Cyber attacks, countermeasures, and protection schemes — A state of the art survey

Shabut, Antesar M. and Lwin, K.T. and Hossain, M.A. (2017) Cyber attacks, countermeasures, and protection schemes — A state of the art survey. In: SKIMA2016, 15-17 December 2016, Chengdu, China.

[img] Text
Accepted Version
Available under the following license: Creative Commons Attribution Non-commercial No Derivatives.

Download (724kB)
[img] Other (Acceptance)
Other
Restricted to Repository staff only

Download (122kB)
Official URL: https://doi.org/10.1109/SKIMA.2016.7916194

Abstract

Thousands of cyber-attacks (fraudulent online activities to acquire users’ sensitive information via email, during online transactions, live video streaming, online gaming and browsing) are launched every day against Internet users across the world. To prevent these attacks, researchers have responded with a number of protection systems. Currently, the methods which cyber-attackers use to conduct attacks is associated with exploiting humans. Such attacks are recorded more frequently than before, and they are more challenging to control. Traditional security countermeasures are unable to prevent breaches targeting the human element. This paper describes the state of the art of cyber security attacks, countermeasures, and protection tools related to everyday online activities. It provides a useful cyber-attack taxonomy and classification which helps to involve in a protection process to identify attacks and measures for cyber security. Existing protection schemes that target the cyber threats and risks are evaluated against three of our criteria for an effective measure: resilience to cyber-attacks’ countermeasures; real-time support and needs-based action; and training and educational materials to increase users’ awareness of cybercrimes. Potential features of smart solutions to cybercrime are also identified.

Item Type: Conference or Workshop Item (Paper)
Additional Information: © 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works
Keywords: cyber security, existing protection tools, attack taxonomy, cyber attacks
Depositing User: Dr Antesar Shabut
Date Deposited: 01 Sep 2017 13:18
Last Modified: 01 Sep 2017 13:22
URI: http://arro.anglia.ac.uk/id/eprint/702127

Actions (login required)

Edit Item Edit Item