Cyber attacks, countermeasures, and protection schemes — A state of the art survey

Shabut, Antesar M. and Lwin, Khin T. and Hossain, Mohammed Alamgir (2017) Cyber attacks, countermeasures, and protection schemes — A state of the art survey. In: 2016 10th International Conference on Software, Knowledge, Information Management & Applications (SKIMA), 15-17 December 2016, Chengdu, China.

[img] Text
Accepted Version
Available under the following license: Creative Commons Attribution Non-commercial No Derivatives.

Download (724kB)
[img] Other (Acceptance)
Restricted to Repository staff only

Download (122kB) | Request a copy
Official URL:


Thousands of cyber-attacks (fraudulent online activities to acquire users’ sensitive information via email, during online transactions, live video streaming, online gaming and browsing) are launched every day against Internet users across the world. To prevent these attacks, researchers have responded with a number of protection systems. Currently, the methods which cyber-attackers use to conduct attacks is associated with exploiting humans. Such attacks are recorded more frequently than before, and they are more challenging to control. Traditional security countermeasures are unable to prevent breaches targeting the human element. This paper describes the state of the art of cyber security attacks, countermeasures, and protection tools related to everyday online activities. It provides a useful cyber-attack taxonomy and classification which helps to involve in a protection process to identify attacks and measures for cyber security. Existing protection schemes that target the cyber threats and risks are evaluated against three of our criteria for an effective measure: resilience to cyber-attacks’ countermeasures; real-time support and needs-based action; and training and educational materials to increase users’ awareness of cybercrimes. Potential features of smart solutions to cybercrime are also identified.

Item Type: Conference or Workshop Item (Paper)
Additional Information: © 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works
Keywords: cyber security, existing protection tools, attack taxonomy, cyber attacks
Depositing User: Dr Antesar Shabut
Date Deposited: 01 Sep 2017 13:18
Last Modified: 09 Sep 2021 18:58

Actions (login required)

Edit Item Edit Item