网络攻击,对策和保护方案-最新的调查

A. Shabut, Khin T. Lwin, Mohammed Alamgir Hossain
{"title":"网络攻击,对策和保护方案-最新的调查","authors":"A. Shabut, Khin T. Lwin, Mohammed Alamgir Hossain","doi":"10.1109/SKIMA.2016.7916194","DOIUrl":null,"url":null,"abstract":"Thousands of cyber-attacks (fraudulent online activities to acquire users' sensitive information via email, during online transactions, live video streaming, online gaming and browsing) are launched every day against Internet users across the world. To prevent these attacks, researchers have responded with a number of protection systems. Currently, the methods which cyber-attackers use to conduct attacks is associated with exploiting humans. Such attacks are recorded more frequently than before, and they are more challenging to control. Traditional security countermeasures are unable to prevent breaches targeting the human element. This paper describes the state of the art of cyber security attacks, countermeasures, and protection tools related to everyday online activities. It provides a useful cyber-attack taxonomy and classification which helps to involve in a protection process to identify attacks and measures for cyber security. Existing protection schemes that target the cyber threats and risks are evaluated against three of our criteria for an effective measure: resilience to cyber-attacks' countermeasures; real-time support and needs-based action; and training and educational materials to increase users' awareness of cybercrimes. Potential features of smart solutions to cybercrime are also identified.","PeriodicalId":417370,"journal":{"name":"2016 10th International Conference on Software, Knowledge, Information Management & Applications (SKIMA)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"17","resultStr":"{\"title\":\"Cyber attacks, countermeasures, and protection schemes — A state of the art survey\",\"authors\":\"A. Shabut, Khin T. Lwin, Mohammed Alamgir Hossain\",\"doi\":\"10.1109/SKIMA.2016.7916194\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Thousands of cyber-attacks (fraudulent online activities to acquire users' sensitive information via email, during online transactions, live video streaming, online gaming and browsing) are launched every day against Internet users across the world. To prevent these attacks, researchers have responded with a number of protection systems. Currently, the methods which cyber-attackers use to conduct attacks is associated with exploiting humans. Such attacks are recorded more frequently than before, and they are more challenging to control. Traditional security countermeasures are unable to prevent breaches targeting the human element. This paper describes the state of the art of cyber security attacks, countermeasures, and protection tools related to everyday online activities. It provides a useful cyber-attack taxonomy and classification which helps to involve in a protection process to identify attacks and measures for cyber security. Existing protection schemes that target the cyber threats and risks are evaluated against three of our criteria for an effective measure: resilience to cyber-attacks' countermeasures; real-time support and needs-based action; and training and educational materials to increase users' awareness of cybercrimes. Potential features of smart solutions to cybercrime are also identified.\",\"PeriodicalId\":417370,\"journal\":{\"name\":\"2016 10th International Conference on Software, Knowledge, Information Management & Applications (SKIMA)\",\"volume\":\"28 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-12-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"17\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 10th International Conference on Software, Knowledge, Information Management & Applications (SKIMA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SKIMA.2016.7916194\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 10th International Conference on Software, Knowledge, Information Management & Applications (SKIMA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SKIMA.2016.7916194","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 17

摘要

每天都有成千上万的网络攻击(通过电子邮件、在线交易、实时视频流、在线游戏和浏览获取用户敏感信息的欺诈在线活动)针对全球互联网用户发起。为了防止这些攻击,研究人员已经使用了许多保护系统。目前,网络攻击者进行攻击的方法与利用人类有关。这类袭击的记录比以前更频繁,也更难以控制。传统的安全对策无法防止针对人为因素的入侵。本文描述了与日常在线活动相关的网络安全攻击、对策和保护工具的现状。它提供了一个有用的网络攻击分类法和分类,有助于参与保护过程,以识别攻击和网络安全措施。针对网络威胁和风险的现有保护方案根据我们的三个有效措施标准进行评估:对网络攻击对策的弹性;实时支持和基于需求的行动;以及培训和教育材料,以提高用户对网络犯罪的认识。智能解决网络犯罪的潜在特征也被确定。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Cyber attacks, countermeasures, and protection schemes — A state of the art survey
Thousands of cyber-attacks (fraudulent online activities to acquire users' sensitive information via email, during online transactions, live video streaming, online gaming and browsing) are launched every day against Internet users across the world. To prevent these attacks, researchers have responded with a number of protection systems. Currently, the methods which cyber-attackers use to conduct attacks is associated with exploiting humans. Such attacks are recorded more frequently than before, and they are more challenging to control. Traditional security countermeasures are unable to prevent breaches targeting the human element. This paper describes the state of the art of cyber security attacks, countermeasures, and protection tools related to everyday online activities. It provides a useful cyber-attack taxonomy and classification which helps to involve in a protection process to identify attacks and measures for cyber security. Existing protection schemes that target the cyber threats and risks are evaluated against three of our criteria for an effective measure: resilience to cyber-attacks' countermeasures; real-time support and needs-based action; and training and educational materials to increase users' awareness of cybercrimes. Potential features of smart solutions to cybercrime are also identified.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信