K. Sudar, P. Deepalakshmi, P. Nagaraj, V. Muneeswaran
{"title":"Analysis of Cyberattacks and its Detection Mechanisms","authors":"K. Sudar, P. Deepalakshmi, P. Nagaraj, V. Muneeswaran","doi":"10.1109/ICRCICN50933.2020.9296178","DOIUrl":null,"url":null,"abstract":"With the help of Internet, there are tremendous innovations and developments in technologies. Most of the business organizations are forced to use the flexible and modern network technologies for business processing. This opens the door for cyber criminals to initiate cyberattacks to disrupt the business process. There are lot of reasons behind these cyberattacks like stealing login credentials, financial information and confidential information, disrupting the services available to legitimate users and to gain unauthorized access. To defend against cyberattacks, several mechanisms were proposed by researchers. In this paper, we analyzed about different types of cyberattacks and detection mechanisms to defend against those attacks. We also analyzed about different datasets and evaluation metrics used to evaluate the performance of every detection mechanism.","PeriodicalId":138966,"journal":{"name":"2020 Fifth International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"21","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 Fifth International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICRCICN50933.2020.9296178","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 21
Abstract
With the help of Internet, there are tremendous innovations and developments in technologies. Most of the business organizations are forced to use the flexible and modern network technologies for business processing. This opens the door for cyber criminals to initiate cyberattacks to disrupt the business process. There are lot of reasons behind these cyberattacks like stealing login credentials, financial information and confidential information, disrupting the services available to legitimate users and to gain unauthorized access. To defend against cyberattacks, several mechanisms were proposed by researchers. In this paper, we analyzed about different types of cyberattacks and detection mechanisms to defend against those attacks. We also analyzed about different datasets and evaluation metrics used to evaluate the performance of every detection mechanism.