ABSTRACT
The exponential growth in internet usage has reshaped daily transactions, prompting individuals and companies to increasingly engage in cyberspace rather than traditional real-world settings. This shift has been notably accelerated by factors such as the COVID-19 pandemic. The widespread adoption of the digital environment has led to a shift in criminal activities, with traditional crimes now extending into the digital space. Cybercrime has become a significant concern as criminals exploit vulnerabilities in the online world. The emergence of technologies like cloud computing, Internet of Things (IoT), social media, wireless communication, and cryptocurrencies has heightened security concerns in cyberspace. The trend of cyber criminals offering cyber attacks as a service reflects a concerning shift toward automation for broader impact. Exploiting vulnerabilities across hardware, software, and communication layers amplifies the potential impact of these attacks, emphasizing the need for robust cybersecurity defenses. The landscape of cyber threats encompasses various types of attacks. These include distributed denial of service (DDoS), phishing, man-in-the-middle, password attacks, remote attacks, privilege escalation, and the use of malware. The evolving landscape of cyber threats and advanced evasion techniques has rendered traditional protection systems, including firewalls, intrusion detection systems, antivirus software, and access control lists, less effective in detecting sophisticated attacks. Addressing the urgent need for innovative and effective solutions to prevent cyber attacks is crucial.Reviewing recent attacks, understanding attack patterns, and exploring detection techniques are essential steps in staying ahead of cyber threats. The article’s discussion of both technical and non-technical solutions for early recognition is key to developing a comprehensive and proactive cybersecurity framework. Leveraging trending technologies like machine learning, deep learning, cloud platforms, big data, and block-chain holds promise as a solution for addressing current and future cyber attacks. The mentioned technological solutions, including machine learning and deep learning, can play a crucial role in various aspects of cybersecurity. They offer capabilities for detecting malware, intrusion detection, spam identification, DNS attack classification, fraud detection, recognizing hidden channels, and distinguishing advanced persistent threats, enhancing the overall defense against sophisticated cyber attacks. While machine learning and deep learning show promise in cybersecurity, their susceptibility to evasion techniques is a critical consideration. Developing robust solutions requires addressing the challenges posed by intelligent cyber attacks and continuously evolving evasion methods.
References
- Abdullah, M. S., Zainal, A., Maarof, M. A., &Kassim, M. N. (2018, November). Cyber-attack features for detecting cyber threat incidents from online news. In 2018 Cyber Resilience Conference (CRC) (pp. 1-4). IEEE.
- Abdulkadhim, E. G., &Hayder, M. A. (2020). Survey of E-mail Classification: Review and Open Issues. Iraqi Journal for Computers and Informatics, 46(2), 17-23
- Abomhara, M., &Køien, G. M. (2015). Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks. Journal of Cyber Security and Mobility, 65-88
- Akhtar, M. S., & Feng, T. (2022). Malware Analysis and Detection Using Machine Learning Algorithms. Symmetry, 14(11), 2304
- Akin, E., &Korkmaz, T. (2019). Comparison of routing algorithms with static and dynamic link cost in software defined networking (SDN). IEEE Access, 7, 148629-148644
- Alashhab, A. A., Zahid, M. S. M., Azim, M. A., Daha, M. Y., Isyaku, B., & Ali, S. (2022). A Survey of Low Rate DDoS Detection Techniques Based on Machine Learning in Software-Defined Networks. Symmetry, 14(8), 1563
- Alcaraz, C., &Zeadally, S. (2013). Critical control system protection in the 21st century. Computer, 46(10), 74-83
- Alcaraz, C., & Zeadally, S. (2015). Critical infrastructure protection: Requirements and challenges for the 21st century. International Journal of Critical Infrastructure Protection, 8, 53-66
- Al-Hadhrami, Y., & Hussain, F. K. (2021). DDoS attacks in IoT networks: a comprehensive systematic literature review. World Wide Web, 24(3), 971-1001
- Aliu, O. G., Imran, A., Imran, M. A., & Evans, B. (2012). A survey of self organisation in future cellular networks. IEEE Communications Surveys & Tutorials, 15(1), 336-361
- Al-Khurafi, O.B.; Al-Ahmad, M.A. (2015). Survey of web application vulnerability attacks. In Proceedings of the 2015 4th International Conference on Advanced Computer Science Applications and Technologies, Kuala Lumpur, Malaysia, 8–10 December. pp. 154–158.
- AlMadahkah, A. M. (2016). Big data in computer cyber security systems. International Journal of Computer Science and Network Security 16(4), 56.
- Almaraz-Rivera, J. G., Perez-Diaz, J. A., &Cantoral-Ceballos, J. A. (2022). Transport and application layer DDoS attacks detection to IoT devices by using machine learning and deep learning models. Sensors, 22(9), 3367
- Al-rimy, B. A. S., Maarof, M. A., & Shaid, S. Z. M. (2018). Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions. Computers & Security, 74, 144-166
- Alexander, S., &Droms, R. (1997). DHCP options and BOOTP vendor extensions (No. rfc2132).
- Aslan, Ö. (2016, October). How to decrease cyber threats by reducing software vulnerabilities and bugs. In Proceedings of the 1st International Mediterranean Science and Engineering Congress, Çukurova University, Adana, Turkey (pp. 26-28).
- Aslan, Ö., & Samet, R. (2017, September). Mitigating cyber security attacks by being aware of vulnerabilities and bugs. In 2017 international conference on cyberworlds (cw) (pp. 222-225). IEEE.
- Aslan, Ö. A., &Samet, R. (2020). A comprehensive review on malware detection approaches. IEEE access, 8, 6249-6271.
- Aslan, Ö. (2020). Analysis and detection of malware based on behaviors. PhD Thesis, University of Ankara, Ankara, Turkey.
- Aslan, Ö., Samet, R., &Tanrıöver, Ö. Ö. (2020). Using a subtractive center behavioral model to detect malware. Security and Communication Networks, 2020, 1-17.
- Aslan, Ö., Ozkan-Okay, M., & Gupta, D. (2021). Intelligent behavior-based malware detection system on cloud computing environment. IEEE Access, 9, 83252-83271.
- Aslan, Ö., & Yilmaz, A. A. (2021). A new malware classification framework based on deep learning algorithms. Ieee Access, 9, 87936-87951.
- Aslan, Ö., Aktuğ, S. S., Ozkan-Okay, M., Yilmaz, A. A., & Akin, E. (2023). A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions. Electronics, 12(6), 1333.
- Attaran, M., Gunasekaran, A., Attaran, M., &Gunasekaran, A. (2019). Blockchain and cybersecurity. Applications of Blockchain Technology in Business: Challenges and Opportunities, 67-69.
- Baitha, A. K., & Vinod, S. (2018). Session hijacking and prevention technique. J. Eng. Technol, 7(2.6), 193-198.
- [25] Basit, A., Zafar, M., Liu, X., Javed, A. R., Jalil, Z., &Kifayat, K. (2021). A comprehensive survey of AI-enabled phishing attacks detection techniques. Telecommunication Systems, 76, 139-154.
- Bellovin, S. M. (1989). Security problems in the TCP/IP protocol suite. ACM SIGCOMM Computer Communication Review, 19(2), 32-48.
- Bickford, J., O’Hare, R., Baliga, A., Ganapathy, V., &Iftode, L. (2010, February). Rootkits on smart phones: attacks, implications and opportunities. In Proceedings of the eleventh workshop on mobile computing systems & applications (pp. 49-54).
- Blackley, J.A.; Peltier, T.R.; Peltier, J. (2004).Information Security Fundamentals; Auerbach Publications: Boca Raton, FL, USA.
- Bouyeddou, B., Harrou, F., Sun, Y., &Kadri, B. (2018, May). Detection of smurf flooding attacks using Kullback-Leibler-based scheme. In 2018 4th International Conference on Computer and Technology Applications (ICCTA)(pp. 11-15). IEEE.
- Burgers, W., Verdult, R., & Van Eekelen, M. (2013). Prevent session hijacking by binding the session to the cryptographic network credentials. In Secure IT Systems: 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings 18 (pp. 33-50). Springer Berlin Heidelberg.
- Cambiaso, E., Papaleo, G., Chiola, G., & Aiello, M. (2013). Slow DoS attacks: definition and categorisation. International Journal of Trust Management in Computing and Communications, 1(3-4), 300-319.
- Casanova Páez, M. M. (2021). Application security testing tools study and proposal. https://openaccess.uoc.edu/handle/10609/126750
- Cerf V., G. (2021). On heterogeneous computing. ACM 64, 9.
- Chen, R., Li, Y., & Fang, W. (2019, July). Android malware identification based on traffic analysis. In International conference on artificial intelligence and security (pp. 293-303). Cham: Springer International Publishing.
- Choi, M. K., Robles, R. J., Hong, C. H., & Kim, T. H. (2008). Wireless network security: Vulnerabilities, threats and countermeasures. International Journal of Multimedia and Ubiquitous Engineering, 3(3), 77-86.
- Choi, K. S., Lee, C. S., & Merizalde, J. (2023). 14. Spreading viruses and malicious codes. Handbook on Crime and Technology, 232
- Clausen, H., Grov, G., Sabate, M., &Aspinall, D. (2020, November). Better anomaly detection for access attacks using deep bidirectional LSTMs. In International Conference on Machine Learning for Networking(pp. 1-18). Cham: Springer International Publishing.
- Cole, E. (2011). Network Security Bible; John Wiley & Sons: Hoboken, NJ, USA, p. 768.
- Conti, M., Dragoni, N., &Lesyk, V. (2016). A survey of man in the middle attacks. IEEE communications surveys & tutorials, 18(3), 2027-2051.
- Conti, M., Dargahi, T., &Dehghantanha, A. (2018). Cyber threat intelligence: challenges and opportunities (pp. 1-6). Springer International Publishing.
- Craigen, D., Diakun-Thibault, N., & Purse, R. (2014). Defining cybersecurity. Technology Innovation Management Review, 4(10).
- Cutter, S. L., Mitchell, J. T., & Scott, M. S. (2012). Revealing the vulnerability of people and places: A csse study of Georgetown country, South Carolina. In Hazards Vulnerability and Environmental Justice (pp. 111-142). Routledge.
- Dahbur, K., Mohammad, B., &Tarakji, A. B. (2011, April). A survey of risks, threats and vulnerabilities in cloud computing. In Proceedings of the 2011 International conference on intelligent semantic Web-services and applications (pp. 1-6).
- Dasgupta, D., Akhtar, Z., & Sen, S. (2022). Machine learning in cyber security: a comprehensive survey. The Journal of Defense Modeling and Simulation, 19(1), 57-106.
- David, C. P. (1982). An Ethernet Address Resolution Protocol: Or Converting Network Protocol Addresses to 48. Bit Ethernet Address for Transmission on Ethernet Hardware (RFC 826). IETF: Fremont, CA, USA.
- Deka, G. C. (Ed.). (2014). Handbook of research on securing cloud-based databases with biometric applications. IGI Global.
- Denning, D. E. (1982). Encryption algorithms. Cryptography and Data Security,” Addison Wesley Publishing Company Inc., USA, 59-125.
- Dietzel, C., Wichtlhuber, M., Smaragdakis, G., &Feldmann, A. (2018, December). Stellar: network attack mitigation using advanced blackholing. In Proceedings of the 14th international conference on emerging networking experiments and technologies (pp. 152-164).
- Dinu, D. D., Togan, M., &Bica, I. (2017). On DHCP Security. Proc. Rom. Acad. Ser. A Math. Phys. Tech. Sci. Inf. Sci, 18, 403-412.
- Droms, R. (1997). Dynamic host configuration protocol (No. rfc2131).
- Droms, R., &Arbaugh, W. (2001). Authentication for DHCP messages (No. rfc3118).
- [49] Eddy, W. (2007). TCP SYN flooding attacks and common mitigations (No. rfc4987).
- ElSawy, H., Hossain, E., &Haenggi, M. (2013). Stochastic geometry for modeling, analysis, and design of multi-tier and cognitive cellular wireless networks: A survey. IEEE Communications surveys & tutorials, 15(3), 996-1019
- Eslahi, M., Salleh, R., &Anuar, N. B. (2012, November). Bots and botnets: An overview of characteristics, detection and challenges. In 2012 IEEE International Conference on Control System, Computing and Engineering(pp. 349-354). IEEE.
- Ficco, M., Choraś, M., &Kozik, R. (2017). Simulation platform for cyber-security and vulnerability analysis of critical infrastructures. Journal of computational science, 22, 179-186.
- Gadal, S., Mokhtar, R., Abdelhaq, M., Alsaqour, R., Ali, E. S., & Saeed, R. (2022). Machine Learning-Based Anomaly Detection Using K-Mean Array and Sequential Minimal Optimization. Electronics, 11(14), 2158.
- Gao, Y., Peng, Y., Xie, F., Zhao, W., Wang, D., Han, X., … & Li, Z. (2013, October). Analysis of security threats and vulnerability for cyber-physical systems. In Proceedings of 2013 3rd International Conference on Computer Science and Network Technology (pp. 50-55). IEEE.
- Gien, M. A. (1978). File Transfer Protocol (FTP). Comput. Netw. 2, 312–319.
- Gonzalez, H., Gosselin-Lavigne, M. A., Stakhanova, N., &Ghorbani, A. A. (2014). The impact of application-layer denial-of-service attacks. Case Studies in Secure Computing: Achievements and Trends, 261.
- Goralski, W. (2017). The illustrated network: how TCP/IP works in a modern network. Morgan Kaufmann.
- Goudarzi, A., Ghayoor, F., Waseem, M., Fahad, S., &Traore, I. (2022). A Survey on IoT-Enabled Smart Grids: Emerging, Applications, Challenges, and Outlook. Energies, 15(19), 6984.
- Harrington, D., Presuhn, R., &Wijnen, B. (2002). An architecture for describing simple network management protocol (SNMP) management frameworks (No. rfc3411).
- Hollis, L. L. (1983). OSI presentation layer activities. Proceedings of the IEEE, 71(12), 1401-1403.
- Hong, L., & Yang, H. (2013, November). The security mechanism of SNMPv3 and implementation based on SNMP++. In 2013 International Conference on Communications, Circuits and Systems (ICCCAS) (Vol. 2, pp. 109-111). IEEE.
- Houichi, M., Jaidi, F., &Bouhoula, A. (2021, April). A systematic approach for IoT cyber-attacks detection in smart cities using machine learning techniques. In International Conference on Advanced Information Networking and Applications(pp. 215-228). Cham: Springer International Publishing.
- Hu, X., Xie, C., Fan, Z., Duan, Q., Zhang, D., Jiang, L., … & Chanussot, J. (2022). Hyperspectral anomaly detection using deep learning: A review. Remote Sensing, 14(9), 1973
- Hubballi, N., &Tripathi, N. (2017). A closer look into DHCP starvation attack in wireless networks. Computers & Security, 65, 387-404.
- Humayun, M., Niazi, M., Jhanjhi, N. Z., Alshayeb, M., & Mahmood, S. (2020). Cyber security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering, 45, 3171-3189.
- Jain, V., Sahu, D. R., &Tomar, D. S. (2015, February). Session hijacking: threat analysis and countermeasures. In Conf. on Futuristic Trends in Computational Analysis and Knowledge Management.
- Jaiswal, M. (2017). Computer Viruses: Principles of Exertion, Occurrence and Awareness. International Journal of Creative Research Thoughts (IJCRT), 648-651.
- Javaheri, D., Hosseinzadeh, M., &Rahmani, A. M. (2018). Detection and elimination of spyware and ransomware by intercepting kernel-level system routines. IEEE Access, 6, 78321-78332.
- Joshi, C., & Singh, U. K. (2016). Security testing and assessment of vulnerability scanners in quest of current information security landscape. International Journal of Computer Applications, 145(2), 1-7.
- Jouini, M., Rabai, L. B. A., &Aissa, A. B. (2014). Classification of security threats in information systems. Procedia Computer Science, 32, 489-496.
- Karangle, N., Mishra, A. K., & Khan, D. A. (2019, July). Comparison of Nikto and Uniscan for measuring URL vulnerability. In 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT) (pp. 1-6). IEEE.
- Karri, R., Rajendran, J., Rosenfeld, K., &Tehranipoor, M. (2010). Trustworthy hardware: Identifying and classifying hardware trojans. Computer, 43(10), 39-46.
- Kaur, J., &Ramkumar, K. R. (2022). The recent trends in cyber security: A review. Journal of King Saud University-Computer and Information Sciences, 34(8), 5766-5781.
- Kavianpour, A.; Anderson, M.C. (2017). An overview of wireless network security. In Proceedings of the 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing, New York, NY, USA, 24–26 June. pp. 306–309.
- Keerthi, V. K. (2016). Taxonomy of SSL/TLS attacks. International Journal of Computer Network and Information Security, 8(2), 15.
- Khan, I. (2012). An introduction to computer viruses: problems and solutions. Library Hi Tech News, 29(7), 8-12.
- Khan, M. A., Saleh, A. M., Waseem, M., &Sajjad, I. A. (2022). Artificial Intelligence Enabled Demand Response: Prospects and Challenges in Smart Grid Environment. IEEE Access, 11, 1477-1505.
- Köksal, Ö., &Tekinerdogan, B. (2017, June). Feature-driven domain analysis of session layer protocols of internet of things. In 2017 IEEE International Congress on Internet of Things (ICIOT)(pp. 105-112). IEEE.
- Kramer, S., & Bradfield, J. C. (2010). A general definition of malware. Journal in computer virology, 6, 105-114.
- Krombholz, K., Hobel, H., Huber, M., &Weippl, E. (2015). Advanced social engineering attacks. Journal of Information Security and applications, 22, 113-122.
- Kumar, G. (2016). Denial of service attacks–an updated perspective. Systems science & control engineering, 4(1), 285-294.
- Kumar, S., &Carley, K. M. (2016, September). Approaches to understanding the motivations behind cyber attacks. In 2016 IEEE Conference on Intelligence and Security Informatics (ISI) (pp. 307-309). IEEE.
- Kumari, P., & Jain, A. K. (2023). A comprehensive study of DDoS attacks over IoT network and their countermeasures. Computers & Security, 103096.
- Kurose, J.F.; Ross, K.W. (2012). Computer Networking: A Top Down Approach, 7th; Pearson Publishers: Upper Saddle River, NJ,USA.
- Lee, Y. W., Pipino, L., Strong, D. M., & Wang, R. Y. (2004). Process-embedded data integrity. Journal of Database Management (JDM), 15(1), 87-103.
- Lehtinen, R., &GangemiSr, G. T. (2006). Computer security basics: computer security. “ O’Reilly Media, Inc.”.
- Li, Y., & Liu, Q. (2021). A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments. Energy Reports, 7, 8176-8186.
- Lipson, H. (2002). Tracking and tracing cyber-attacks: Technical challenges and global policy issues.
- Liu, G. (2012). Jamming attacks and countermeasures in wireless area networks.
- Lyu, M., Gharakheili, H. H., &Sivaraman, V. (2022). A survey on DNS encryption: Current development, malware misuse, and inference techniques. ACM Computing Surveys, 55(8), 1-28.
- Maglaras, L. A., Kim, K. H., Janicke, H., Ferrag, M. A., Rallis, S., Fragkou, P., … & Cruz, T. J. (2018). Cyber security of critical infrastructures. Ict Express, 4(1), 42-45.
- Mahmood, S., Mohsin, S. M., &Akber, S. M. A. (2020, January). Network security issues of data link layer: An overview. In 2020 3rd International Conference on Computing, Mathematics and Engineering Technologies (iCoMET) (pp. 1-6). IEEE.
- Malhotra, A., Van Gundy, M., Varia, M., Kennedy, H., Gardner, J., & Goldberg, S. (2017). The security of ntp’s datagram protocol. In Financial Cryptography and Data Security: 21st International Conference, FC 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers 21 (pp. 405-423). Springer International Publishing.
- Malik, E. F., Khaw, K. W., Belaton, B., Wong, W. P., & Chew, X. (2022). Credit card fraud detection using a new hybrid machine learning architecture. Mathematics, 10(9), 1480.
- Maltz, D. A., & Bhagwat, P. (1998, March). MSOCKS: An architecture for transport layer mobility. In Proceedings. IEEE INFOCOM’98, the Conference on Computer Communications. Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies. Gateway to the 21st Century (Cat. No. 98 (Vol. 3, pp. 1037-1045). IEEE.
- Manivannan, S. S., &Sathiyamoorthy, E. (2014). A prevention model for session hijack attacks in wireless networks using strong and encrypted session ID. Cybernetics and information technologies, 14(3), 46-60.
- Manky, D. (2013). Cybercrime as a service: a very modern business. Computer Fraud & Security, 2013(6), 9-13.
- Mantas, G., Stakhanova, N., Gonzalez, H., Jazi, H. H., &Ghorbani, A. A. (2015). Application-layer denial of service attacks: taxonomy and survey. International Journal of Information and Computer Security, 7(2-4), 216-239.
- McGraw, G. (2002). Building secure software: better than protecting bad software. IEEE Software, 19(6), 57-58.
- Meszaros, J., & Buchalcevova, A. (2017). Introducing OSSF: A framework for online service cybersecurity risk management. Computers & security, 65, 300-313.
- Metz, C. (1999). AAA protocols: authentication, authorization, and accounting for the Internet. IEEE Internet Computing, 3(6), 75-79.
- Mughaid, A., AlZu’bi, S., Hnaif, A., Taamneh, S., Alnajjar, A., &Elsoud, E. A. (2022). An intelligent cyber security phishing detection system using deep learning techniques. Cluster Computing, 25(6), 3819-3828.
- Nastase, L. (2017, May). Security in the internet of things: A survey on application layer protocols. In 2017 21st international conference on control systems and computer science (CSCS) (pp. 659-666). IEEE.
- Ndatinya, V., Xiao, Z., Manepalli, V. R., Meng, K., & Xiao, Y. (2015). Network forensics analysis using Wireshark. International Journal of Security and Networks, 10(2), 91-106.
- ] Nurse, J. R., Creese, S., Goldsmith, M., & Lamberts, K. (2011, September). Trustworthy and effective communication of cybersecurity risks: A review. In 2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST) (pp. 60-68). IEEE.
- Padhy, R. P., Patra, M. R., &Satapathy, S. C. (2011). Cloud computing: security issues and research challenges. International Journal of Computer Science and Information Technology & Security (IJCSITS), 1(2), 136-146.
- Pan, J., Paul, S., & Jain, R. (2011). A survey of the research on future internet architectures. IEEE Communications Magazine, 49(7), 26-36.
- Pandey, A., & Saini, J. R. (2014). Attacks & defense mechanisms for TCP/IP based protocols. International Journal of Engineering Innovations and Research, 3(1), 17.
- Paolini, A.; Scardaci, D.; Liampotis, N.; Spinoso, V.; Grenier, B.; Chen, Y. (2020). Authentication, Authorization, and Accounting. Towards Interoper. Res. Infrastruct. Environ. Earth Sci. 12003, 247–271.
- Papp, D., Ma, Z., &Buttyan, L. (2015, July). Embedded systems security: Threats, vulnerabilities, and attack taxonomy. In 2015 13th Annual Conference on Privacy, Security and Trust (PST)(pp. 145-152). ieee.
- Patil, S., Jangra, A., Bhale, M., Raina, A., & Kulkarni, P. (2017, September). Ethical hacking: The need for cyber security. In 2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI) (pp. 1602-1606). IEEE.
- Pattanavichai, S. (2017, November). Comparison for network security scanner tools between GFI LanGuard and Microsoft Baseline Security Analyzer (MBSA). In 2017 15th International Conference on ICT and Knowledge Engineering (ICT&KE)(pp. 1-7). IEEE.
- Pauli, J. (2013). The basics of web hacking: tools and techniques to attack the web. Elsevier.
- Pavlenko, A., Buzdalov, M., &Ulyantsev, V. (2019, July). Fitness comparison by statistical testing in construction of SAT-based guess-and-determine cryptographic attacks. In Proceedings of the Genetic and Evolutionary Computation Conference (pp. 312-320).
- Pawar, M. V., &Anuradha, J. (2015). Network security and types of attacks in network. Procedia Computer Science, 48, 503-506.
- Peisert, S., Schneier, B., Okhravi, H., Massacci, F., Benzel, T., Landwehr, C., … & Michael, J. B. (2021). Perspectives on the SolarWinds incident. IEEE Security & Privacy, 19(2), 7-13.
- Pham, D. V., Syed, A., Mohammad, A., &Halgamuge, M. N. (2010, June). Threat analysis of portable hack tools from USB storage devices and protection solutions. In 2010 International Conference on Information and Emerging Technologies (pp. 1-5). IEEE.
- Postel, J., & Reynolds, J. (1985). File transfer protocol (No. rfc959).
- Puttaswamy, K. P., Kruegel, C., & Zhao, B. Y. (2011, October). Silverline: toward data confidentiality in storage-intensive cloud applications. In Proceedings of the 2nd ACM Symposium on Cloud Computing (pp. 1-13).
- Qian, Z., Mao, Z. M., &Xie, Y. (2012, October). Collaborative TCP sequence number inference attack: how to crack sequence number under a second. In Proceedings of the 2012 ACM conference on Computer and communications security(pp. 593-604).
- Rahalkar, S., Rahalkar, &Karkal. (2019). Quick Start Guide to Penetration Testing. Berkeley, CA, USA: Apress.
- Rai, S., Choubey, V., & Garg, P. (2022, July). A Systematic Review of Encryption and Keylogging for Computer System Security. In 2022 Fifth International Conference on Computational Intelligence and Communication Technologies (CCICT) (pp. 157-163). IEEE.
- Rajesh, B., Reddy, Y. J., & Reddy, B. D. K. (2015). A survey paper on malicious computer worms. International Journal of Advanced Research in Computer Science and Technology, 3(2), 161-167.
- Raza, M., Iqbal, M., Sharif, M., &Haider, W. (2012). A survey of password attacks and comparative analysis on methods for secure authentication. World Applied Sciences Journal, 19(4), 439-444.
- Reddy, G. N., & Reddy, G. J. (2014). A study of cyber security challenges and its emerging trends on latest technologies. arXiv preprint arXiv:1402.1842.
- Roberts, R. M. (2005). Networking Fundamentals Course Outline & Text Materials. Wilcox Publisher: Tinley Park, IL, USA.
- Roldán-Molina, G.; Almache-Cueva, M.; Silva-Rabadão, C.; Yevseyeva, I.; Basto-Fernandes, V. A (2017). comparison of cyber securityrisk analysis tools. Procedia Comput. Sci. 121, 568–575.
- Ruiz-Sánchez, M. Á., Biersack, E. W., &Dabbous, W. (2001). Survey and taxonomy of IP address lookup algorithms. IEEE network, 15(2), 8-23.
- Russell, D., &Gangemi, G. T. (1991). Computer security basics. ” O’Reilly Media, Inc.”.
- Safa, N. S., Von Solms, R., &Furnell, S. (2016). Information security policy compliance model in organizations. Computers & security, 56, 70-82.
- Saghezchi, F. B., Mantas, G., Violas, M. A., de Oliveira Duarte, A. M., & Rodriguez, J. (2022). Machine learning for DDoS attack detection in industry 4.0 CPPSs. Electronics, 11(4), 602.
- Sajjad, F. (2009). Denial of Service–The Smurf Attack. School of Computer Science University of Windsor: London, UK.
- Salman, T., & Jain, R. (2017). Networking protocols and standards for internet of things. Internet of things and data analytics handbook, 215-238.
- Schumacher, H. J., Ghosh, S., & Lee, T. S. (1999). Top Secret Traffic and the Public ATM Network Infrastructure. Secur. J. A Glob. Perspect., 7(4), 27-45.
- Schuba, C.L.; Krsul, I.V.; Kuhn, M.G.; Spafford, E.H.; Sundaram, A.; Zamboni, D. (1997). Analysis of a denial of service attack on TCP. ıN. In Proceedings of the 1997 IEEE Symposium on Security and Privacy, Oakland, CA, USA, 4–7 May , pp. 208–223.
- Shah, S. S. H., Ahmad, A. R., Jamil, N., & Khan, A. U. R. (2022). Memory forensics-based malware detection using computer vision and machine learning. Electronics, 11(16), 2579.
- Singh, K., Singh, P., & Kumar, K. (2018). User behavior analytics-based classification of application layer HTTP-GET flood attacks. Journal of Network and Computer Applications, 112, 97-114.
- Sivathanu, G., Wright, C. P., &Zadok, E. (2005, November). Ensuring data integrity in storage: Techniques and applications. In Proceedings of the 2005 ACM workshop on Storage security and survivability (pp. 26-36).
- Song, Z., Skuric, A., & Ji, K. (2020). A recursive watermark method for hard real-time industrial control system cyber-resilience enhancement. IEEE Transactions on Automation Science and Engineering, 17(2), 1030-1043.
- Stallings, W.; Brown, L.; Bauer, M.D.; Howard, M. (2012). Computer Security: Principles and Practice; Pearson: Upper Saddle River, NJ, USA.
- Stevens, W.R. (1994). TCP/IP Illustrated, Volume 1: The Protocols; Addison Wesley: Boston, MA, USA. ISBN 0-201-63346-9.
- Stevens, C. (2020). Assembling cybersecurity: The politics and materiality of technical malware reports and the case of Stuxnet. Contemporary Security Policy, 41(1), 129-152.
- Sula, E. (2018). A review of Network Layer and Transport Layer Attacks on Wireless Networks. Int. J. Mod. Eng. Res, 8, 23-27.
- Syed, S., Khuhawar, F., &Talpur, S. (2021, October). Machine Learning Approach for Classification of DHCP DoS Attacks in NIDS. In 2021 IEEE 18th International Conference on Smart Communities: Improving Quality of Life Using ICT, IoT and AI (HONET)(pp. 143-146). IEEE.
- Taylor, P. J., Dargahi, T., Dehghantanha, A., Parizi, R. M., & Choo, K. K. R. (2020). A systematic literature review of blockchain cyber security. Digital Communications and Networks, 6(2), 147-156.
- Tehranipoor, M., & Wang, C. (Eds.). (2011). Introduction to hardware security and trust. Springer Science & Business Media.
- Tripathi, N., &Mehtre, B. M. (2014, July). Analysis of various ARP poisoning mitigation techniques: A comparison. In 2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)(pp. 125-132). IEEE.
- Tripathi, N., &Hubballi, N. (2016, November). A probabilistic anomaly detection scheme to detect DHCP starvation attacks. In 2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS) (pp. 1-6). IEEE.
- Tripathi, N., & Hubballi, N. (2018). Detecting stealth DHCP starvation attack using machine learning approach. Journal of Computer Virology and Hacking Techniques, 14, 233-244.
- Tripathi, N., & Hubballi, N. (2018). Slow rate denial of service attacks against HTTP/2 and detection. Computers & security, 72, 255-272.
- Tripathi, N., &Hubballi, N. (2021). Application layer denial-of-service attacks and defense mechanisms: a survey. ACM Computing Surveys (CSUR), 54(4), 1-33.
- Tundis, A., Mazurczyk, W., &Mühlhäuser, M. (2018, August). A review of network vulnerabilities scanning tools: types, capabilities and functioning. In Proceedings of the 13th international conference on availability, reliability and security (pp. 1-10).
- Vimal, S., Kalaivani, L., &Kaliappan, M. (2019). Collaborative approach on mitigating spectrum sensing data hijack attack and dynamic spectrum allocation based on CASG modeling in wireless cognitive radio networks. Cluster Computing, 22, 10491-10501.
- Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber security. Computers & security, 38, 97-102.
- Wadhwa, A., & Arora, N. (2017). A Review on Cyber Crime: Major Threats and Solutions. International Journal of Advanced Research in Computer Science, 8(5).
- Walden, D. (2011). 50th anniversary of MIT’s Compatible Time-Sharing System. IEEE Annals of the History of Computing, 33(4), 84-85.
- Wang, W., & Lu, Z. (2013). Cyber security in the smart grid: Survey and challenges. Computer networks, 57(5), 1344-1371.
- Wang, Y., & Yang, J. (2017, March). Ethical hacking and network defense: choose your best network vulnerability scanning tool. In 2017 31st International Conference on Advanced Information Networking and Applications Workshops (WAINA) (pp. 110-113). IEEE.
- Waseem, M., Adnan Khan, M., Goudarzi, A., Fahad, S., Sajjad, I. A., &Siano, P. (2023). Incorporation of blockchain technology for different smart grid applications: Architecture, prospects, and challenges. Energies, 16(2), 820.
- Whitman, M. E., &Mattord, H. J. (2021). Principles of information security. Cengage learning.
- Whitman, M.E.; Mattord, H.J. (2013). Management of Information Security; Cengage Learning: Boston, MA, USA, 27–35.
- Yaacoub, J. P. A., Noura, H. N., Salman, O., &Chehab, A. (2022). Robotics cyber security: Vulnerabilities, attacks, countermeasures, and recommendations. International Journal of Information Security, 1-44.
- Younes, O. S. (2016). A secure DHCP protocol to mitigate LAN attacks. Journal of Computer and Communications, 4(1), 39-50
- Zimmermann, H. (1980). OSI reference model-the ISO model of architecture for open systems interconnection. IEEE Transactions on communications, 28(4), 425-432
- Zou, Y., Zhu, J., Wang, X., &Hanzo, L. (2016). A survey on wireless security: Technical challenges, recent advances, and future trends. Proceedings of the IEEE, 104(9), 1727-1765
Download all article in PDF
![]()



