Futuristic cyber-attacks

被引:5
|
作者
Chakkaravarthy, S. Sibi [1 ]
Sangeetha, D. [2 ]
Rathnam, M. Venkata [2 ]
Srinithi, K. [2 ]
Vaidehi, V. [3 ]
机构
[1] VIT AP Univ, Dept Comp Sci & Engn, Amaravati, India
[2] Madras Inst Technol, Dept Informat Technol, Madras, Tamil Nadu, India
[3] VIT Univ, Sch Comp Sci & Engn, Madras, Tamil Nadu, India
关键词
Cybersecurity; cyberwar; cyber espionage; cybercrime; cyberbullying;
D O I
10.3233/KES-180384
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the present day, human beings are living in a world which is networked together, ranging from online banking to connected physical infrastructures. The network security that was once optional has now become an exigency. Cyber-attacks have now emerged as one of the prime concerns globally. A cyber-attack is an intentional exploitation of networks, businesses and computer systems. Cyber-attackers make use of their malicious code and other software components to alter or steal information, logic or program data of financial organizations, technology-based companies or individuals leading to cybercrimes such as identity and information theft. Cyber-attacks are ubiquitous in the sense that they could be launched by anyone, at any place and at any time. Cyber breaches are spreading like wild fire globally. Existing security systems can only identify the attacks that are known. This paper aims to expose various cyber-attacks and their present-day impact. This paper also presents some mitigation techniques to stay safe against the cyber-attacks.
引用
收藏
页码:195 / 204
页数:10
相关论文
共 50 条
  • [1] The potential for massive cyber-attacks is no longer futuristic
    不详
    [J]. NEW SCIENTIST, 2008, 198 (2661) : 29 - 29
  • [2] Predicting Consequences of Cyber-Attacks
    Datta, Prerit
    Lodinger, Natalie
    Namin, Akbar Siami
    Jones, Keith S.
    [J]. 2020 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2020, : 2073 - 2078
  • [3] Cyber-attacks and banking intermediation
    Boungou, Whelsy
    [J]. ECONOMICS LETTERS, 2023, 233
  • [4] Cyber-attacks and international law
    Grove, GD
    Goodman, SE
    Lukasik, SJ
    [J]. SURVIVAL, 2000, 42 (03) : 89 - +
  • [5] Staying ahead of cyber-attacks
    Green, John
    [J]. Network Security, 2015, 2015 (02) : 13 - 16
  • [6] Impact Of Cyber-Attacks On Critical Infrastructure
    Thakur, Kutub
    Ali, Md Liakat
    Jiang, Ning
    Qiu, Meikang
    [J]. 2016 IEEE 2ND INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC), AND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2016, : 183 - 186
  • [7] The Impact of US Cyber Policies on Cyber-Attacks Trend
    Kumar, Sumeet
    Benigni, Matthew
    Carley, Kathleen M.
    [J]. IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS: CYBERSECURITY AND BIG DATA, 2016, : 181 - 186
  • [8] Cyber-Attacks in Modular Multilevel Converters
    Burgos-Mellado, Claudio
    Donoso, Felipe
    Dragicevic, Tomislav
    Cardenas-Dobson, Roberto
    Wheeler, Patrick
    Clare, Jon
    Watson, Alan
    [J]. IEEE TRANSACTIONS ON POWER ELECTRONICS, 2022, 37 (07) : 8488 - 8501
  • [9] Cyber-Attacks Against Transportation Infrastructure
    Gercke, Marco
    [J]. TRANSPORTATION SECURITY AGAINST TERRORISM, 2009, 54 : 151 - 161
  • [10] Estimates of the macroeconomic costs of cyber-attacks
    Dieye, Rokhaya
    Bounfour, Ahmed
    Ozaygen, Altay
    Kammoun, Niaz
    [J]. RISK MANAGEMENT AND INSURANCE REVIEW, 2020, 23 (02) : 183 - 208