{"id":5299,"date":"2023-10-24T00:00:40","date_gmt":"2023-10-24T00:00:40","guid":{"rendered":"https:\/\/sunucucozumleri.com\/?p=5299"},"modified":"2023-12-05T04:34:56","modified_gmt":"2023-12-05T01:34:56","slug":"ddos-saldirilari-ve-guvenlik-onlemleri","status":"publish","type":"post","link":"https:\/\/sunucucozumleri.com\/blog\/ddos-saldirilari-ve-guvenlik-onlemleri\/","title":{"rendered":"DDoS Sald\u0131r\u0131lar\u0131 ve G\u00fcvenlik \u00d6nlemleri"},"content":{"rendered":"<p>DDoS sald\u0131r\u0131lar\u0131na kar\u015f\u0131 acil tepki \u00f6nlemleri | DDoS sald\u0131r\u0131lar\u0131n\u0131n gelece\u011fi ve yenilikleri. <\/p>\n<p>Bu blog yaz\u0131s\u0131nda DDoS sald\u0131r\u0131lar\u0131na odaklanaca\u011f\u0131z. \u0130lk olarak, DDoS sald\u0131r\u0131lar\u0131n\u0131n ne oldu\u011funu ve nas\u0131l \u00e7al\u0131\u015ft\u0131\u011f\u0131n\u0131 ele alaca\u011f\u0131z. Daha sonra, sald\u0131r\u0131lar\u0131n yayg\u0131n kullan\u0131lan tekniklerine g\u00f6z ataca\u011f\u0131z ve hangi sekt\u00f6rlerin ve kurumlar\u0131n hedef al\u0131nd\u0131\u011f\u0131na dair bilgiler sunaca\u011f\u0131z. Ayr\u0131ca, DDoS sald\u0131r\u0131lar\u0131na kar\u015f\u0131 al\u0131nabilecek temel g\u00fcvenlik \u00f6nlemlerini ve g\u00fcvenlik duvar\u0131 kullan\u0131m\u0131n\u0131n \u00f6nemini ele alaca\u011f\u0131z. Sald\u0131r\u0131lar\u0131 tespit etmek ve engellemek i\u00e7in izlenecek ad\u0131mlar\u0131 da inceleyece\u011fiz. Son olarak, profesyonel g\u00fcvenlik \u00e7\u00f6z\u00fcmlerinin konuya nas\u0131l katk\u0131da bulundu\u011funu ve DDoS sald\u0131r\u0131lar\u0131n\u0131n gelecekte ne gibi yeniliklere u\u011frayabilece\u011fini tart\u0131\u015faca\u011f\u0131z. DDoS sald\u0131r\u0131lar\u0131ndan korunma konusunda en son bilgilere sahip olmak i\u00e7in bu blog yaz\u0131s\u0131n\u0131 ka\u00e7\u0131rmay\u0131n!<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Makale \u0130\u00e7eri\u011fi<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"\u0130\u00e7indekiler Tablosunu A\u00e7\/Kapat\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/sunucucozumleri.com\/blog\/ddos-saldirilari-ve-guvenlik-onlemleri\/#DDoS_saldirilarinin_tanimi_ve_isleyisi\" >DDoS sald\u0131r\u0131lar\u0131n\u0131n tan\u0131m\u0131 ve i\u015fleyi\u015fi<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/sunucucozumleri.com\/blog\/ddos-saldirilari-ve-guvenlik-onlemleri\/#DDoS_saldirilarinin_yaygin_kullanilan_teknikleri\" >DDoS sald\u0131r\u0131lar\u0131n\u0131n yayg\u0131n kullan\u0131lan teknikleri<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/sunucucozumleri.com\/blog\/ddos-saldirilari-ve-guvenlik-onlemleri\/#DDoS_Saldirilarinin_Yaygin_Kullanilan_Teknikleri\" >DDoS Sald\u0131r\u0131lar\u0131n\u0131n Yayg\u0131n Kullan\u0131lan Teknikleri<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/sunucucozumleri.com\/blog\/ddos-saldirilari-ve-guvenlik-onlemleri\/#Referanslar\" >Referanslar:<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/sunucucozumleri.com\/blog\/ddos-saldirilari-ve-guvenlik-onlemleri\/#DDoS_saldirilarinin_hedefledigi_sektorler_ve_kurumlar\" >DDoS sald\u0131r\u0131lar\u0131n\u0131n hedefledi\u011fi sekt\u00f6rler ve kurumlar<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/sunucucozumleri.com\/blog\/ddos-saldirilari-ve-guvenlik-onlemleri\/#DDoS_saldirilarina_karsi_alinabilecek_temel_guvenlik_onlemleri\" >DDoS sald\u0131r\u0131lar\u0131na kar\u015f\u0131 al\u0131nabilecek temel g\u00fcvenlik \u00f6nlemleri<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/sunucucozumleri.com\/blog\/ddos-saldirilari-ve-guvenlik-onlemleri\/#DDoS_saldirilarina_karsi_guvenlik_duvari_kullanimi\" >DDoS sald\u0131r\u0131lar\u0131na kar\u015f\u0131 g\u00fcvenlik duvar\u0131 kullan\u0131m\u0131<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/sunucucozumleri.com\/blog\/ddos-saldirilari-ve-guvenlik-onlemleri\/#DDoS_saldirisi_tespiti_ve_engellenmesi_icin_izlenecek_adimlar\" >DDoS sald\u0131r\u0131s\u0131 tespiti ve engellenmesi i\u00e7in izlenecek ad\u0131mlar<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/sunucucozumleri.com\/blog\/ddos-saldirilari-ve-guvenlik-onlemleri\/#DDoS_saldirilarina_karsi_profesyonel_guvenlik_cozumleri\" >DDoS sald\u0131r\u0131lar\u0131na kar\u015f\u0131 profesyonel g\u00fcvenlik \u00e7\u00f6z\u00fcmleri<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"DDoS_saldirilarinin_tanimi_ve_isleyisi\"><\/span>DDoS sald\u0131r\u0131lar\u0131n\u0131n tan\u0131m\u0131 ve i\u015fleyi\u015fi<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>DDoS sald\u0131r\u0131lar\u0131, hedeflenen bir a\u011f veya sistem \u00fczerindeki trafi\u011fi hedef sistemin kaynaklar\u0131n\u0131 t\u00fcketip, onlar\u0131 i\u015flemez hale getiren sald\u0131r\u0131 y\u00f6ntemleridir. DDoS, yani &#8220;Da\u011f\u0131t\u0131k Hizmet Reddi&#8221; sald\u0131r\u0131lar\u0131, bir veya daha fazla sald\u0131rgan\u0131n birden \u00e7ok kaynaktan sald\u0131r\u0131lar\u0131 y\u00f6nlendirmesiyle ger\u00e7ekle\u015fir. Bu sald\u0131r\u0131larda sald\u0131rganlar genellikle botnet ad\u0131 verilen, daha \u00f6nceden ele ge\u00e7irdikleri bilgisayarlardan olu\u015fturduklar\u0131 b\u00fcy\u00fck bir k\u00f6le <a href=\"https:\/\/sunucucozumleri.com\/blog\/bilgisayar-nasil-kullanilir\/\">bilgisayar<\/a> ordusu kullan\u0131rlar.<\/p>\n<p>DDoS sald\u0131r\u0131lar\u0131n\u0131n yayg\u0131n kullan\u0131lan teknikleri aras\u0131nda UDP sald\u0131r\u0131lar\u0131, SYN sald\u0131r\u0131lar\u0131, HTTP GET sald\u0131r\u0131lar\u0131 ve ICMP sald\u0131r\u0131lar\u0131 bulunmaktad\u0131r. UDP sald\u0131r\u0131lar\u0131, hedef sistemlere k\u0131sa s\u00fcreli yo\u011fun UDP paketleri g\u00f6nderilerek kaynak t\u00fckenmesi yolunu izler. SYN sald\u0131r\u0131lar\u0131 ise hedef sisteme gereksiz SYN istekleri g\u00f6ndererek, hedefin kaynaklar\u0131n\u0131 i\u015flem yapamaz hale getirir. HTTP GET sald\u0131r\u0131lar\u0131, hedef sisteme ayn\u0131 anda \u00e7ok say\u0131da yan\u0131ts\u0131z istek g\u00f6ndererek kaynaklar\u0131 t\u00fcketir. ICMP sald\u0131r\u0131lar\u0131 ise hedef sisteme ICMP Echo Request paketleri g\u00f6ndererek kaynak t\u00fcketimi sa\u011flar.<\/p>\n<p>DDoS sald\u0131r\u0131lar\u0131 her sekt\u00f6r ve kurulu\u015f i\u00e7in potansiyel bir tehlike olu\u015fturabilir. Finansal kurulu\u015flar, e-ticaret siteleri, b\u00fcy\u00fck \u015firketler, h\u00fck\u00fcmet kurumlar\u0131 gibi yo\u011fun trafi\u011fe sahip sistemler, DDoS sald\u0131r\u0131lar\u0131 i\u00e7in daha fazla risk alt\u0131ndad\u0131r. Sald\u0131r\u0131lar\u0131n hedefi genellikle web hizmetleri, e-posta sunucular\u0131, DNS sunucular\u0131 gibi kritik sistemlerdir. Bu nedenle, bu hedeflerdeki kurulu\u015flar, DDoS sald\u0131r\u0131lar\u0131na kar\u015f\u0131 etkin \u00f6nlemler almal\u0131d\u0131r.<\/p>\n<ul>\n<li>DDoS sald\u0131r\u0131lar\u0131na kar\u015f\u0131 al\u0131nabilecek temel g\u00fcvenlik \u00f6nlemleri \u015funlard\u0131r:<\/li>\n<li>Y\u00fcksek bant geni\u015fli\u011fi ile donanm\u0131\u015f a\u011f altyap\u0131s\u0131 sa\u011flamak<\/li>\n<li>DDoS sald\u0131r\u0131lar\u0131n\u0131 tespit edip engellemek i\u00e7in g\u00fcncel ve etkili bir g\u00fcvenlik duvar\u0131 kullanmak<\/li>\n<li>\u0130stikrarl\u0131 bir a\u011f yap\u0131land\u0131rmas\u0131 olu\u015fturmak ve a\u011f kaynaklar\u0131n\u0131 etkin \u015fekilde kullanmak<\/li>\n<li>Trafik analizi yaparak anormal aktiviteleri tespit etmek ve \u00f6nlem almak<\/li>\n<\/ul>\n<table>\n<tr>\n<th>Sald\u0131r\u0131 T\u00fcr\u00fc<\/th>\n<th>A\u00e7\u0131klama<\/th>\n<\/tr>\n<tr>\n<td>UDP Sald\u0131r\u0131lar\u0131<\/td>\n<td>Hedef sistemlere yo\u011fun UDP paketleri g\u00f6nderilerek kaynak t\u00fckenmesi sa\u011flan\u0131r<\/td>\n<\/tr>\n<tr>\n<td>SYN Sald\u0131r\u0131lar\u0131<\/td>\n<td>Gereksiz SYN istekleri g\u00f6nderilerek hedefin kaynaklar\u0131 i\u015flemez hale getirilir<\/td>\n<\/tr>\n<tr>\n<td>HTTP GET Sald\u0131r\u0131lar\u0131<\/td>\n<td>Ayn\u0131 anda \u00e7ok say\u0131da yan\u0131ts\u0131z istek g\u00f6nderilerek kaynaklar t\u00fcketilir<\/td>\n<\/tr>\n<tr>\n<td>ICMP Sald\u0131r\u0131lar\u0131<\/td>\n<td>Hedefe ICMP Echo Request paketleri g\u00f6nderilerek kaynak t\u00fcketimi sa\u011flan\u0131r<\/td>\n<\/tr>\n<\/table>\n<h2><span class=\"ez-toc-section\" id=\"DDoS_saldirilarinin_yaygin_kullanilan_teknikleri\"><\/span>DDoS sald\u0131r\u0131lar\u0131n\u0131n yayg\u0131n kullan\u0131lan teknikleri<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>DDoS sald\u0131r\u0131lar\u0131, internetin do\u011fas\u0131 gere\u011fi kullan\u0131lan yayg\u0131n bir sald\u0131r\u0131 t\u00fcr\u00fcd\u00fcr. Bu sald\u0131r\u0131lar, bir hedefe yo\u011fun bir \u015fekilde veri trafi\u011fi g\u00f6ndererek hedef sistemlerin \u00e7al\u0131\u015fmas\u0131n\u0131 engellemeyi ama\u00e7lar. DDoS sald\u0131r\u0131lar\u0131n\u0131n yayg\u0131n olarak kullan\u0131lan baz\u0131 teknikleri vard\u0131r.<\/p>\n<p>Birincil DDoS sald\u0131r\u0131 tekni\u011fi, botnetlerdir. Botnetler, sald\u0131rganlar\u0131n bir dizi bilgisayara zararl\u0131 yaz\u0131l\u0131mlar y\u00fcklemelerine ve bu bilgisayarlar\u0131 kontrol etmelerine olanak tan\u0131r. Bu k\u00f6le bilgisayarlar, sald\u0131r\u0131y\u0131 koordine eden komuta ve kontrol (C&#038;C) sunucusuyla ileti\u015fim halindedir. Sald\u0131rganlar, bu botnetleri kullanarak hedef sistemlere b\u00fcy\u00fck miktarda trafik g\u00f6nderir ve kaynaklar\u0131n\u0131 t\u00fcketir.<\/p>\n<p>\u0130kincil yayg\u0131n DDoS sald\u0131r\u0131 tekni\u011fi, DNS amplifikasyon sald\u0131r\u0131lar\u0131d\u0131r. Bu sald\u0131r\u0131lar, sald\u0131rganlar\u0131n orant\u0131s\u0131z bir \u015fekilde b\u00fcy\u00fct\u00fclm\u00fc\u015f DNS istekleri g\u00f6ndererek hedef sistemlerin kaynaklar\u0131n\u0131 a\u015f\u0131r\u0131 y\u00fcklemesini sa\u011flar. Sald\u0131rganlar, ba\u015fka bir sunucuyu hedefe sahte bir IP adresinden DNS mesajlar\u0131n\u0131 g\u00f6nderen bir kaynak olarak taklit etme yetene\u011fine sahiptir. Bu, hedef sisteme \u00e7ok daha fazla trafikle yan\u0131t vermesini sa\u011flar.<\/p>\n<p>Bir di\u011fer yayg\u0131n DDoS sald\u0131r\u0131 tekni\u011fi ise SYN flood sald\u0131r\u0131lar\u0131d\u0131r. Bu sald\u0131r\u0131lar, hedef sistemlere TCP (\u0130leti\u015fim Kontrol Protokol\u00fc) ba\u011flant\u0131 sorusunu yan\u0131tlamak i\u00e7in kaynaklar\u0131n\u0131 t\u00fcketmelerini zorlayan bir sald\u0131r\u0131d\u0131r. Sald\u0131rganlar, TCP \u00fc\u00e7l\u00fc el s\u0131k\u0131\u015fma i\u015flemi s\u0131ras\u0131nda sunucuya g\u00f6nderilen SYN paketlerini g\u00f6ndererek kaynaklar\u0131 a\u015f\u0131r\u0131 y\u00fckleyerek hizmetin kesintiye u\u011framas\u0131na neden olurlar.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"DDoS_Saldirilarinin_Yaygin_Kullanilan_Teknikleri\"><\/span>DDoS Sald\u0131r\u0131lar\u0131n\u0131n Yayg\u0131n Kullan\u0131lan Teknikleri<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<ul>\n<li>Botnetler<\/li>\n<li>DNS amplifikasyon sald\u0131r\u0131lar\u0131<\/li>\n<li>SYN flood sald\u0131r\u0131lar\u0131<\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"Referanslar\"><\/span>Referanslar:<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<table>\n<tr>\n<th>Kaynak<\/th>\n<th>Link<\/th>\n<\/tr>\n<tr>\n<td>OWASP<\/td>\n<td>https:\/\/owasp.org\/www-project-ddos-defense-guide\/<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/sunucucozumleri.com\/blog\/cloudflare-rehberi\/\">Cloudflare<\/a><\/td>\n<td>https:\/\/www.cloudflare.com\/learning\/ddos\/glossary\/distributed-denial-of-service-ddos\/<\/td>\n<\/tr>\n<tr>\n<td>Imperva<\/td>\n<td>https:\/\/www.imperva.com\/learn\/application-security\/ddos-denial-of-service\/what-is-a-ddos-attack\/<\/td>\n<\/tr>\n<\/table>\n<h2><span class=\"ez-toc-section\" id=\"DDoS_saldirilarinin_hedefledigi_sektorler_ve_kurumlar\"><\/span>DDoS sald\u0131r\u0131lar\u0131n\u0131n hedefledi\u011fi sekt\u00f6rler ve kurumlar<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>DDoS sald\u0131r\u0131lar\u0131, g\u00fcn\u00fcm\u00fczde internet \u00fczerindeki bir\u00e7ok sekt\u00f6r ve kurum i\u00e7in ciddi bir tehdit olu\u015fturmaktad\u0131r. Bu sald\u0131r\u0131lar, sistemlerin veya web sitelerinin hedef al\u0131narak, a\u015f\u0131r\u0131 trafik ak\u0131\u015f\u0131yla kaynaklar\u0131n t\u00fckenmesine ve hizmet engeline neden olmaktad\u0131r.<\/p>\n<p>Bu sald\u0131r\u0131lar, genellikle finansal sekt\u00f6r, e-ticaret, h\u00fck\u00fcmet kurumlar\u0131, haber siteleri, medya \u015firketleri ve b\u00fcy\u00fck \u00f6l\u00e7ekli \u015firketler gibi y\u00fcksek profilli kurumlar\u0131 hedeflemektedir. Finansal sekt\u00f6rdeki bankalar, kredi kart\u0131 \u015firketleri ve \u00f6deme sistemi sa\u011flay\u0131c\u0131lar\u0131, b\u00fcy\u00fck \u00f6l\u00e7ekli para i\u015flemleri ve hassas finansal verileri nedeniyle DDoS sald\u0131r\u0131lar\u0131na kar\u015f\u0131 \u00f6nemli bir risk alt\u0131ndad\u0131r.<\/p>\n<p>Ayr\u0131ca, e-ticaret siteleri de DDoS sald\u0131r\u0131lar\u0131na maruz kalma riski y\u00fcksek olan kurumlardan biridir. Bu t\u00fcr sald\u0131r\u0131lar\u0131n bir sonucu olarak, web sitesine eri\u015fim engellenebilir ve b\u00f6ylece m\u00fc\u015fterilerin al\u0131\u015fveri\u015f yapmas\u0131 veya siteye eri\u015fmeleri engellenebilir. Bu da b\u00fcy\u00fck bir gelir kayb\u0131na ve itibar kayb\u0131na neden olabilir.<\/p>\n<ul>\n<li>H\u00fck\u00fcmet kurumlar\u0131 ve kamu kurulu\u015flar\u0131 da DDoS sald\u0131r\u0131lar\u0131ndan etkilenen kurumlard\u0131r. \u00d6zellikle politik nedenlerle yap\u0131lan sald\u0131r\u0131lar, h\u00fck\u00fcmet web sitelerini kapatma veya hizmetlerini k\u0131s\u0131tlama potansiyeline sahiptir.<\/li>\n<li>Haber siteleri ve medya \u015firketleri de bilgi ak\u0131\u015f\u0131n\u0131n \u00f6nemli oldu\u011fu kurumlar oldu\u011fu i\u00e7in DDoS sald\u0131r\u0131lar\u0131na kar\u015f\u0131 hassast\u0131r. Bu t\u00fcr sald\u0131r\u0131lar, haberlere eri\u015fimi engelleyerek veya i\u00e7eri\u011fi de\u011fi\u015ftirerek akreditasyonu veya yay\u0131nlar\u0131 bozabilir.<\/li>\n<li>B\u00fcy\u00fck \u00f6l\u00e7ekli i\u015fletmeler de DDoS sald\u0131r\u0131lar\u0131na hedef olan bir ba\u015fka sekt\u00f6rd\u00fcr. Bu i\u015fletmelerin web siteleri ve sistemleri, m\u00fc\u015fteri ili\u015fkileri, sat\u0131\u015f ve tedarik zinciri gibi i\u015f kritik s\u00fcre\u00e7lerle entegre oldu\u011fundan, sald\u0131r\u0131lar ciddi maddi kay\u0131plara ve operasyonel aksakl\u0131klara neden olabilir.<\/li>\n<\/ul>\n<table>\n<tr>\n<th>Sekt\u00f6r\/Kurum<\/th>\n<th>DDoS Sald\u0131r\u0131lar\u0131na Yatk\u0131nl\u0131k<\/th>\n<\/tr>\n<tr>\n<td>Finansal Sekt\u00f6r<\/td>\n<td>Y\u00fcksek<\/td>\n<\/tr>\n<tr>\n<td>E-ticaret<\/td>\n<td>Y\u00fcksek<\/td>\n<\/tr>\n<tr>\n<td>H\u00fck\u00fcmet ve Kamu Kurulu\u015flar\u0131<\/td>\n<td>Orta<\/td>\n<\/tr>\n<tr>\n<td>Haber ve Medya<\/td>\n<td>Orta<\/td>\n<\/tr>\n<tr>\n<td>B\u00fcy\u00fck \u00d6l\u00e7ekli \u0130\u015fletmeler<\/td>\n<td>Y\u00fcksek<\/td>\n<\/tr>\n<\/table>\n<p>DDoS sald\u0131r\u0131lar\u0131na kar\u015f\u0131 hedeflenen sekt\u00f6rler ve kurumlar i\u015flerini ve itibarlar\u0131n\u0131 korumak i\u00e7in g\u00fcvenlik \u00f6nlemleri almak zorundad\u0131r. Sadece temel g\u00fcvenlik \u00f6nlemleri yeterli olmayabilir. Profesyonel g\u00fcvenlik \u00e7\u00f6z\u00fcmlerinin kullan\u0131lmas\u0131, sald\u0131r\u0131lara kar\u015f\u0131 daha etkili bir koruma sa\u011flayabilir.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"DDoS_saldirilarina_karsi_alinabilecek_temel_guvenlik_onlemleri\"><\/span>DDoS sald\u0131r\u0131lar\u0131na kar\u015f\u0131 al\u0131nabilecek temel g\u00fcvenlik \u00f6nlemleri<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>DDoS sald\u0131r\u0131lar\u0131, internet \u00fczerindeki bir hedefe yo\u011fun ve s\u00fcrekli veri trafi\u011fi g\u00f6ndererek, hedefin kesintiye u\u011framas\u0131n\u0131 veya hizmetinin tamamen durmas\u0131n\u0131 ama\u00e7layan sald\u0131r\u0131lard\u0131r. Bu t\u00fcr sald\u0131r\u0131lar, g\u00fcn\u00fcm\u00fczde internet kullan\u0131m\u0131n\u0131n artmas\u0131yla birlikte yayg\u0131n hale gelmi\u015ftir. DDoS sald\u0131r\u0131lar\u0131na kar\u015f\u0131 al\u0131nacak temel g\u00fcvenlik \u00f6nlemleri, kullan\u0131c\u0131lar\u0131 ve kurumlar\u0131 bu t\u00fcr sald\u0131r\u0131lara kar\u015f\u0131 korumak ad\u0131na son derece \u00f6nemlidir.<\/p>\n<p>Birincil \u00f6nlem olarak, g\u00fc\u00e7l\u00fc bir g\u00fcvenlik yaz\u0131l\u0131m\u0131 ve donan\u0131m\u0131 kullanmak gereklidir. Bu, bilgisayar sistemlerini sald\u0131r\u0131lara kar\u015f\u0131 korumak ve sald\u0131r\u0131lar\u0131 tespit etmek i\u00e7in kullan\u0131lan bir g\u00fcvenlik duvar\u0131n\u0131 i\u00e7erir. G\u00fcvenlik duvar\u0131, gelen ve giden trafi\u011fi izleyerek zararl\u0131 veya \u015f\u00fcpheli aktiviteleri belirleyebilir ve bunlara kar\u015f\u0131 \u00f6nlem alabilir.<\/p>\n<p>\u0130kincil bir \u00f6nlem olarak, trafik analiz ve izleme y\u00f6ntemleri kullan\u0131labilir. Trafik analizi, normal ve zararl\u0131 trafik aras\u0131ndaki farklar\u0131 belirlemek i\u00e7in kullan\u0131l\u0131r. Bu \u015fekilde, sald\u0131r\u0131lar \u00f6nceden tespit edilebilir ve \u00f6nlem al\u0131nabilir. G\u00fcvenlik \u00e7\u00f6z\u00fcmleri, sald\u0131r\u0131lar\u0131 tespit etmek ve sald\u0131r\u0131 trafi\u011fini bloke etmek i\u00e7in karma\u015f\u0131k algoritmalar ve teknikler kullan\u0131r.<\/p>\n<ul>\n<li>G\u00fc\u00e7l\u00fc bir g\u00fcvenlik yaz\u0131l\u0131m\u0131 ve donan\u0131m\u0131 kullan\u0131n<\/li>\n<li>Trafik analiz ve izleme y\u00f6ntemleri kullan\u0131n<\/li>\n<li>G\u00fcvenlik \u00e7\u00f6z\u00fcmleriyle sald\u0131r\u0131lar\u0131 tespit edin ve engelleyin<\/li>\n<\/ul>\n<table>\n<tr>\n<th>G\u00fcvenlik \u00d6nlemi<\/th>\n<th>A\u00e7\u0131klama<\/th>\n<\/tr>\n<tr>\n<td>G\u00fcvenlik duvar\u0131 kullan\u0131m\u0131<\/td>\n<td>Gelen ve giden trafi\u011fi izleyerek zararl\u0131 veya \u015f\u00fcpheli aktiviteleri belirler ve \u00f6nlem al\u0131r.<\/td>\n<\/tr>\n<tr>\n<td>Trafik analizi<\/td>\n<td>Normal ve zararl\u0131 trafik aras\u0131ndaki farklar\u0131 belirleyerek sald\u0131r\u0131lar\u0131 \u00f6nceden tespit eder ve \u00f6nlem al\u0131r.<\/td>\n<\/tr>\n<tr>\n<td>G\u00fcvenlik \u00e7\u00f6z\u00fcmleri kullanma<\/td>\n<td>Karma\u015f\u0131k algoritmalar ve teknikler kullanarak sald\u0131r\u0131lar\u0131 tespit eder ve sald\u0131r\u0131 trafi\u011fini bloke eder.<\/td>\n<\/tr>\n<\/table>\n<h2><span class=\"ez-toc-section\" id=\"DDoS_saldirilarina_karsi_guvenlik_duvari_kullanimi\"><\/span>DDoS sald\u0131r\u0131lar\u0131na kar\u015f\u0131 g\u00fcvenlik duvar\u0131 kullan\u0131m\u0131<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>DDoS (Distributed Denial of Service) sald\u0131r\u0131lar\u0131, giderek artan bir tehdit haline gelmi\u015ftir. Bu sald\u0131r\u0131lar, bir\u00e7ok sekt\u00f6r\u00fc ve kurumu hedef alabilen zararl\u0131 sald\u0131r\u0131 y\u00f6ntemleridir. Bu nedenle, bu t\u00fcr sald\u0131r\u0131lara kar\u015f\u0131 \u00f6nlemler almak ve g\u00fcvenlik sistemlerini g\u00fc\u00e7lendirmek \u00f6nemlidir. G\u00fcvenlik duvar\u0131, DDoS sald\u0131r\u0131lar\u0131nda etkin bir \u015fekilde kullan\u0131lan bir g\u00fcvenlik \u00f6nlemidir.<\/p>\n<p>G\u00fcvenlik duvar\u0131, bir a\u011fa gelen ve giden trafi\u011fi denetleyen bir koruma sistemidir. Temel amac\u0131, yetkisiz eri\u015fimleri engellemek ve a\u011f g\u00fcvenli\u011fini sa\u011flamakt\u0131r. DDoS sald\u0131r\u0131lar\u0131na kar\u015f\u0131 da etkili bir \u015fekilde kullan\u0131labilen g\u00fcvenlik duvar\u0131, sald\u0131r\u0131lar\u0131 tan\u0131mlayabilir ve engelleyebilir.<\/p>\n<p>G\u00fcvenlik duvar\u0131n\u0131n DDoS sald\u0131r\u0131lar\u0131n\u0131n tespiti ve engellenmesindeki rol\u00fc olduk\u00e7a \u00f6nemlidir. G\u00fcvenlik duvar\u0131, a\u011fa gelen trafi\u011fi izleyerek anormal durumlar\u0131 tespit eder ve sald\u0131r\u0131y\u0131 engeller. Bu s\u00fcre\u00e7te, trafik analizi yapar, sald\u0131r\u0131y\u0131 tespit eder ve sald\u0131rgan kaynaklar\u0131 engeller. B\u00f6ylece, a\u011f ve sunucular\u0131n DDoS sald\u0131r\u0131lar\u0131na kar\u015f\u0131 daha diren\u00e7li olmas\u0131 sa\u011flan\u0131r.<\/p>\n<p>Bununla birlikte, g\u00fcvenlik duvar\u0131 kullan\u0131m\u0131 tek ba\u015f\u0131na yeterli de\u011fildir. DDoS sald\u0131r\u0131lar\u0131na kar\u015f\u0131 tam koruma sa\u011flamak i\u00e7in di\u011fer g\u00fcvenlik \u00f6nlemleriyle birlikte kullan\u0131lmal\u0131d\u0131r. \u00d6rne\u011fin, sald\u0131r\u0131 tespit sistemi (IDS) ve sald\u0131r\u0131 \u00f6nleme sistemi (IPS) gibi di\u011fer g\u00fcvenlik \u00e7\u00f6z\u00fcmleriyle entegrasyonu \u00f6nemlidir. Bu \u015fekilde, DDoS sald\u0131r\u0131lar\u0131na kar\u015f\u0131 daha g\u00fc\u00e7l\u00fc bir savunma sa\u011flanabilir.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"DDoS_saldirisi_tespiti_ve_engellenmesi_icin_izlenecek_adimlar\"><\/span>DDoS sald\u0131r\u0131s\u0131 tespiti ve engellenmesi i\u00e7in izlenecek ad\u0131mlar<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>DDoS sald\u0131r\u0131lar\u0131 son y\u0131llarda h\u0131zla artan bir tehdit oldu\u011fu i\u00e7in, i\u015fletmelerin bu sald\u0131r\u0131lara kar\u015f\u0131 \u00f6nlem almas\u0131 \u00f6nemlidir. DDoS sald\u0131r\u0131s\u0131 tespiti ve engellenmesi i\u00e7in izlenecek ad\u0131mlar, hem sald\u0131r\u0131n\u0131n tespit edilmesi hem de etkisinin azalt\u0131lmas\u0131 a\u00e7\u0131s\u0131ndan b\u00fcy\u00fck \u00f6nem ta\u015f\u0131r.<\/p>\n<p>Bir DDoS sald\u0131r\u0131s\u0131n\u0131 tespit etmek i\u00e7in ilk ad\u0131m, normal a\u011f trafi\u011fiyle anomali olu\u015fturan bir trafik yo\u011funlu\u011funu tan\u0131mlamakt\u0131r. Bunun i\u00e7in, a\u011f trafi\u011fi analizi yapabilecek g\u00fcvenlik \u00e7\u00f6z\u00fcmleri kullanmak \u00f6nemlidir. G\u00fcvenlik \u00e7\u00f6z\u00fcmleri, a\u011f trafi\u011fi \u00fczerinde s\u00fcrekli olarak izleme yaparak, y\u00fcksek trafik yo\u011funlu\u011fu olu\u015fturan IP adreslerini veya uygulamalar\u0131 tespit edebilir.<\/p>\n<p>Bir di\u011fer ad\u0131m ise, sald\u0131r\u0131ya maruz kalan a\u011f kaynaklar\u0131n\u0131n belirlenmesidir. Bu, a\u011fdaki sunucular\u0131n ve a\u011f cihazlar\u0131n\u0131n \u00fczerinde yap\u0131lan detayl\u0131 analizlerle ger\u00e7ekle\u015ftirilebilir. Sald\u0131r\u0131ya maruz kalan kaynaklar tespit edildikten sonra, bu kaynaklar\u0131n IP adresleri sald\u0131r\u0131 engelleme cihaz\u0131na eklenerek trafik y\u00f6nlendirme yap\u0131larak sald\u0131r\u0131 trafi\u011fi engellenebilir.<\/p>\n<p>Bu ad\u0131mlar\u0131n yan\u0131 s\u0131ra, DDoS sald\u0131r\u0131s\u0131na kar\u015f\u0131 bir acil durum m\u00fcdahale plan\u0131 olu\u015fturmak da \u00f6nemlidir. Bu plan, sald\u0131r\u0131 an\u0131nda yap\u0131labilecek ad\u0131mlar\u0131, g\u00f6revleri ve sorumluluklar\u0131 i\u00e7ermelidir. Ayr\u0131ca, sald\u0131r\u0131 s\u0131ras\u0131nda ileti\u015fim i\u00e7in alternatif y\u00f6ntemlerin belirlenmesi de plan\u0131n bir par\u00e7as\u0131 olmal\u0131d\u0131r.<\/p>\n<ul>\n<li>Sald\u0131r\u0131 tespiti ve engellenmesi<\/li>\n<li>Anomali trafik yo\u011funlu\u011funun tan\u0131mlanmas\u0131<\/li>\n<li>A\u011f kaynaklar\u0131n\u0131n belirlenmesi<\/li>\n<li>Sald\u0131r\u0131 engelleme cihaz\u0131 kullan\u0131m\u0131<\/li>\n<li>Acil durum m\u00fcdahale plan\u0131 olu\u015fturma<\/li>\n<li>Alternatif ileti\u015fim y\u00f6ntemlerinin belirlenmesi<\/li>\n<\/ul>\n<table>\n<tr>\n<th>Ad\u0131m<\/th>\n<th>A\u00e7\u0131klama<\/th>\n<\/tr>\n<tr>\n<td>Sald\u0131r\u0131 tespiti ve engellenmesi<\/td>\n<td>Anomali trafik yo\u011funlu\u011funun tan\u0131mlanmas\u0131 ve sald\u0131r\u0131 engelleme cihaz\u0131n\u0131n kullan\u0131lmas\u0131<\/td>\n<\/tr>\n<tr>\n<td>A\u011f kaynaklar\u0131n\u0131n belirlenmesi<\/td>\n<td>Sald\u0131r\u0131ya maruz kalan kaynaklar\u0131n tespit edilmesi ve IP adreslerinin sald\u0131r\u0131 engelleme cihaz\u0131na eklenmesi<\/td>\n<\/tr>\n<tr>\n<td>Acil durum m\u00fcdahale plan\u0131 olu\u015fturma<\/td>\n<td>Sald\u0131r\u0131 an\u0131nda yap\u0131lacak ad\u0131mlar\u0131n, g\u00f6revlerin ve sorumluluklar\u0131n belirlenmesi<\/td>\n<\/tr>\n<\/table>\n<h2><span class=\"ez-toc-section\" id=\"DDoS_saldirilarina_karsi_profesyonel_guvenlik_cozumleri\"><\/span>DDoS sald\u0131r\u0131lar\u0131na kar\u015f\u0131 profesyonel g\u00fcvenlik \u00e7\u00f6z\u00fcmleri<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Bug\u00fcn\u00fcn ba\u011flant\u0131l\u0131 d\u00fcnyas\u0131nda \u00e7evrimi\u00e7i g\u00fcvenlik her zamankinden daha \u00f6nemlidir. \u0130nternetin b\u00fcy\u00fcmesiyle birlikte, siber sald\u0131r\u0131lar da artm\u0131\u015ft\u0131r. Bu sald\u0131r\u0131lardan biri olan DDoS sald\u0131r\u0131lar\u0131, bir\u00e7ok kurum ve kurulu\u015fu hedef almaktad\u0131r. DDoS sald\u0131r\u0131lar\u0131, bir sunucuya veya a\u011fa b\u00fcy\u00fck miktarda trafi\u011fi hedefleyerek hizmetin \u00e7\u00f6kmesine neden olur. Bu sald\u0131r\u0131lar\u0131n etkilerini en aza indirmek i\u00e7in, profesyonel g\u00fcvenlik \u00e7\u00f6z\u00fcmleri kullanmak \u00f6nemlidir.<\/p>\n<p>DDoS sald\u0131r\u0131lar\u0131na kar\u015f\u0131 profesyonel g\u00fcvenlik \u00e7\u00f6z\u00fcmleri, kurumlar\u0131n g\u00fcvenlik seviyelerini art\u0131rmalar\u0131na yard\u0131mc\u0131 olur. Bu \u00e7\u00f6z\u00fcmler genellikle \u00f6zel olarak tasarlanm\u0131\u015f, g\u00fc\u00e7l\u00fc ve \u00f6l\u00e7eklenebilir donan\u0131m ve yaz\u0131l\u0131m bile\u015fenlerini i\u00e7erir. G\u00fcvenlik duvarlar\u0131, IPS (Sald\u0131r\u0131 \u00d6nleyici Sistemler), trafik analiz cihazlar\u0131 ve sald\u0131r\u0131 alg\u0131lama sistemleri gibi teknolojilerle donat\u0131lm\u0131\u015ft\u0131r.<\/p>\n<p>Bu profesyonel g\u00fcvenlik \u00e7\u00f6z\u00fcmleri, \u00e7e\u015fitli koruma mekanizmalar\u0131n\u0131 kullanarak DDoS sald\u0131r\u0131lar\u0131n\u0131 engeller. Sald\u0131r\u0131 trafi\u011fini tespit eder ve sald\u0131rgan trafi\u011fini ayr\u0131\u015ft\u0131r\u0131r. Ak\u0131ll\u0131 algoritmalar kullanarak, ger\u00e7ek trafi\u011fi do\u011frulamak i\u00e7in gelen paketlere filtreleme yapar.<\/p>\n<ul>\n<li><strong>Yedekleme ve Da\u011f\u0131t\u0131k \u0130\u015fg\u00fcc\u00fc<\/strong>: Profesyonel g\u00fcvenlik \u00e7\u00f6z\u00fcmleri, yedekli <a href=\"https:\/\/sunucucozumleri.com\/blog\/frontpage\/\">sunucu<\/a> ve da\u011f\u0131t\u0131k i\u015fg\u00fcc\u00fc teknolojileri kullanarak DDoS sald\u0131r\u0131lar\u0131na kar\u015f\u0131 koruma sa\u011flar. Bu sayede sald\u0131r\u0131 trafi\u011fi, birden \u00e7ok sunucuya da\u011f\u0131t\u0131l\u0131r ve y\u00fck dengelenir.<\/li>\n<li><strong>Teknolojik G\u00fcncellemeler<\/strong>: Profesyonel g\u00fcvenlik \u00e7\u00f6z\u00fcmleri, s\u00fcrekli olarak teknolojik geli\u015fmelere ayak uydurur ve sald\u0131r\u0131 t\u00fcrlerine kar\u015f\u0131 yeni koruma \u00f6nlemleri geli\u015ftirir. Bu sayede DDoS sald\u0131r\u0131lar\u0131na kar\u015f\u0131 g\u00fcncel ve etkili bir \u015fekilde koruma sa\u011flar.<\/li>\n<li><strong>Trafik \u0130zleme ve Analiz<\/strong>: Profesyonel g\u00fcvenlik \u00e7\u00f6z\u00fcmleri, a\u011f trafi\u011fini izler ve analiz eder. Sald\u0131r\u0131lar\u0131 tespit eder ve h\u0131zl\u0131 bir \u015fekilde m\u00fcdahale eder. Ayr\u0131ca, sald\u0131r\u0131lar hakk\u0131nda ayr\u0131nt\u0131l\u0131 raporlar sa\u011flar, kurumlar\u0131n sald\u0131r\u0131lar\u0131 anlamas\u0131na ve gelecekteki sald\u0131r\u0131lar\u0131 \u00f6nlemesine yard\u0131mc\u0131 olur.<\/li>\n<\/ul>\n<table>\n<tr>\n<th>G\u00fcvenlik \u00c7\u00f6z\u00fcm\u00fc<\/th>\n<th>A\u00e7\u0131klama<\/th>\n<\/tr>\n<tr>\n<td>G\u00fcvenlik Duvar\u0131<\/td>\n<td>A\u011f trafi\u011fini denetleyen ve zararl\u0131 trafi\u011fi engelleyen bir donan\u0131m veya yaz\u0131l\u0131m cihaz\u0131d\u0131r.<\/td>\n<\/tr>\n<tr>\n<td>IPS (Sald\u0131r\u0131 \u00d6nleyici Sistemler)<\/td>\n<td>A\u011fa gelen sald\u0131r\u0131 trafi\u011fini tespit eder ve engeller. Anormal trafik desenlerini analiz eder ve \u00f6nlemler al\u0131r.<\/td>\n<\/tr>\n<tr>\n<td>Trafik Analiz Cihazlar\u0131<\/td>\n<td>A\u011f trafi\u011fini izler, analiz eder ve sald\u0131r\u0131lar\u0131 tespit eder. A\u011fdaki dengesizlikleri ve anormallikleri alg\u0131lar.<\/td>\n<\/tr>\n<tr>\n<td>Sald\u0131r\u0131 Alg\u0131lama Sistemleri<\/td>\n<td>A\u011f trafi\u011fini yak\u0131ndan izler ve sald\u0131r\u0131lar\u0131n tespit edilmesine yard\u0131mc\u0131 olur. Sald\u0131r\u0131lar\u0131 belirler ve bildirimler g\u00f6nderir.<\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>DDoS sald\u0131r\u0131lar\u0131na kar\u015f\u0131 acil tepki \u00f6nlemleri | DDoS sald\u0131r\u0131lar\u0131n\u0131n gelece\u011fi ve yenilikleri. Bu blog yaz\u0131s\u0131nda DDoS sald\u0131r\u0131lar\u0131na odaklanaca\u011f\u0131z. \u0130lk olarak, DDoS sald\u0131r\u0131lar\u0131n\u0131n ne oldu\u011funu ve nas\u0131l \u00e7al\u0131\u015ft\u0131\u011f\u0131n\u0131 ele alaca\u011f\u0131z. Daha sonra, sald\u0131r\u0131lar\u0131n yayg\u0131n kullan\u0131lan tekniklerine g\u00f6z ataca\u011f\u0131z ve hangi sekt\u00f6rlerin ve kurumlar\u0131n hedef al\u0131nd\u0131\u011f\u0131na dair bilgiler sunaca\u011f\u0131z. Ayr\u0131ca, DDoS sald\u0131r\u0131lar\u0131na kar\u015f\u0131 al\u0131nabilecek temel g\u00fcvenlik \u00f6nlemlerini &hellip;<\/p>\n","protected":false},"author":6,"featured_media":5298,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[14],"tags":[],"class_list":["post-5299","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-haberler"],"acf":[],"_links":{"self":[{"href":"https:\/\/sunucucozumleri.com\/blog\/wp-json\/wp\/v2\/posts\/5299","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sunucucozumleri.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sunucucozumleri.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sunucucozumleri.com\/blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/sunucucozumleri.com\/blog\/wp-json\/wp\/v2\/comments?post=5299"}],"version-history":[{"count":0,"href":"https:\/\/sunucucozumleri.com\/blog\/wp-json\/wp\/v2\/posts\/5299\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sunucucozumleri.com\/blog\/wp-json\/wp\/v2\/media\/5298"}],"wp:attachment":[{"href":"https:\/\/sunucucozumleri.com\/blog\/wp-json\/wp\/v2\/media?parent=5299"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sunucucozumleri.com\/blog\/wp-json\/wp\/v2\/categories?post=5299"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sunucucozumleri.com\/blog\/wp-json\/wp\/v2\/tags?post=5299"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}