Survey on Types of Cyber Attacks on Operating System Vulnerabilities since 2018 onwards

Maame Araba Vander-Pallen, P. Addai, Stuart Isteefanos, Tauheed Khan Mohd
{"title":"Survey on Types of Cyber Attacks on Operating System Vulnerabilities since 2018 onwards","authors":"Maame Araba Vander-Pallen, P. Addai, Stuart Isteefanos, Tauheed Khan Mohd","doi":"10.1109/aiiot54504.2022.9817246","DOIUrl":null,"url":null,"abstract":"Over time, many operating systems (OS) with a wide range of functions and features have emerged. As a consequence, they understand how each operating system has been built, which helps users' decisions while setting the operating system on their devices. As a result, a comparative research of various operating systems is required to offer specifics on the same as well as variation in fresh forms of OS to solve their problems. This paper explains the types of cyber attacks on the different types of operating systems. It analyses how operating systems become vulnerable and also how these vulnerabilities affect these operating systems. Our research highlights the impact that viruses have had on society since 2018, and we focus on the consequences that these viruses have. Our research has found a significant upward trend in the amount of cyber attacks in the last five years. We expect these numbers to continue their ascent in the future, especially in the cryptocurrency world.","PeriodicalId":409264,"journal":{"name":"2022 IEEE World AI IoT Congress (AIIoT)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE World AI IoT Congress (AIIoT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/aiiot54504.2022.9817246","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

Over time, many operating systems (OS) with a wide range of functions and features have emerged. As a consequence, they understand how each operating system has been built, which helps users' decisions while setting the operating system on their devices. As a result, a comparative research of various operating systems is required to offer specifics on the same as well as variation in fresh forms of OS to solve their problems. This paper explains the types of cyber attacks on the different types of operating systems. It analyses how operating systems become vulnerable and also how these vulnerabilities affect these operating systems. Our research highlights the impact that viruses have had on society since 2018, and we focus on the consequences that these viruses have. Our research has found a significant upward trend in the amount of cyber attacks in the last five years. We expect these numbers to continue their ascent in the future, especially in the cryptocurrency world.
2018年以来针对操作系统漏洞的网络攻击类型调查
随着时间的推移,出现了许多具有广泛功能和特性的操作系统(OS)。因此,他们了解每个操作系统是如何构建的,这有助于用户在设备上设置操作系统时做出决定。因此,需要对各种操作系统进行比较研究,以提供相同的细节以及新形式的操作系统的变化,以解决它们的问题。本文解释了不同类型的操作系统上的网络攻击类型。它分析了操作系统是如何变得脆弱的,以及这些漏洞是如何影响这些操作系统的。我们的研究强调了自2018年以来病毒对社会的影响,我们关注的是这些病毒造成的后果。我们的研究发现,在过去五年中,网络攻击的数量呈显著上升趋势。我们预计这些数字将在未来继续上升,尤其是在加密货币领域。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信