IJSTR

International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
0.2
2019CiteScore
 
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020

CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT

IJSTR >> Volume 9 - Issue 10, October 2020 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Exploring Dimensions Of Defense In Cyber Space-A REVIEW

[Full Text]

 

AUTHOR(S)

Sai Pratheek Chalamalasetty, Srinivasa Rao Giduturi

 

KEYWORDS

Cyber Security, Cyber Crimes, Cyber Forensics

 

ABSTRACT

INTRODUCTION: IN THIS MODERN AGE, THE WORLD IS ADVANCING IN TERMS OF CONNECTIVITY THROUGH NEW NETWORKING PARADIGMS. THERE WILL BE GROWTH IN VOLUME, VARIETY AND VERACITY OF THE CYBER DATA ALONG WITH DEVICES, AND IT IS PREDICTED THAT THIS COUNT WILL REACH 200 BILLION BY 2020. DIGITAL CRIMINALS LARGELY DEPEND ON DECEIT STRATEGIES TO EXPLOIT WEAKNESSES AND MASQUERADE THEIR IDENTITY WHICH IN TURN ARE PESSIMISTIC ABOUT CYBER DETERRENCE. THIS ARTICLE PRESENTS A REVIEW OF CYBER CRIMES - METHODS AND WAYS TO TACKLE THEM WITH A BRIEF REVIEW ON CYBER FORENSICS. METHODOLOGY: SCOPUS DIGITAL LIBRARY AND IEEE EXPLORE WERE SEARCHED FOR RELEVANT ENGLISH PAPERS FROM 2019 TO REVERSE CHRONOLOGICAL ORDER. RESULTS AND CONCLUSION: THERE IS AN ALARMING EMERGENCY TO DESIGN NEW TECHNOLOGIES THAT CAN EFFECTIVELY WITHSTAND ANY KIND OF CYBER-ATTACKS. THE NEWLY DEVELOPED SECURITY PROTOCOLS SHOULD BE DYNAMIC ENOUGH TO HOLD THEIR GROUND AGAINST THE EVER-CHANGING NATURE OF CYBERCRIMES.

 

REFERENCES

[1] T. Dyhouse, “A unified framework for it security - analysis - [IT security],” in Engineering & Technology, vol. 4, no.11, pp. 58-58, 20 June 2009.
[2] R. Ramirez and N. Choucri, “Improving Interdisciplinary Communication with Standardized Cyber Security Terminology: A Literature Review” in IEEE Access, vol. 4, pp. 2216-2243, 2016.
[3] M. Xu, K. M. Schweitzer, R. M. Bateman and S. Xu, “Modeling and Predicting Cyber Hacking Breaches,” in IEEE Transactions on Information Forensics and Security, vol. 13, no. 11, pp. 2856-2871, Nov. 2018.
[4] Harmandeep Singh Brar, Gulshan Kumar, “Cybercrimes: A Proposed Taxonomy and Challenges,” in Journal of Computer Networks and Communications, 2018.
[5] Vaclav Jirovsky, Andrej Pastorek, Max Muhlhauser and Andrea Tundis, “Cybercrime and Organized Crime”, in ARES 2018, August 27–30, Hamburg, Germany, 2018.
[6] C. Fachkha and M. Debbabi, “Darknet as a Source of Cyber Intelligence: Survey, Taxonomy, and Characterization,” in IEEE Communications Surveys, Tutorials, vol. 18, no. 2, pp. 1197-1227, Second quarter 2016.
[7] A. Lu and G. Yang, “Input-to-State Stabilizing Control for Cyber-Physical Systems with Multiple Transmission Channels Under Denial of Service,” in IEEE Transactions on Automatic Control, vol. 63, no. 6, pp. 1813-1820, June 2018.
[8] National Research Council (ed). Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy. Washington, DC: National Academies Press, 2010. 

[9] Y. Chen, K. Hwang and W. Ku, “Collaborative Detection of DDoS Attacks over Multiple Network Domains,” in IEEE Transactions on Parallel and Distributed Systems, vol. 18, no. 12, pp. 1649-1662, Dec. 2007.
[10] GH. Snyder, “Deterrence and Defense: Toward a Theory of National Security”, in Princeton University Press, 1961.
[11] D Peterson, “Offensive cyber weapons: construction, development, and employment”, in J Strat Stud, vol.36, no.120–4, 2013.
[12] J. Solomon, “Cyberdeterrence between nation-states plausible strategy or a pipe dream?”, in J Strat Stud, vol.5, no.1–25, 2011.
[13] E. Jasiello, “Is cyber deterrence an illusory course of action?”, in J Strat Secure, vol. 7, pp.54–67, 2013.
[14] E. Gartzke, “The myth of cyberwar: bringing war in cyberspace back down to earth”, in Internal Security, vol.38, no.41–73, 2013.
[15] D. Elliott, “Deterring strategic cyberattack”, in IEEE Secure & Privacy vol. 9, pp.36–40, 2011.
[16] S. Sulaiman and B. Sreeya,” Public awareness on cybercrime with special reference to Chennai”, in International Journal of Innovative Technology and Exploring Engineering, vol.9 no. 1, pp. 3362-3364,2019.
[17] W. Elmasry, A. Akbulut and A.H. Zaim, “Empirical study on multiclass classification-based network intrusion detection”, in Computational Intelligence, vol. 35, no.4, pp. 919-954,2019.
[18] S. Sarkar, M. Almukaynizi, J. Shakarian and P. Shakarian, “Mining user interaction patterns in the darkweb to predict enterprise cyber incidents”, in Social Network Analysis and Mining, vol.9, no.1, art. no. 57, 2019.
[19] M. T. Khan, D. Serpanos and H. Shrobe, “ARMET: Behavior-Based Secure and Resilient Industrial Control Systems”, in Proceedings of the IEEE, vol. 106, no. 1, pp. 129-143, Jan. 2018.
[20] A. Agrawal, M. Alenezi, R. Kumar and R.A. Khan, “A source code perspective framework to produce secure web applications”, in Computer Fraud and Security, vol.10, pp. 11-18, 2019.
[21] J. Eriksson and G. Giacomello, “The Information revolution, security, and international relations: (IR) relevant theory?”, in Int Polit Sci Rev Rev Int Sci Polit, vol.27, pp.221–44, 2006.

[22] Y. Harbi, Z. Aliouat, S. Harous, A. Bentaleb and A. Refoufi, “A Review of Security in Internet of Things”, in Wireless Personal Communications, vol.108, no.1, pp. 325-344, 2019.
[23] L. Kello, “The meaning of the Cyber Revolution: perils to theory and statecraft”, in Internal Security, vol.38, pp.7–40, 2013.
[24] SJ. Sinclair and D. Antonius, “The Political Psychology of Terrorism Fears”, in Oxford University Press, 2013.
[25] S. Shringarpure and J. Dharam, “Internet trolling: Analyzing the legal myths and facts”, in International Journal of Engineering and Advanced Technology, vol. 8, no.5 C, pp. 1429-1431, 2019
[26] J.D. Mireles, E. Ficke, J.H. Cho, P. Hurley and S. Xu, “Metrics towards measuring cyber agility”, in IEEE Transactions on Information Forensics and Security, vol. 14, no.12, art. no. 8695107, pp. 3217-3232, 2019.
[27] S. Simou, C. Kalloniatis, S. Gritzalis and V. Katos, “A framework for designing cloud forensic enabled services (CFeS)”, in Requirements Engineering, vol.24, no.3, pp. 403-430, 2019.
[28] F. Amato, G. Cozzolino, V. Moscato and F. Moscato, “Analyse digital forensic evidences through a semantic-based methodology and NLP techniques”, in Future Generation Computer Systems, vol. 98, pp. 297-307, 2019.
[29] S. Singh, M. Kubendiran and A.K. Sangaiah, “A review on intrusion detection approaches in cloud security systems”, in International Journal of Grid and Utility Computing, vol.10, no.4, pp. 361-374, 2019.
[30] A. Liu, H. Fu, Y. Hong, J. Liu and Y. Li, “LiveForen: Ensuring Live Forensic Integrity in the Cloud”, in IEEE Transactions on Information Forensics and Security, vol. 14, no. 10, art. no. 8638983, pp. 2749-2764, 2019.
[31] R.S. Shaji, V. Sachin Dev and T. Brindha, “A methodological review on attack and defense strategies in cyber warfare”, in Wireless Networks, vol. 25, no. 6, pp. 3323-3334, 2019.
[32] Vicky Nanjappa, “Cyber Crime – 1600 arrested, only 7 convicted”, in Rediff Business News, 2012.
[33] O. Burger, B. Hackel, P. Karnebogen and J. Toppel, “Estimating the impact of IT security incidents in digitized production environments”, in Decision Support Systems, vol. 127, art. no. 113144, 2019.
[34] N. Serketzis, V. Katos, C. Ilioudis, D. Baltatzis and G.J. Pangalos, “Actionable threat intelligence for digital forensics readiness”, in Information and Computer Security, vol. 27 no. 2, pp. 273-291, 2019.

[35] G.M. Jagadeesha, K. Sirbi and T.M. Veeragangadhara Swamy, “Digital forensic process in cybercrime data mining”, in International Journal of Innovative Technology and Exploring Engineering, vol. 8, no. 6, pp. 365-369, 2019.

[36] H. Guo, B. Jin, and D. Huang, “Research and Review on Computer Forensics,” Forensics in Telecom., Inf., and Multimedia, 2010.

[37] P. P. Hatole and D. S. K. Bawiskar, “Literature Review of Email Forensics,” Imp. J. Interdiscip. Res., vol. 3, no. 4, Apr. 2017.
[38] M. Kaur, N. Kaur, and S. Khurana, “A literature review on cyber forensic and its analysis tools,” Int. J. Adv. Res. Comput. Commun. Eng., vol. 5, no. 1, pp. 23–28, 2016.

[39] S.Al-Haj Baddar, A. Merlo and M. Migliardi, “Behavioral Anomaly Detection in Forensics Analysis”, in IEEE Security and Privacy, vol. 17, no. 1, art. no. 8674039, pp. 55-62, 2019.

[40] J. Liu, Y. Xiao, S. Li, W. Liang, and C. L. Philip Chen, “Cyber 
security and privacy issues in smart grids,” IEEE Commu- 
nications Surveys & Tutorials, vol. 14, no. 4, pp. 981–997, 2012. 

[41] F. Iqbal, B. C. M. Fung, M. Debbabi, R. Batool and A. Marrington, “Wordnet-Based Criminal Networks Mining for Cybercrime Investigation”, in IEEE Access, vol. 7, pp. 22740-22755, 2019.

[42] A. Razzaq, A. Hur, H. Farooq Ahmad, and M. Masood, 
“Cyber security: threats, reasons, challenges, methodologies and state of the art solutions for industrial applications,” in Proceedings of the 2013 IEEE Eleventh International Symposium on Autonomous Decentralized Systems (ISADS), pp. 1–6, Mexico City, Mexico, March 2013. 

[43] F. B. Schneider, “Cybersecurity education in universities,” IEEE Security & Privacy, vol. 11, no. 4, pp. 3-4, 2013. 

[44] S. Soltan, M. Yannakakis and G. Zussman, “REACT to Cyber Attacks on Power Grids”, in IEEE Transactions on Network Science and Engineering, vol. 6, no. 3, art. no. 8360557, pp. 459-473, 2019.

[45] J. Jang-Jaccard and S. Nepal, “A survey of emerging threats in cybersecurity,” in Journal of Computer and System Sciences, vol. 80, no. 5, pp. 973–993, 2014. 

[46] A. Al-Dhaqm et al., “CDBFIP: Common Database Forensic Investigation Processes for Internet of Things” in IEEE Access, vol. 5, pp. 24401-24416, 2017.

[47] T. Kurpjuhn, “The guide to ransomware: how businesses can manage the evolving threat”, in Computer Fraud and Security, vol. 11, pp. 14-16, 2019. 

[48] S. T. Ali, V. Sivaraman, A. Radford, and S. Jha, “A survey of securing networks using software defined networking,” IEEE Transactions on Reliability, vol. 64, no. 3, pp. 1086–1097, 2015.
[49] A. R. Sadeghi, C. Wachsmann, and M. Waidner, “Security and privacy challenges in industrial internet of things,” in Proceedings of the 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC), pp. 1–6, San Francisco, CA, USA, June 2015. 

[50] S. Singh, Y.S. Jeong, and J. H. Park, “A survey on cloud computing security: issues, threats, and solutions,” Journal of Network and Computer Applications, vol. 75, pp. 200–222, 2016. 

[51] H. Naeem, “Detection of Malicious Activities in Internet of Things Environment Based on Binary Visualization and Machine Intelligence” in Wireless Personal Communications, vol. 108, no. 4, pp. 2609-2629, 2019.

[52] Y. Zou, J. Zhu, X. Wang, and L. Hanzo, “A survey on wireless security: technical challenges, recent advances, and future trends,” Proceedings of the IEEE, vol. 104, no. 9, pp. 1727–1765, 2016.
[53] G. Kumar, A. Kaur, and S. Sethi, “Computer network attacks- a study,” International Journal of Computer Science and Mobile Applications, vol. 2, no. 11, pp. 24–32, 2014.
[54] R. Ismailova, G. Muhametjanova, T.D. Medeni, I.T. Medeni, D. Soylu and O.A. Dossymbekuly, “Cybercrime risk awareness rate among students in Central Asia: A comparative study in Kyrgyzstan and Kazakhstan” in Information Security Journal, vol. 28, no. 4-5, pp. 127-135, 2019.
[55] P. Mihci Turker and E. Kilic Cakmak, “An Investigation of Cyber Wellness Awareness: Turkey Secondary School Students, Teachers, and Parents”, in Computers in the Schools, vol. 36, no. 4, pp. 293-318, 2019.
[56] W. M. Al-Rahmi, N. Yahaya, M. M. Alamri, N. A. Aljarboa, Y. B. Kamin and M. S. B. Saud, “How Cyber Stalking and Cyber Bullying Affect Students’ Open Learning”, in IEEE Access, vol. 7, pp. 20199-20210, 2019.
[57] S. L. Pfleeger, J. B. Predd, J. Hunker and C. Bulford, “Insiders Behaving Badly: Addressing Bad Actors and Their Actions”, in IEEE Transactions on Information Forensics and Security, vol. 5, no. 1, pp. 169-179, March 2010.
[58] J. Shin, S.H. Choi, P. Liu and Y.H. Choi, “Unsupervised multi-stage attack detection framework without details on single-stage attacks”, in Future Generation Computer Systems, vol. 100, pp. 811-825, 2019.
[59] H. Jeon and Y. Eun, “A Stealthy Sensor Attack for Uncertain Cyber-Physical Systems”, in IEEE Internet of Things Journal, vol. 6, no. 4, art. no. 8669856, pp. 6345-6352, 2019.
[60] S. Ndichu, S. Kim, S. Ozawa, T. Misu and K. Makishima, “A machine learning approach to detection of JavaScript-based attacks using AST features and paragraph vectors”, in Applied Soft Computing Journal, vol. 84, art. no. 105721, 2019.
[61] Ed Pearson and C.L. Bethel, “A design review: Concepts for mitigating SQL injection attacks”, in IEEE: ISDFS”, 2016.
[62] B. Chen, D. W. C. Ho, W. Zhang and L. Yu, “Distributed Dimensionality Reduction Fusion Estimation for Cyber-Physical Systems Under DoS Attacks”, in IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 49, no. 2, pp. 455-468, Feb. 2019.
[63] O. Osanaiye, K.-K. Raymond Choo, and M. Dlodlo, “Distributed denial of service (DDoS) resilience in cloud: review and conceptual cloud DDoS mitigation framework,” Journal of Network and Computer Applications, vol. 67, pp. 147–165, 2016.
[64] D. Arivudainambi, K.A., V.K., S., S.C., and P. Visu, “Malware traffic classification using principal component analysis and artificial neural network for extreme surveillance” in Computer Communications, vol. 147, pp. 50-57, 2019.
[65] A. Bodhani, “Feeling lucky? [Special Report Cyber Security]”, in Engineering & Technology, vol. 10, no. 1, pp. 44-47, Feb. 2015.

[66] R. Heartfield, G. Loukas and D. Gan, “You Are Probably Not the Weakest Link: Towards Practical Prediction of Susceptibility to Semantic Social Engineering Attacks”, in IEEE Access, vol. 4, pp. 6910-6928, 2016.

[67] W. Fan, Z. Du, M. Smith-Creasey and D. Fernandez, “HoneyDOC: An Efficient Honeypot Architecture Enabling All Round Design”, in IEEE Journal on Selected Areas in Communications, vol. 37, no. 3, pp. 683-697, March 2019.
[68] A. Binbusayyis and T. Vaiyapuri, “Identifying and Benchmarking Key Features for Cyber Intrusion Detection: An Ensemble Approach”, in IEEE Access, vol. 7, pp. 106495-106513, 2019.
[69] Z. Tan, A. Jamdagni, X. He, P. Nanda, R. P. Liu and J. Hu, “Detection of Denial-of-Service Attacks Based on Computer Vision Techniques”, in IEEE Transactions on Computers, vol. 64, no. 9, pp. 2519-2533, 1 Sept. 2015.
[70] F. Ullah et al., “Cyber Security Threats Detection in Internet of Things Using Deep Learning Approach”, in IEEE Access, vol. 7, pp. 124379-124389, 2019.
[71] M. Khonji, Y. Iraqi and A. Jones, “Phishing Detection: A Literature Survey”, in IEEE Communications Surveys & Tutorials, vol. 15, no. 4, pp. 2091-2121, Fourth Quarter 2013.
[72] Z. Dou, I. Khalil, A. Khreishah, A. Al-Fuqaha and M. Guizani, “Systematization of Knowledge (SoK): A Systematic Review of Software-Based Web Phishing Detection”, in IEEE Communications Surveys & Tutorials, vol. 19, no. 4, pp. 2797-2819, Fourth quarter 2017.
[73] R.S. Rao and A.R. Pais, “Detection of phishing websites using an efficient feature-based machine learning framework”, in Neural Computing and Applications, vol. 31, no. 8, pp. 3851-3873, 2019.