Cyber Attacks : Detection and Prevention
DOI:
https://doi.org/10.32628/IJSRSET229511Keywords:
Cyberattacks, Cybercrime, cyberattacks detection, Cyberattack Prevention, Malware, SQL injection, Phishing, Man in the middle attack (MiM), ObURL detection algorithm.Abstract
Tens of millions of cyber-attacks (Emails, online transactions, live video streaming, online games, and navigation are all examples of fraudulent Internet-based intelligence gathering.) are launched every day against Internet users throughout the world. Various defences have been developed by researchers in response to these attacks. At present, the techniques that cyber attackers use to perpetrate attacks are related to human exploitation. These attacks are more frequent than before, and they are harder to contain. In the area of information management, cybersecurity is essential. In today's world, protecting privacy has been one of the most difficult tasks. "Cyber-crimes" is the first thing that has come to me when I think about cyber security, which are on the rise at an alarming rate. Various governments and corporations are taking various actions to tackle cybercrime. Despite different initiatives, cyber security remains a major issue for many people. Traditional non-confidence counter-measures are unable to prevent violations against individuals. This paper explains the current state of cybersecurity threats, counter-measures and non-confidence tools that are relevant to day-to-day online operations. It offers a valuable cyber-attack taxonomy and classification that aids in the identification of cyber-attacks and cyber-security initiatives.
References
- G.NIKHITA REDDY, G.J.UGANDER REDDY A STUDY OF CYBER SECURITY CHALLENGES https://arxiv.org/ftp/arxiv/papers/1402/1402.1842.pdf
- Ram B. Basnet. Andrew H. Sung, Qingshang Liu Rule-Based Phishing Attack Detection https://www.cs.nmt.edu/~rbasnet/research/RuleBasedPhishingAttackDetectionFinal.pdf
- Patil, Prajakta & Rane, Rashmi & Bhalekar, Madhuri. Detecting spam and phishing mails using SVM and obfuscation URL detection algorithm. 1-4. 10.1109/ICISC.2017.8068633. https://www.researchgate.net/publication/320651414
- Ammar Ahmed E. Elhadi, Mohd Aizaini Maarof and Ahmed HamzaOsman Malware Detection Based on Hybrid Signature Behaviour Application Programming Interface Call Graph. ISSN 1546-9239 http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.854.2710&rep=rep1&type=pdf
- A. M. Shabut, K. T. Lwin and M. A. Hossain, "Cyberattacks, countermeasures, and protection schemes — A state of the art survey," DOI: 10.1109/SKIMA.2016.7916194 https://ieeexplore.ieee.org/abstract/document/7916194
- G.NIKHITA REDDY, G.J.UGANDER REDDY A STUDY OF CYBER SECURITY CHALLENGES AND ITS EMERGING TRENDS ON LATEST TECHNOLOGIES https://arxiv.org/ftp/arxiv/papers/1402/1402.1842.pdf
- Cyber Crime Investigation: Tools and Techniques | Info-savvy.com Copyright © 2021 Infosavvy Security and IT Management Training | Certification Partner InfoCerts.com https://info-savvy.com/cyber-crime-investigation-tools-and-techniques/
- Focus Areas for Cyber Security© ProTech Services Group, Inc. https://www.psgi.net/10-focus-areas-for-cyber-security
- What is Malware? A Definition & Tips for Malware Prevention | Digital Guardian©Digital Guardian All rights reserved. https://digitalguardian.com/blog/what-malware-definition-tips-malware-prevention
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.