A survey of emerging threats in cybersecurity

被引:368
|
作者
Jang-Jaccard, Julian [1 ]
Nepal, Surya [1 ]
机构
[1] CSIRO ICT Ctr, Marsfield, NSW, Australia
关键词
Cybersecurity; Malware; Emerging technology trends; Emerging cyber threats; Cyber attacks and countermeasures; SECURITY; INTERNET; SYSTEMS; CHALLENGES; MANAGEMENT; NETWORKS; PRIVACY;
D O I
10.1016/j.jcss.2014.02.005
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The exponential growth of the Internet interconnections has led to a significant growth of cyber attack incidents often with disastrous and grievous consequences. Malware is the primary choice of weapon to carry out malicious intents in the cyberspace, either by exploitation into existing vulnerabilities or utilization of unique characteristics of emerging technologies. The development of more innovative and effective malware defense mechanisms has been regarded as an urgent requirement in the cybersecurity community. To assist in achieving this goal, we first present an overview of the most exploited vulnerabilities in existing hardware, software, and network layers. This is followed by critiques of existing state-of-the-art mitigation techniques as why they do or don't work. We then discuss new attack patterns in emerging technologies such as social media, cloud computing, smartphone technology, and critical infrastructure. Finally, we describe our speculative observations on future research directions. Crown Copyright (c) 2014 Published by Elsevier Inc. All rights reserved.
引用
收藏
页码:973 / 993
页数:21
相关论文
共 50 条
  • [1] A Survey: Emerging Cybersecurity Threats in Driverless Cars
    Tiwari, Vaibhavi
    Rajasekar, Dharshana
    Wang, Jiayin
    2024 IEEE 15TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE, UEMCON, 2024, : 183 - 189
  • [2] A Survey on Cybersecurity in IoT
    Dritsas, Elias
    Trigka, Maria
    FUTURE INTERNET, 2025, 17 (01)
  • [3] Cybersecurity threats and mitigation measures in agriculture 4.0 and 5.0
    Maraveas, Chrysanthos
    Rajarajan, Muttukrishnan
    Arvanitis, Konstantinos G.
    Vatsanidou, Anna
    SMART AGRICULTURAL TECHNOLOGY, 2024, 9
  • [4] Survey of Cybersecurity Governance, Threats, and Countermeasures for the Power Grid
    Boeding, Matthew
    Boswell, Kelly
    Hempel, Michael
    Sharif, Hamid
    Lopez, Juan, Jr.
    Perumalla, Kalyan
    ENERGIES, 2022, 15 (22)
  • [5] Cybersecurity for tactical 6G networks: Threats, architecture, and intelligence
    Suomalainen, Jani
    Ahmad, Ijaz
    Shajan, Annette
    Savunen, Tapio
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2025, 162
  • [6] Threats, Attacks, and Cryptography Frameworks of Cybersecurity in Critical Infrastructures
    Tsantikidou, Kyriaki
    Sklavos, Nicolas
    CRYPTOGRAPHY, 2024, 8 (01)
  • [7] A Survey of Blockchain-based Cybersecurity for Vehicular Networks
    Wang, Xifeng
    Xu, Changqiao
    Zhou, Zan
    Yang, Shujie
    Sun, Limin
    2020 16TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC, 2020, : 740 - 745
  • [8] Survey: Cybersecurity Vulnerabilities, Attacks and Solutions in the Medical Domain
    Razaque, Abdul
    Amsaad, Fathi
    Khan, Meer Jaro
    Hariri, Salim
    Chen, Shujing
    Chen Siting
    Ji, Xingchen
    IEEE ACCESS, 2019, 7 : 168774 - 168797
  • [9] Security and Privacy Threats for Bluetooth Low Energy in IoT and Wearable Devices: A Comprehensive Survey
    Barua, Arup
    Al Alamin, Md Abdullah
    Hossain, Md Shohrab
    Hossain, Ekram
    IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2022, 3 : 251 - 281
  • [10] RETRACTED: Prevailing and emerging cyber threats and security practices in IoT-Enabled smart grids: A survey (Retracted article. See vol. 138, pg. 66, 2019)
    Gupta, Abhishek
    Anpalagan, Alagan
    Carvalho, Glaucio H. S.
    Khwaja, Ahmed S.
    Guan, Ling
    Woungang, Isaac
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 132 : 118 - 148