A survey of emerging threats in cybersecurity

被引:400
作者
Jang-Jaccard, Julian [1 ]
Nepal, Surya [1 ]
机构
[1] CSIRO ICT Ctr, Marsfield, NSW, Australia
关键词
Cybersecurity; Malware; Emerging technology trends; Emerging cyber threats; Cyber attacks and countermeasures; SECURITY; INTERNET; SYSTEMS; CHALLENGES; MANAGEMENT; NETWORKS; PRIVACY;
D O I
10.1016/j.jcss.2014.02.005
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The exponential growth of the Internet interconnections has led to a significant growth of cyber attack incidents often with disastrous and grievous consequences. Malware is the primary choice of weapon to carry out malicious intents in the cyberspace, either by exploitation into existing vulnerabilities or utilization of unique characteristics of emerging technologies. The development of more innovative and effective malware defense mechanisms has been regarded as an urgent requirement in the cybersecurity community. To assist in achieving this goal, we first present an overview of the most exploited vulnerabilities in existing hardware, software, and network layers. This is followed by critiques of existing state-of-the-art mitigation techniques as why they do or don't work. We then discuss new attack patterns in emerging technologies such as social media, cloud computing, smartphone technology, and critical infrastructure. Finally, we describe our speculative observations on future research directions. Crown Copyright (c) 2014 Published by Elsevier Inc. All rights reserved.
引用
收藏
页码:973 / 993
页数:21
相关论文
共 126 条
[61]  
Jang J., 2011, TURSTCOM 2011, P436
[62]   Federated Identity Management Challenges [J].
Jensen, Jostein .
2012 SEVENTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2012, :230-235
[63]  
Johnson M., 2012, P SOUPS 2012
[64]  
Kanich C, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P3
[65]   TRUSTWORTHY HARDWARE: IDENTIFYING AND CLASSIFYING HARDWARE TROJANS [J].
Karri, Ramesh ;
Rajendran, Jeyavijayan ;
Rosenfeld, Kurt ;
Tehranipoor, Mohammad .
COMPUTER, 2010, 43 (10) :39-46
[66]   Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices [J].
Khan, Muhammad Khurram ;
Zhang, Jiashu ;
Wang, Xiaomin .
CHAOS SOLITONS & FRACTALS, 2008, 35 (03) :519-524
[67]   Embedded system security [J].
Koopman, P .
COMPUTER, 2004, 37 (07) :95-97
[68]  
Kordy B, 2012, LECT NOTES COMPUT SC, V7053, P103, DOI 10.1007/978-3-642-25261-7_8
[69]  
Lampson B, 2009, COMMUN ACM, V52, P25, DOI [10.1145/1592761.1592773, 10.1145/15.92761.1592773]
[70]  
Leandro MarcosA. P., 2012, 11 INT C NETWORKS, P88