Maame Araba Vander-Pallen, P. Addai, Stuart Isteefanos, Tauheed Khan Mohd
{"title":"Survey on Types of Cyber Attacks on Operating System Vulnerabilities since 2018 onwards","authors":"Maame Araba Vander-Pallen, P. Addai, Stuart Isteefanos, Tauheed Khan Mohd","doi":"10.1109/aiiot54504.2022.9817246","DOIUrl":null,"url":null,"abstract":"Over time, many operating systems (OS) with a wide range of functions and features have emerged. As a consequence, they understand how each operating system has been built, which helps users' decisions while setting the operating system on their devices. As a result, a comparative research of various operating systems is required to offer specifics on the same as well as variation in fresh forms of OS to solve their problems. This paper explains the types of cyber attacks on the different types of operating systems. It analyses how operating systems become vulnerable and also how these vulnerabilities affect these operating systems. Our research highlights the impact that viruses have had on society since 2018, and we focus on the consequences that these viruses have. Our research has found a significant upward trend in the amount of cyber attacks in the last five years. We expect these numbers to continue their ascent in the future, especially in the cryptocurrency world.","PeriodicalId":409264,"journal":{"name":"2022 IEEE World AI IoT Congress (AIIoT)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE World AI IoT Congress (AIIoT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/aiiot54504.2022.9817246","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Over time, many operating systems (OS) with a wide range of functions and features have emerged. As a consequence, they understand how each operating system has been built, which helps users' decisions while setting the operating system on their devices. As a result, a comparative research of various operating systems is required to offer specifics on the same as well as variation in fresh forms of OS to solve their problems. This paper explains the types of cyber attacks on the different types of operating systems. It analyses how operating systems become vulnerable and also how these vulnerabilities affect these operating systems. Our research highlights the impact that viruses have had on society since 2018, and we focus on the consequences that these viruses have. Our research has found a significant upward trend in the amount of cyber attacks in the last five years. We expect these numbers to continue their ascent in the future, especially in the cryptocurrency world.