Cyber Attacks, Countermeasures, and Protection Schemes- A State of the Art Survey

被引:0
作者
Shabut, Antesar M. [1 ]
Lwin, K. T. [1 ]
Hossain, M. A. [1 ]
机构
[1] Anglia Ruskin Univ, Chelmsford, Essex, England
来源
PROCEEDINGS OF 2016 10TH INTERNATIONAL CONFERENCE ON SOFTWARE, KNOWLEDGE, INFORMATION MANAGEMENT & APPLICATIONS (SKIMA) | 2016年
关键词
cyber security; cyber attacks; attack taxonomy; existing protection tools; INTELLIGENT PHISHING DETECTION; SYSTEM;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Thousands of cyber-attacks (fraudulent online activities to acquire users' sensitive information via email, during online transactions, live video streaming, online gaming and browsing) are launched every day against Internet users across the world. To prevent these attacks, researchers have responded with a number of protection systems. Currently, the methods which cyber-attackers use to conduct attacks is associated with exploiting humans. Such attacks are recorded more frequently than before, and they are more challenging to control. Traditional security countermeasures are unable to prevent breaches targeting the human element. This paper describes the state of the art of cyber security attacks, countermeasures, and protection tools related to everyday online activities. It provides a useful cyber-attack taxonomy and classification which helps to involve in a protection process to identify attacks and measures for cyber security. Existing protection schemes that target the cyber threats and risks are evaluated against three of our criteria for an effective measure: resilience to cyber-attacks' countermeasures; real-time support and needs-based action; and training and educational materials to increase users' awareness of cybercrimes. Potential features of smart solutions to cybercrime are also identified.
引用
收藏
页码:37 / 44
页数:8
相关论文
共 50 条
[11]   A survey on secure state estimation of cyber-physical systems under cyber attacks [J].
Yang G.-H. ;
Lu A.-Y. ;
An L.-W. .
Kongzhi yu Juece/Control and Decision, 2023, 38 (08) :2093-2105
[12]   The Extent to which Individuals in Saudi Arabia are Subjected to Cyber-Attacks and Countermeasures [J].
Alzahrani, Abdullah A. H. .
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (02) :304-311
[13]   BLOCKCHAIN APPROACH TO CYBER SECURITY VULNERABILITIES ATTACKS AND POTENTIAL COUNTERMEASURES [J].
Sambana, Bosubabu ;
Ramesh, Yegireddi ;
Rao, Molli Srinivasa ;
Rao, T. Chalapathi ;
Patnaik, N. P. M. .
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2020, 14 (01) :1-14
[14]   Cyber Attacks on Power System Automation and Protection and Impact Analysis [J].
Rajkumar, Vetrivel Subramaniam ;
Tealane, Marko ;
Stefanov, Alexandru ;
Presekal, Alfan ;
Palensky, Peter .
2020 IEEE PES INNOVATIVE SMART GRID TECHNOLOGIES EUROPE (ISGT-EUROPE 2020): SMART GRIDS: KEY ENABLERS OF A GREEN POWER SYSTEM, 2020, :247-254
[15]   A survey on Classification of Cyber-attacks on IoT and IIoT devices [J].
Shah, Yash ;
Sengupta, Shamik .
2020 11TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2020, :406-413
[16]   CCPA: Coordinated Cyber-Physical Attacks and Countermeasures in Smart Grid [J].
Deng, Ruilong ;
Zhuang, Peng ;
Liang, Hao .
IEEE TRANSACTIONS ON SMART GRID, 2017, 8 (05) :2420-2430
[17]   Attacks on Self-Driving Cars and Their Countermeasures: A Survey [J].
Chowdhury, Abdullahi ;
Karmakar, Gour ;
Kamruzzaman, Joarder ;
Jolfaei, Alireza ;
Das, Rajkumar .
IEEE ACCESS, 2020, 8 :207308-207342
[18]   STATE RESPONSIBILITY FOR CYBER ATTACKS: COMPETING STANDARDS FOR A GROWING PROBLEM [J].
Shackelford, Scott J. .
CONFERENCE ON CYBER CONFLICT, PROCEEDINGS 2010, 2010, :197-208
[19]   A Study on Password Protection and Encryption in the era of Cyber Attacks [J].
Chakraborty, Suryadip ;
Jackson, Candice ;
Frazier, Moncrief ;
Clark, Kyra .
SOUTHEASTCON 2024, 2024, :460-465
[20]   Cybersecurity Threats: An Analysis of the Rise and Impacts of State Sponsored Cyber Attacks [J].
Butler, Patrick ;
Kelley, Jayden ;
Ellis, Juston ;
Olatunbosun, Samuel .
SOFTWARE ENGINEERING RESEARCH AND PRACTICE AND E-LEARNING, E-BUSINESS, ENTERPRISE INFORMATION SYSTEMS, AND E-GOVERNMENT, SERP 2024, EEE 2024, 2025, 2263 :187-194