Abstract

Cyber-attacks are becoming more common and over the last decade, many attacks have made top news, targeting manufacturing firms and governmental organisations. Such attacks have triggered substantial financial damage and they've been trying to obstruct key public sector operations. Furthermore, as the Internet of Things (IoT) has arisen, the number of Internetconnected devices is increasingly growing and being an easy target of cyber-attacks. To counter cyber-attacks, information security researchers rely extensively on intrusion detection systems (IDSs) that can identify suspicious activities by comparing patterns of documented attacks or detecting anomaly-based activities. This survey aims to tackle Trust, Protection, identification and activity on wide scale networks and Internet of Things. The proposed research aims at developing a practically deployable cyber security solution to one or more of the cyber-attacks. Multi-Stage Attacks (MSAs), APT, DoS attacks, wireless injection attacks, botnets or other malicious activities will be investigated. In this literature survey, we are highlighting the work Performed throughout the area of cyber security by various researchers, various types of cyber-attacks and its stages, various approaches to prevent cyber-attacks, different challenges faced by a preventer, and some gaps in the research. This literature review is carried out by using the secondary data obtained from peer-reviewed journals and other sources on the web. This review aims to explain Detecting Malicious Activities in Network Traffic.

Highlights

  • OVERVIEW OF CYBER ATTACKS : Cyber security is a rapidly growing field that needs a lot of attention due to remarkable developments in Internet of Things (IoT) networks, cloud and web technology, mobile world, online banking, smart grid, etc

  • As technology tends to grow, the world is increasingly becoming a global village with almost all operating on the virtual worlds influencing most aspects of human life, enabling development, removing barriers to trade and allowing people across the globe to connect, collaborate and share ideas

  • By the day hackers become more advanced. This puts the responsibility on the information technology (IT) Experts to secure the IT infrastructure and users, necessity to be attentive and efficient in reacting to cyber attacks as well as proactive in ensuring that cyber threats are mitigated against them in their entirety

Read more

Summary

Introduction

TCP and/or UDP flood attacks can drain cloud resources, absorb much of their bandwidth, and damage a complete cloud project in a short time (Hoque, Sazzadul Mukit, 2012) [3] These security threats include the creation and deployment of an efficient intrusion program that will protect the cloud from zero-day attacks that have just arisen. Without a protection policy in line, attacker can access your system and misuse your private information, customer data, business intelligence and much more. This analysis is being carried out with the aim of properly understanding the definition of cybercrime and cyber protection and of providing effective and appropriate remedies to address these concerns in today's Internet world. What are the various works done in the field of cyber security in order to prevent cyber attacks?

Objectives
Findings
Discussion
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.