A survey of emerging threats in cybersecurity

被引:400
作者
Jang-Jaccard, Julian [1 ]
Nepal, Surya [1 ]
机构
[1] CSIRO ICT Ctr, Marsfield, NSW, Australia
关键词
Cybersecurity; Malware; Emerging technology trends; Emerging cyber threats; Cyber attacks and countermeasures; SECURITY; INTERNET; SYSTEMS; CHALLENGES; MANAGEMENT; NETWORKS; PRIVACY;
D O I
10.1016/j.jcss.2014.02.005
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The exponential growth of the Internet interconnections has led to a significant growth of cyber attack incidents often with disastrous and grievous consequences. Malware is the primary choice of weapon to carry out malicious intents in the cyberspace, either by exploitation into existing vulnerabilities or utilization of unique characteristics of emerging technologies. The development of more innovative and effective malware defense mechanisms has been regarded as an urgent requirement in the cybersecurity community. To assist in achieving this goal, we first present an overview of the most exploited vulnerabilities in existing hardware, software, and network layers. This is followed by critiques of existing state-of-the-art mitigation techniques as why they do or don't work. We then discuss new attack patterns in emerging technologies such as social media, cloud computing, smartphone technology, and critical infrastructure. Finally, we describe our speculative observations on future research directions. Crown Copyright (c) 2014 Published by Elsevier Inc. All rights reserved.
引用
收藏
页码:973 / 993
页数:21
相关论文
共 126 条
[1]   An overview of social engineering malware: Trends, tactics, and implications [J].
Abraham, Sherly ;
Chengalur-Smith, InduShobha .
TECHNOLOGY IN SOCIETY, 2010, 32 (03) :183-196
[2]  
Almulhem A, 2005, LECT NOTES COMPUT SC, V3391, P62
[3]  
Aloul F., 2009, IEEE INT C COMP SYST
[4]  
[Anonymous], 2011, INT J INFORM SECURIT
[5]  
[Anonymous], THESIS U CALIFORNIA
[6]  
[Anonymous], 2008, Mobile Malware Attacks and Defense
[7]  
[Anonymous], TPM MAIN 1
[8]  
[Anonymous], ANN EM CYB THREATS R
[9]  
[Anonymous], 2006, Software security: building security in
[10]  
[Anonymous], INT SEC THREATS REP