Potential Development on Cyberattack and Prospect Analysis for Cybersecurity

Lippter Li, Kutub Thakur, M. Ali
{"title":"Potential Development on Cyberattack and Prospect Analysis for Cybersecurity","authors":"Lippter Li, Kutub Thakur, M. Ali","doi":"10.1109/IEMTRONICS51293.2020.9216374","DOIUrl":null,"url":null,"abstract":"Technology and methods on cyberattack and strategy on cybersecurity always develop simultaneously. Once a knotty method of cyberattack has been created, information security specialists always react immediately and come up with a new security system that can prevent and eliminate the attack. Then, the hacker will try to find bugs from the system and perform alternative attacks. The war on security just never ends. The article tries to conclude our current information security environment and frontier battleground. The article is focused on some specific techniques such as machine learning and neural networks along with their applications on both the cyberattack side and cybersecurity side. The future predictions are made on how A.I. technology may change the current situation on information security. How attackers may use these technologies to steal user privacy and how a current security system should adapt to the evolution of cyberattack. Google has announced the realization of quantum supremacy on a quantum computer. As known, a quantum computer can solve problems required years with a current computer in seconds. This can be catastrophic to modern cryptology. The article discusses the problem and introduces potential reconstruction solutions on encryption. The ultimate goal of the article is to discuss the potentials with modern technology on information security and alarm people to be aware of these risks, also making predictions on how the future of information security will be like.","PeriodicalId":269697,"journal":{"name":"2020 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IEMTRONICS51293.2020.9216374","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7

Abstract

Technology and methods on cyberattack and strategy on cybersecurity always develop simultaneously. Once a knotty method of cyberattack has been created, information security specialists always react immediately and come up with a new security system that can prevent and eliminate the attack. Then, the hacker will try to find bugs from the system and perform alternative attacks. The war on security just never ends. The article tries to conclude our current information security environment and frontier battleground. The article is focused on some specific techniques such as machine learning and neural networks along with their applications on both the cyberattack side and cybersecurity side. The future predictions are made on how A.I. technology may change the current situation on information security. How attackers may use these technologies to steal user privacy and how a current security system should adapt to the evolution of cyberattack. Google has announced the realization of quantum supremacy on a quantum computer. As known, a quantum computer can solve problems required years with a current computer in seconds. This can be catastrophic to modern cryptology. The article discusses the problem and introduces potential reconstruction solutions on encryption. The ultimate goal of the article is to discuss the potentials with modern technology on information security and alarm people to be aware of these risks, also making predictions on how the future of information security will be like.
网络攻击的潜在发展与网络安全的前景分析
网络攻击技术和方法与网络安全战略总是同步发展的。一旦一个棘手的网络攻击方法被创造出来,信息安全专家总是立即做出反应,并提出一个新的安全系统,可以防止和消除攻击。然后,黑客将尝试从系统中找到漏洞并执行替代攻击。对安全的战争永远不会结束。本文试图总结出我国当前的信息安全环境和前沿战场。本文主要关注一些特定的技术,如机器学习和神经网络,以及它们在网络攻击和网络安全方面的应用。未来的预测是关于人工智能技术将如何改变信息安全现状。攻击者如何利用这些技术窃取用户隐私,以及当前的安全系统应如何适应网络攻击的演变。谷歌宣布在量子计算机上实现量子霸权。众所周知,量子计算机可以在几秒钟内解决当前计算机需要数年才能解决的问题。这对现代密码学来说可能是灾难性的。本文讨论了这个问题,并介绍了可能的加密重建解决方案。本文的最终目的是讨论现代技术在信息安全方面的潜力,并提醒人们意识到这些风险,并对未来的信息安全将是什么样子进行预测。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信