0131za eri\u015fmesini engelleyebilir. Bu noktada IoT cihazlar\u0131 i\u00e7in \u00f6zel olarak tasarlanm\u0131\u015f bir g\u00fcvenlik duvar\u0131 kullanmay\u0131 d\u00fc\u015f\u00fcnebilirsiniz.<\/span><\/p>\r\n<h3 id=\"5-aginizi-bolumlere-ayirin\">5. A\u011f\u0131n\u0131z\u0131 b\u00f6l\u00fcmlere ay\u0131r\u0131n<\/h3>\r\n<p><span style=\"font-weight: 400;\">A\u011f\u0131n\u0131z\u0131 b\u00f6l\u00fcmlere ay\u0131rmak, IoT cihazlar\u0131n\u0131 di\u011fer a\u011f cihazlar\u0131ndan izole etmenize ve bilgisayar korsanlar\u0131n\u0131n a\u011f\u0131n\u0131z boyunca yanlamas\u0131na hareket etmesini engellemenize yard\u0131mc\u0131 olabilir. Bu noktada IoT cihazlar\u0131 i\u00e7in ayr\u0131 bir a\u011f olu\u015fturmay\u0131 ve bu a\u011fa eri\u015fimi k\u0131s\u0131tlamay\u0131 d\u00fc\u015f\u00fcn\u00fcn.<\/span><\/p>\r\n<h3 id=\"6-ag-trafigini-izleyin\">6. A\u011f trafi\u011fini izleyin<\/h3>\r\n<p><span style=\"font-weight: 400;\">G\u00f6z\u00fcn\u00fcz her zaman a\u011f trafi\u011finizde olsun ve ola\u011fan d\u0131\u015f\u0131 veya \u015f\u00fcpheli etkinlikler olup olmad\u0131\u011f\u0131na bak\u0131n. Bu, bir DDoS sald\u0131r\u0131s\u0131n\u0131 erkenden tespit etmenize ve yan\u0131t vermenize yard\u0131mc\u0131 olabilir.<\/span><\/p>\r\n<h3 id=\"7-bir-cdn-icerik-dagitim-agi-kullanin\">7. Bir CDN (\u0130\u00e7erik Da\u011f\u0131t\u0131m A\u011f\u0131) kullan\u0131n<\/h3>\r\n<p><span style=\"font-weight: 400;\">CDN&#8217;ler, trafi\u011fi farkl\u0131 sunuculara da\u011f\u0131tmaya yard\u0131mc\u0131 olabilir ve tek bir sunucunun bir DDoS sald\u0131r\u0131s\u0131na maruz kalmas\u0131n\u0131 \u00f6nleyebilir. IoT cihazlar\u0131n\u0131z\u0131 korumak i\u00e7in bir CDN kullanmay\u0131 d\u00fc\u015f\u00fcn\u00fcn.<\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">Bu ad\u0131mlar\u0131 izleyerek IoT cihazlar\u0131n\u0131z\u0131n DDoS sald\u0131r\u0131lar\u0131n\u0131n hedefi olma riskini \u00f6nemli \u00f6l\u00e7\u00fcde azaltabilirsiniz.<\/span><\/p>\r\n","protected":false},"excerpt":{"rendered":"Uzmanlar, 2018\u2019de toplam 7,9 milyon olan DDoS sald\u0131r\u0131 say\u0131s\u0131n\u0131n 2023&#8217;e kadar iki kat\u0131na \u00e7\u0131karak 15 milyonu a\u015faca\u011f\u0131na inan\u0131yor.&hellip;\n","protected":false},"author":1,"featured_media":2545,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"csco_singular_sidebar":"","csco_page_header_type":"","csco_appearance_grid":"","csco_page_load_nextpost":"","csco_post_video_location":[],"csco_post_video_location_hash":"","csco_post_video_url":"","csco_post_video_bg_start_time":0,"csco_post_video_bg_end_time":0},"categories":[11],"tags":[24],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>DDOS Nedir? DDOS Sald\u0131r\u0131lar\u0131ndan Korunman\u0131n 12 Yolu - Bulutistan Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/bulutistan.com\/blog\/ddos-nedir\/\" \/>\n<meta property=\"og:locale\" content=\"tr_TR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DDOS Nedir? DDOS Sald\u0131r\u0131lar\u0131ndan Korunman\u0131n 12 Yolu - Bulutistan Blog\" \/>\n<meta property=\"og:description\" content=\"Uzmanlar, 2018\u2019de toplam 7,9 milyon olan DDoS sald\u0131r\u0131 say\u0131s\u0131n\u0131n 2023&#8217;e kadar iki kat\u0131na \u00e7\u0131karak 15 milyonu a\u015faca\u011f\u0131na inan\u0131yor.&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/bulutistan.com\/blog\/ddos-nedir\/\" \/>\n<meta property=\"og:site_name\" content=\"Bulutistan Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-21T11:12:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-20T11:03:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/bulutistan.com\/blog\/wp-content\/uploads\/2021\/10\/ddos-nedir-ddos-saldirilarindan-korunmanin-12-yolu.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"750\" \/>\n\t<meta property=\"og:image:height\" content=\"375\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Bulutistan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Yazan:\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bulutistan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tahmini okuma s\u00fcresi\" \/>\n\t<meta name=\"twitter:data2\" content=\"18 dakika\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/bulutistan.com\/blog\/ddos-nedir\/\",\"url\":\"https:\/\/bulutistan.com\/blog\/ddos-nedir\/\",\"name\":\"DDOS Nedir? DDOS Sald\u0131r\u0131lar\u0131ndan Korunman\u0131n 12 Yolu - Bulutistan Blog\",\"isPartOf\":{\"@id\":\"https:\/\/bulutistan.com\/blog\/#website\"},\"datePublished\":\"2021-10-21T11:12:01+00:00\",\"dateModified\":\"2024-01-20T11:03:30+00:00\",\"author\":{\"@id\":\"https:\/\/bulutistan.com\/blog\/#\/schema\/person\/06a4312aff9f5a9fc23e25fe7a27076e\"},\"inLanguage\":\"tr\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/bulutistan.com\/blog\/ddos-nedir\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/bulutistan.com\/blog\/#website\",\"url\":\"https:\/\/bulutistan.com\/blog\/\",\"name\":\"Bulutistan Blog\",\"description\":\"Teknolojide Yol Arkada\u015f\u0131n\u0131z\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/bulutistan.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"tr\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/bulutistan.com\/blog\/#\/schema\/person\/06a4312aff9f5a9fc23e25fe7a27076e\",\"name\":\"Bulutistan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\/\/bulutistan.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0b09f693645c754f52af6ce46e1749e1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0b09f693645c754f52af6ce46e1749e1?s=96&d=mm&r=g\",\"caption\":\"Bulutistan\"},\"sameAs\":[\"https:\/\/bulutistan.com\/blog\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DDOS Nedir? DDOS Sald\u0131r\u0131lar\u0131ndan Korunman\u0131n 12 Yolu - Bulutistan Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/bulutistan.com\/blog\/ddos-nedir\/","og_locale":"tr_TR","og_type":"article","og_title":"DDOS Nedir? DDOS Sald\u0131r\u0131lar\u0131ndan Korunman\u0131n 12 Yolu - Bulutistan Blog","og_description":"Uzmanlar, 2018\u2019de toplam 7,9 milyon olan DDoS sald\u0131r\u0131 say\u0131s\u0131n\u0131n 2023&#8217;e kadar iki kat\u0131na \u00e7\u0131karak 15 milyonu a\u015faca\u011f\u0131na inan\u0131yor.&hellip;","og_url":"https:\/\/bulutistan.com\/blog\/ddos-nedir\/","og_site_name":"Bulutistan Blog","article_published_time":"2021-10-21T11:12:01+00:00","article_modified_time":"2024-01-20T11:03:30+00:00","og_image":[{"width":750,"height":375,"url":"https:\/\/bulutistan.com\/blog\/wp-content\/uploads\/2021\/10\/ddos-nedir-ddos-saldirilarindan-korunmanin-12-yolu.jpeg","type":"image\/jpeg"}],"author":"Bulutistan","twitter_card":"summary_large_image","twitter_misc":{"Yazan:":"Bulutistan","Tahmini okuma s\u00fcresi":"18 dakika"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/bulutistan.com\/blog\/ddos-nedir\/","url":"https:\/\/bulutistan.com\/blog\/ddos-nedir\/","name":"DDOS Nedir? DDOS Sald\u0131r\u0131lar\u0131ndan Korunman\u0131n 12 Yolu - Bulutistan Blog","isPartOf":{"@id":"https:\/\/bulutistan.com\/blog\/#website"},"datePublished":"2021-10-21T11:12:01+00:00","dateModified":"2024-01-20T11:03:30+00:00","author":{"@id":"https:\/\/bulutistan.com\/blog\/#\/schema\/person\/06a4312aff9f5a9fc23e25fe7a27076e"},"inLanguage":"tr","potentialAction":[{"@type":"ReadAction","target":["https:\/\/bulutistan.com\/blog\/ddos-nedir\/"]}]},{"@type":"WebSite","@id":"https:\/\/bulutistan.com\/blog\/#website","url":"https:\/\/bulutistan.com\/blog\/","name":"Bulutistan Blog","description":"Teknolojide Yol Arkada\u015f\u0131n\u0131z","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/bulutistan.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"tr"},{"@type":"Person","@id":"https:\/\/bulutistan.com\/blog\/#\/schema\/person\/06a4312aff9f5a9fc23e25fe7a27076e","name":"Bulutistan","image":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/bulutistan.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0b09f693645c754f52af6ce46e1749e1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0b09f693645c754f52af6ce46e1749e1?s=96&d=mm&r=g","caption":"Bulutistan"},"sameAs":["https:\/\/bulutistan.com\/blog"]}]}},"_links":{"self":[{"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/posts\/2543"}],"collection":[{"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/comments?post=2543"}],"version-history":[{"count":7,"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/posts\/2543\/revisions"}],"predecessor-version":[{"id":4309,"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/posts\/2543\/revisions\/4309"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/media\/2545"}],"wp:attachment":[{"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/media?parent=2543"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/categories?post=2543"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/tags?post=2543"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}