Analysis of case studies on cyber attacks and proposed methods for their prevention

被引:4
|
作者
Leu, Daniel Mihai [1 ]
Udroiu, Catalin [1 ,2 ]
Raicu, Gabriel Margarit [1 ]
Garban, Horatius Nicolae [1 ,3 ]
Scheau, Mircea Constantin [1 ,4 ]
机构
[1] Constanta Maritime Univ, Constanta, Romania
[2] ZF Grp, Friedrichshafen, Germany
[3] Romanian Cyber Def Command, Minist Natl Def, Bucharest, Romania
[4] Univ Craiova, Craiova, Romania
关键词
cyber warfare; exfiltration; state sponsors; strategy; damages;
D O I
10.33436/v33i2y202309
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The last few years have brought about a tremendous increase in the speed of technological advancement and digitalisation which led to an exponential uptick in the amount of data that is being either stored or moved across the cyberspace. This data, either under the ownership of a company operating in the private sector, or of a public sector organization, has become a priority target for malicious actors. From actors that operate under the alleged guise of financially motivated reasons such as ransomware operators to nation state threat groups and politically motivated actors that engage in hacktivist campaigns, an important certainty is that confidential data has become a top priority target for the various types of malicious actors operating across the cyber threat spectrum. Whether it is being sold to the highest bidder, released for free or used in the context of nation state affairs, confidential data became a high-value resource which, in combination with the increasingly complex and politically charged international context of the last few years, has brought about an uptick in number of cyber operations that could be classified as espionage. The aim of this paper is to present a study showcasing the various ways in which data theft, as the main objective, can materialize through malicious cyber campaigns ranging from ransomware operations executed by documented and well-known actors, to malware operations executed under the radar by obscure malicious actors.
引用
下载
收藏
页码:119 / 134
页数:16
相关论文
共 50 条
  • [1] Methods of anomaly detection for the prevention and detection of cyber attacks
    Girubagari, N.
    Ravi, T. N.
    INTERNATIONAL JOURNAL OF INTELLIGENT ENGINEERING INFORMATICS, 2023, 11 (04) : 299 - 316
  • [2] Analysis and Prevention of Phishing Attacks in Cyber Space
    Mishra, Alekh Kumar
    Tripathy, Asis Kumar
    Swain, Satyabrata
    2018 FIRST INTERNATIONAL CONFERENCE ON SECURE CYBER COMPUTING AND COMMUNICATIONS (ICSCCC 2018), 2018, : 430 - 434
  • [3] A Study On Various Cyber Attacks And A Proposed Intelligent System For Monitoring Such Attacks
    Choudhary, Atul S.
    Choudhary, Pankaj P.
    Salve, Shrikant
    PROCEEDINGS OF THE 2018 3RD INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT 2018), 2018, : 612 - 617
  • [4] Prevention of cyber attacks in smart manufacturing applying modern neural network methods
    Krundyshev, V
    Kalinin, M.
    INTERNATIONAL SCIENTIFIC CONFERENCE DIGITAL TRANSFORMATION ON MANUFACTURING, INFRASTRUCTURE AND SERVICE, 2020, 940
  • [5] Proposed Defense Topology against Cyber Attacks in Smart Grid
    Shahid, Muhammad Awais
    Nawaz, Rehan
    Qureshi, Ijaz Mansoor
    Mahmood, Muhammad Habib
    2018 4TH INTERNATIONAL CONFERENCE ON POWER GENERATION SYSTEMS AND RENEWABLE ENERGY TECHNOLOGIES (PGSRET-2018), 2018, : 82 - 86
  • [6] PrISM: Automatic Detection and Prevention from Cyber Attacks
    Zeeshan, Ahmed
    Masood, Anwar M.
    Faisal, Zafar M.
    Kalim, Azam
    Farzana, Naheed
    WIRELESS NETWORKS, INFORMATION PROCESSING AND SYSTEMS, 2008, 20 : 433 - +
  • [7] Cyber-Espionage Malware Attacks Detection and Analysis: A Case Study
    Kara, Ilker
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2022, 62 (06) : 1253 - 1270
  • [8] MULTIMODAL GRAPH ANALYSIS OF CYBER ATTACKS
    Ghose, Nimimesh
    Lazos, Loukas
    Rozenblit, Jerzy
    Breiger, Ronald
    2019 SPRING SIMULATION CONFERENCE (SPRINGSIM), 2019,
  • [9] Empirical Assessment of Methods to Detect Cyber Attacks on a Robot
    Sabaliauskaite, Giedre
    Ng, Geok See
    Ruths, Justin
    Mathur, Aditya P.
    2016 IEEE 17TH INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING (HASE), 2016, : 248 - 251
  • [10] Visualizing Cyber Attacks with Misuse Case Maps
    Karpati, Peter
    Sindre, Guttorm
    Opdahl, Andreas L.
    REQUIREMENTS ENGINEERING: FOUNDATION FOR SOFTWARE QUALITY, 2010, 6182 : 262 - +