To see the other types of publications on this topic, follow the link: Threats and Attacks.

Journal articles on the topic 'Threats and Attacks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Threats and Attacks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Sarkunavathi, A., and V. Srinivasan. "A Detailed Study on Advanced Persistent Threats: A Sophisticated Threat." Asian Journal of Computer Science and Technology 7, S1 (2018): 90–95. http://dx.doi.org/10.51983/ajcst-2018.7.s1.1797.

Full text
Abstract:
In the present world computer networks are used to store sensitive information and to provide services for organizations and society. The growth of internet and the increased use of computers in society along with smart devices lead to the increase in cyber crimes and persistent attacks. The most complex and advanced attacks are targeted attacks which are specifically aimed at companies or governments to accomplish the predetermined goals such as economic advantages, strategic benefits, getting control of sensitive information. Hackers try to access sensitive data from cyber space and there by
APA, Harvard, Vancouver, ISO, and other styles
2

Rajeev, Gautham K. "Identifying Vulnerabilities and Reducing Cyber Risks and Attacks Using a Cyber Security Lab Environment." International Journal for Research in Applied Science and Engineering Technology 10, no. 8 (2022): 1625–34. http://dx.doi.org/10.22214/ijraset.2022.46468.

Full text
Abstract:
Abstract: In the present digital world where everyone is trying to digitalize their data and assets, cyber-attacks and cyber-crimes have made their presence felt much more than when compared to the previous period. During the pandemic days, the number of state sponsored and nation sponsored threat actors who pose the threat of attacking our organizational assets has increased rapidly. Organizations, especially which fall under the critical information infrastructure are becoming an increasingly common target for cyber-attacks. The rate has alarmingly gone up that the national and state governm
APA, Harvard, Vancouver, ISO, and other styles
3

Akash, V. S., P. Johnson Akshay, P. S. Alakanandha, and Reji C. Joy Dr. "Cybersecurity in the Digital Age: Benefits and Protective Measures." Recent Trends in Cyber Criminology Research 1, no. 1 (2025): 22–31. https://doi.org/10.5281/zenodo.15188459.

Full text
Abstract:
<em>Cyber attacks are malicious attempts to compromise systems, disrupt operations, and steal data, posing significant risks to individuals, organizations, and governments. These attacks exploit vulnerabilities through malware, phishing, ransom ware, and DoS attacks, leading to financial losses, reputational damage, and security threats. Preventive measures, such as strong passwords, multifactor authentication, and encryption, enhance cybersecurity. Firewalls, IDSs, and IPSs play a crucial role in defending networks. Advanced techniques like SYN flood monitoring and DoS filtering mitigate thre
APA, Harvard, Vancouver, ISO, and other styles
4

Wang, Haojun. "Distributed Denial of Service Attack with Large Language Model." Highlights in Science, Engineering and Technology 138 (May 11, 2025): 132–37. https://doi.org/10.54097/586gg060.

Full text
Abstract:
Distributed Denial of Service (DDoS) attacks take full advantage of distributed networks by sending a relentless barrage of requests to a target server to disrupt the regular operation of the server. The main difference between a DDoS attack and a traditional Denial of Service (DoS) attack is its decentralized nature. This characteristic increases the attack's impact and thus creates incredible difficulty in prevention. Traditional DDoS strategies cover flooding attacks (e.g., TCP SYN and UDP floods), protocol usage techniques (e.g., SYN floods and the infamous Ping of Death), and resource exh
APA, Harvard, Vancouver, ISO, and other styles
5

Wu, Qi, Qiang Li, Dong Guo, and Xiangyu Meng. "Exploring the vulnerability in the inference phase of advanced persistent threats." International Journal of Distributed Sensor Networks 18, no. 3 (2022): 155013292210804. http://dx.doi.org/10.1177/15501329221080417.

Full text
Abstract:
In recent years, the Internet of Things has been widely used in modern life. Advanced persistent threats are long-term network attacks on specific targets with attackers using advanced attack methods. The Internet of Things targets have also been threatened by advanced persistent threats with the widespread application of Internet of Things. The Internet of Things device such as sensors is weaker than host in security. In the field of advanced persistent threat detection, most works used machine learning methods whether host-based detection or network-based detection. However, models using mac
APA, Harvard, Vancouver, ISO, and other styles
6

Viswanathan, Ganesh, and Prabhu J. "A hybrid threat model for system-centric and attack-centric for effective security design in SDLC." Web Intelligence 19, no. 1-2 (2021): 1–11. http://dx.doi.org/10.3233/web-210452.

Full text
Abstract:
Threat modeling is an essential activity in the security development lifecycle. To provide security at the design phase of software development, Microsoft introduced threat modeling stride to identify the vulnerabilities and attacks of application. An efficient solution is necessary to deal with these issues in the software development life cycle. In this context, the paper focused on the analysis of threats and attack tree techniques that are traditionally available and frequently used. Automated Threat modeling enables to simulate attacks and visualized the existing vulnerabilities and misco
APA, Harvard, Vancouver, ISO, and other styles
7

Sylvester, F. Ley. "Mobile Device Users’ Susceptibility to Phishing Attacks." International Journal of Computer Science and Information Technology 14, no. 1 (2022): 1–18. http://dx.doi.org/10.5121/ijcsit.2022.14101.

Full text
Abstract:
The mobile device is one of the fasted growing technologies that is widely used in a diversifying sector. Mobile devices are used for everyday life, such as personal information exchange – chatting, email, shopping, and mobile banking, contributing to information security threats. Users' behavior can influence information security threats. More research is needed to understand users' threat avoidance behavior and motivation. Using Technology threat avoidance theory (TTAT), this study assessed factors that influenced mobile device users' threat avoidance motivations and behaviors as it relates
APA, Harvard, Vancouver, ISO, and other styles
8

Ye, Shengke, Kaiye Dai, Guoli Fan, Ling Zhang, and Zhihao Liang. "Exploring the intersection of network security and database communication: a PostgreSQL Socket Connection case study." Transactions on Computer Science and Intelligent Systems Research 3 (April 10, 2024): 1–9. http://dx.doi.org/10.62051/pzqebt34.

Full text
Abstract:
In this study, the network security of PostgreSQL database using Socket connection is deeply analyzed. By exploring Socket connections established by PostgreSQL over TCP, we find potential security threats and vulnerabilities during data transmission, which may expose database systems to network attacks such as unauthorized access and data leakage. In order to assess these security risks, this study simulated a variety of network attack scenarios, especially the implantation and detection of Webshell, to reveal the vulnerability of PostgreSQL to such network threats. Especially in defending ag
APA, Harvard, Vancouver, ISO, and other styles
9

Palaniappan, Sellappan, Rajasvaran Logeswaran, Shapla Khanam, and Pulasthi Gunawardhana. "Social Engineering Threat Analysis Using Large-Scale Synthetic Data." Journal of Informatics and Web Engineering 4, no. 1 (2025): 70–80. https://doi.org/10.33093/jiwe.2025.4.1.6.

Full text
Abstract:
We frequently hear news about compromised systems, virus attacks, spam emails, stolen bank account numbers, and loss of money. Safeguarding and protecting digital assets against these and other cyber-attacks are extremely important in our digital connected world today. Many organizations spend substantial amounts of money to protect their digital assets. One type of cyber threat that is rampant these days is social engineering attacks that work on human psychology. These attacks typically persuade, convince, trick and threaten naïve and innocent individuals to divulge sensitive information to
APA, Harvard, Vancouver, ISO, and other styles
10

Li, Jiawei, Ru Zhang, Jianyi Liu, and Gongshen Liu. "LogKernel: A Threat Hunting Approach Based on Behaviour Provenance Graph and Graph Kernel Clustering." Security and Communication Networks 2022 (September 27, 2022): 1–16. http://dx.doi.org/10.1155/2022/4577141.

Full text
Abstract:
Cyber threat hunting is a proactive search process for hidden threats in an organization’s information system. It is a crucial component of active defense against advanced persistent threats (APTs). However, most of the current threat hunting methods rely on Cyber Threat Intelligence (CTI), which can find known attacks but cannot find unknown attacks that have not been disclosed by CTI. In this paper, we propose LogKernel, a threat hunting method based on graph kernel clustering which can effectively separate attack behaviour from benign activities. LogKernel first abstracts system audit logs
APA, Harvard, Vancouver, ISO, and other styles
11

Naik, Anushka. "Threats due To Side Channel Attacks (SCA) in Smartphones." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 07 (2024): 1–14. http://dx.doi.org/10.55041/ijsrem36777.

Full text
Abstract:
Today’s mobile devices contain densely packaged system-on-chips (SoCs) with multi-core, high frequency CPUs and complex pipelines. In parallel, sophisticated SoC-assisted security mechanisms have become commonplace for protecting device data, such as trusted execution environments, full disk and file-based encryption. Both advancements have dramatically complicated the use of conventional physical attacks, requiring the development of specialised attacks Our proposed classification system allows to analyze side-channel attacks systematically, and facilitates the development of novel countermea
APA, Harvard, Vancouver, ISO, and other styles
12

Janisar, Aftab Alam, Khairul Shafee bin Kalid, Aliza Bt Sarlan, M. Aqeel Iqbal, and Muhammad Amir Khan. "Comprehensive Review of Security Requirements for Mitigating Threats and Attacks on IoT Assets." JOIV : International Journal on Informatics Visualization 8, no. 3-2 (2024): 1827. https://doi.org/10.62527/joiv.8.3-2.3084.

Full text
Abstract:
Machine learning and artificial intelligence are increasingly being utilized to automate identifying and defining security requirements (SR) and addressing diverse IoT security issues. Despite its extensive environment, IoT-focused cyberattacks had the largest attack surface. IoT security requirements include data confidentiality, integrity, authentication, access control, and privacy. Inadequate emphasis on assessing security requirements leads to attacks and threats. To address the security issues that threaten the IoT environment, additional security measures are required to protect IoT-bas
APA, Harvard, Vancouver, ISO, and other styles
13

Mousa, Rama Soliman, and Rami Shehab. "Applying risk analysis for determining threats and countermeasures in workstation domain." Journal of Cyber Security and Risk Auditing 2025, no. 1 (2025): 12–21. https://doi.org/10.63180/jcsra.thestap.2025.1.2.

Full text
Abstract:
The main purpose of this research is to perform a comprehensive analysis of cyber risks in workstation domain, including classifying threats, vulnerabilities, impacts, and countermeasures. This classification helps to identify suitable security controls to mitigate cyber risks for each type of attack. Additionally, this study aims to explore the main vulnerabilities based on the type of attack in workstation domain. This study employs the content analysis technique to collect, analyze, and classify data in terms of types of threats, vulnerabilities, and countermeasures. The methodology compris
APA, Harvard, Vancouver, ISO, and other styles
14

Lehto, Martti. "APT Cyber-attack Modelling: Building a General Model." International Conference on Cyber Warfare and Security 17, no. 1 (2022): 121–29. http://dx.doi.org/10.34190/iccws.17.1.36.

Full text
Abstract:
The global community continues to experience an increase in the scale, sophistication, and successful perpetration of cyber-attacks. As the quantity and value of electronic information have increased, so too have the efforts of criminals and other malicious actors who have embraced the Internet as a more anonymous, convenient, and profitable way of carrying out their activities. The systems are attacked more and more by single or multiple hacktivists, state sponsored hackers, cyber criminals, cyber terrorists, cyber spies, or cyber warfare warfighters. The cyber security approach requires a ba
APA, Harvard, Vancouver, ISO, and other styles
15

Vivek, Vivek, and Karthik Painganadu Chandrasekaran. "Integrating Novel Mechanisms for Threat Detection in Enhanced Data Classification using Ant Colony Optimization with Recurrent Neural Network." Journal of Cybersecurity and Information Management 14, no. 2 (2024): 132–47. http://dx.doi.org/10.54216/jcim.140209.

Full text
Abstract:
In new technologies like fog computing, edge computing, cloud computing, and the Internet of Things (IoT), cybersecurity concerns and cyber-attacks have surged. The demand for better threat detection and prevention systems has increased due to the present global uptick in phishing and computer network attacks. In order to identify irregularities and attacks on the network, which have increased in scale and prevalence, threat identification is essential. However, the community is forced to investigate and create novel threat detection approaches that are capable of detecting threats using anoma
APA, Harvard, Vancouver, ISO, and other styles
16

Richardson, Caleb, Mark Reith, and Wayne Henry. "Ensuring the Security of Space Systems from Eavesdropping Attacks." International Conference on Cyber Warfare and Security 17, no. 1 (2022): 522–26. http://dx.doi.org/10.34190/iccws.17.1.65.

Full text
Abstract:
In a day and age where satellite communications are more important than ever to ensure global communication, establish international military power, and support our everyday way of life, satellite security must be at the forefront of innovation. However, eavesdropping attacks pose a serious threat to satellite communication systems that have not been adequately addressed. An eavesdropping attack threatens to put sensitive data in the wrong hands or even jeopardize critical missions. Research is needed to explore why defense against eavesdropping attacks is crucial, particularly for satellite s
APA, Harvard, Vancouver, ISO, and other styles
17

Rizki, Aththaariq, and Fauzia Gustarina Cempaka Timur. "SYNERGY OF MULTI-STAKEHOLDERS IN DEFENDING INDONESIA FROM CYBER THREATS." Journal of Social Political Sciences 2, no. 4 (2021): 342–54. http://dx.doi.org/10.52166/jsps.v2i4.80.

Full text
Abstract:
This paper argues that currently the threat of cyber-attacks has become a real threat that has the potential to develop in Indonesia. With the presence of these cyber-attacks, the government must take advantage of the synergy between state multi-stake holders to jointly face cyber threats that come to attack Indonesia. The purpose of this research is to answer the existing problem formulations, namely first to find out which state multi-stake holders are in synergy in defending cyber-attacks in Indonesia; and to analyze how the synergy of state multi-stake holders in dealing with cyber-attacks
APA, Harvard, Vancouver, ISO, and other styles
18

Murkute, Abhinav. "Smart-shield: Dual Phase ML Defense for IOT Botnet Threats." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem49808.

Full text
Abstract:
I.ABSTRACT Botnet attacks are one of the most prevalent and harmful threats in the Internet of Things (IoT) ecosystem. These attacks typically begin with a reconnaissance or scanning phase and eventually lead to large-scale Distributed Denial of Service (DDoS) assaults. Current detection methods often focus on identifying botnet activity only after IoT devices have already been compromised and are actively participating in DDoS attacks. Additionally, many of these techniques are restricted to specific datasets, which limits their effectiveness across different environments due to variations in
APA, Harvard, Vancouver, ISO, and other styles
19

Yeboah-Ofori, Abel, and Shareeful Islam. "Cyber Security Threat Modeling for Supply Chain Organizational Environments." Future Internet 11, no. 3 (2019): 63. http://dx.doi.org/10.3390/fi11030063.

Full text
Abstract:
Cyber security in a supply chain (SC) provides an organization the secure network facilities to meet its overall business objectives. The integration of technologies has improved business processes, increased production speed, and reduced distribution costs. However, the increased interdependencies among various supply chain stakeholders have brought many challenges including lack of third party audit mechanisms and cascading cyber threats. This has led to attacks such as the manipulation of the design specifications, alterations, and manipulation during distribution. The aim of this paper is
APA, Harvard, Vancouver, ISO, and other styles
20

Avdan, Nazli, and Clayton Webb. "Not in My Back Yard: Public Perceptions and Terrorism." Political Research Quarterly 72, no. 1 (2018): 90–103. http://dx.doi.org/10.1177/1065912918776118.

Full text
Abstract:
Why does the public care more about some terrorist attacks than others? In recent years, there has been a wave of terrorist attacks carried out by similar terrorist organizations, but these attacks have produced disparate public responses. Existing research shows that terrorist attacks are more traumatic for people who live near terrorist targets, but this research cannot explain differences in public attitudes about attacks occurring in other countries. We argue that threat perceptions are shaped by the physical and personal proximity of terrorist attacks. The identities of the victims are ra
APA, Harvard, Vancouver, ISO, and other styles
21

Adem Şimşek, Adem Şimşek. "DETECTION OF ADVANCED PERSISTENT THREATS USING SIEM RULESETS." PIRETC-Proceeding of The International Research Education & Training Centre 28, no. 07 (2023): 25–31. http://dx.doi.org/10.36962/piretc28072023-25.

Full text
Abstract:
Cyber-attacks move towards a sophisticated, destructive, and persistent position, as in the case of Stuxnet, Dark Hotel, Poseidon, and Carbanak. These attacks are called Advanced Persistent Threats (APT) in which an intruder establishes an undetected presence in a network in order to steal sensitive data over a prolonged period of time. In today's digitalized life, these attacks threaten the main critical life areas. This threat is followed by critical infrastructures, finance, energy, and aviation agencies. One of the biggest APT attacks was Stuxnet which targeted software on computers contro
APA, Harvard, Vancouver, ISO, and other styles
22

Boulifa, Roua, Giorgio Di Natale, and Paolo Maistri. "Countermeasures Against Fault Injection Attacks in Processors: A Review." Information 16, no. 4 (2025): 293. https://doi.org/10.3390/info16040293.

Full text
Abstract:
Physical attacks pose a significant threat to the security of embedded processors, which have become an integral part of our daily lives. Processors can be vulnerable to fault injection attacks that threaten their normal and secure behavior. Such attacks can lead to serious malfunctions in applications, compromising their security and correct behavior. Therefore, it is crucial for designers and manufacturers to consider these threats while developing embedded processors. These attacks may require only a moderate level of knowledge to execute and can compromise the normal behavior of the target
APA, Harvard, Vancouver, ISO, and other styles
23

Jayaraj, Irrai Anbu, Bharanidharan Shanmugam, Sami Azam, and Ganthan Narayana Samy. "A Systematic Review of Radio Frequency Threats in IoMT." Journal of Sensor and Actuator Networks 11, no. 4 (2022): 62. http://dx.doi.org/10.3390/jsan11040062.

Full text
Abstract:
In evolving technology, attacks on medical devices are optimized due to the driving force of AI, computer vision, mixed reality, and the internet of things (IoT). Optimizing cybersecurity on the internet of medical things (IoMT) and building cyber resiliency against crime-as-a-service (CaaS) in the healthcare ecosystem are challenging due to various attacks, including spectrum-level threats at the physical layer. Therefore, we conducted a systematic literature review to identify the research gaps and propose potential solutions to spectrum threats on IoMT devices. The purpose of this study is
APA, Harvard, Vancouver, ISO, and other styles
24

Bhardwaj, Akashdeep, Keshav Kaushik, Abdullah Alomari, Amjad Alsirhani, Mohammed Mujib Alshahrani, and Salil Bharany. "BTH: Behavior-Based Structured Threat Hunting Framework to Analyze and Detect Advanced Adversaries." Electronics 11, no. 19 (2022): 2992. http://dx.doi.org/10.3390/electronics11192992.

Full text
Abstract:
Organizations of every size and industry are facing a new normal. Adversaries have become more sophisticated and persistent than ever before. Every network is facing never-ending onslaughts. Yet many organizations continue to rely on signature-based reactive threat detection and mitigation solutions as the primary line of defense against new-age, cutting-edge attacks. Even conventional attacks can bypass such security solutions. This means legacy protection solutions leave the organization’s data vulnerable to damage, destruction, and theft. Adversarial attacks are like ocean waves: they are v
APA, Harvard, Vancouver, ISO, and other styles
25

Lallie, Harjinder Singh, Andrew Thompson, Elzbieta Titis, and Paul Stephens. "Analysing Cyber Attacks and Cyber Security Vulnerabilities in the University Sector." Computers 14, no. 2 (2025): 49. https://doi.org/10.3390/computers14020049.

Full text
Abstract:
Universities hold and process vast amounts of financial, user, and research data, which makes them prime targets for cybercriminals. In addition to the usual external threat actors, universities face a unique insider threat from students, who—alongside staff—may lack adequate cyber security training despite having access to various sensitive systems. This paper provides a focused assessment of the current cyber security threats facing UK universities, based on a comprehensive review of available information. A chronological timeline of notable cyber attacks against universities is produced, wi
APA, Harvard, Vancouver, ISO, and other styles
26

Aththaariq Rizki. "UTILIZATION OF THE SEMESTA DEFENSE CONCEPT IN FACING SIBER ATTACKS DURING THE COVID-19 PANDEMIC IN INDONESIA." Edukasi IPS 5, no. 2 (2021): 18–26. http://dx.doi.org/10.21009/eips.005.02.03.

Full text
Abstract:
This study argues that currently the threat of cyber attacks has become a real threat that has the potential to grow during the Covid-19 pandemic. The concept of a universal defense system can be used as strategy to deal with cyber threats. This research using a qualitative method with a literature review approach that focuses on the threat of cyber attacks in Indonesia during the Covid-19 pandemic. The purpose of this study is to find out how the threat of cyber attacks in Indonesia during the Covid-19 pandemic is, and how the concept of a universal defense system can handle it. The theory us
APA, Harvard, Vancouver, ISO, and other styles
27

Taylor, Sean Joe, Farhan Ahmad, Hoang Nga Nguyen, and Siraj Ahmed Shaikh. "Vehicular Platoon Communication: Architecture, Security Threats and Open Challenges." Sensors 23, no. 1 (2022): 134. http://dx.doi.org/10.3390/s23010134.

Full text
Abstract:
The emerging technology that is vehicular platooning is an exciting technology. It promises to save space on congested roadways, improve safety and utilise less fuel for transporting goods, reducing greenhouse gas emissions. The technology has already been shown to be vulnerable to attack and exploitation by attackers. Attackers have several attack surfaces available for exploitation to achieve their goals (either personal or financial). The goal of this paper and its contribution to the area of research is to present the attacks and defence mechanisms for vehicular platoons and put risks of e
APA, Harvard, Vancouver, ISO, and other styles
28

Preuveneers, Davy, and Wouter Joosen. "Sharing Machine Learning Models as Indicators of Compromise for Cyber Threat Intelligence." Journal of Cybersecurity and Privacy 1, no. 1 (2021): 140–63. http://dx.doi.org/10.3390/jcp1010008.

Full text
Abstract:
Cyber threat intelligence (CTI) sharing is the collaborative effort of sharing information about cyber attacks to help organizations gain a better understanding of threats and proactively defend their systems and networks from cyber attacks. The challenge that we address is the fact that traditional indicators of compromise (IoC) may not always capture the breath or essence of a cyber security threat or attack campaign, possibly leading to false alert fatigue and missed detections with security analysts. To tackle this concern, we designed and evaluated a CTI solution that complements the attr
APA, Harvard, Vancouver, ISO, and other styles
29

Khan, Mohammed Mustafa. "Planning and Preparation of Cybersecurity." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 10 (2024): 1–3. http://dx.doi.org/10.55041/ijsrem25870.

Full text
Abstract:
In today's digital environment characterized by fast-evolving adversaries, expanded attack surfaces, and complex IT environments, having a formidable plan and being prepared could create a world of difference when faced with a potential cyber-attack. Cyber threats are growing risks to everyone and any institution. Cybercriminals target individuals and companies of all sizes. Today's attacks are agile and sophisticated. Ransom demands are elevating and advancing rapidly while attackers drill down their focus to specific victims like critical infrastructure businesses, which can spend millions o
APA, Harvard, Vancouver, ISO, and other styles
30

Akuffo-Badoo, Erastus B. "Understanding Advanced Persistent Threats." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 15–22. http://dx.doi.org/10.22624/aims/crp-bk3-p3.

Full text
Abstract:
Advanced Persistent Threats (APTs) are a new type of threat that has piqued the interest of experts, particularly in the industrial security industry. APTs are cyber-attacks carried out by skilled and well-resourced adversaries who target specific information in high-profile organizations and governments, usually as part of a multi-step operation. The academic community has largely ignored the specifics of these threats, and as a result, an objective solution to the APT problem is absent. In terms of cybercrime activity, Africa has been one of the fastest rising regions. The continent is also
APA, Harvard, Vancouver, ISO, and other styles
31

WITKOWSKI, Marek, and Anna WOJACZEK. "CYBER ATTACKS AND THREATS." Journal of Science of the Gen. Tadeusz Kosciuszko Military Academy of Land Forces 184, no. 2 (2017): 184–94. http://dx.doi.org/10.5604/01.3001.0010.4908.

Full text
Abstract:
The article presents current threats and examples of malware which can be used to disrupt the infrastructure. Next, a classification of current threats and attacks which occur in cyberspace is proposed. Finally, the publication also presents examples of attacks which disrupted the smooth functioning of networks and systems.
APA, Harvard, Vancouver, ISO, and other styles
32

Winnie Owoko. "Survey on evolving threats in TCP/IP header attacks: Emerging trends and future directions." World Journal of Advanced Engineering Technology and Sciences 11, no. 2 (2024): 454–75. http://dx.doi.org/10.30574/wjaets.2024.11.2.0127.

Full text
Abstract:
The TCP/IP protocol suite, a cornerstone of modern networking, faces escalating threats from evolving attack vectors targeting its headers. This survey explores emerging trends in TCP/IP header attacks, assessing their potential impact and outlining future directions for defense strategies. By scrutinizing recent research and real-world incidents, the paper aims to offer insights into the evolving threat landscape and provide recommendations for enhancing network security. Key areas of investigation include the historical evolution of TCP/IP header vulnerabilities, the adaptation of attackers'
APA, Harvard, Vancouver, ISO, and other styles
33

Shubham, Shrey, Dr Aashima Mehta, and Ms Vimmi Malhotra. "Exploring Security Strategies: Safeguarding Networks From Cyber Attacks With Advanced Cyber Security Techniques." International Journal of Environmental Sciences 11, no. 9s (2025): 1151–59. https://doi.org/10.64252/zfh2tk92.

Full text
Abstract:
The growing sophistication and frequency of cyber-attacks threaten today's networks significantly. This paper discusses sophisticated cyber security methods that are intended to protect networks from such emerging threats. It investigates a variety of security measures such as intrusion detection and prevention systems, artificial intelligence-based threat analysis, sophisticated encryption techniques, and zero-trust security models. Through the examination of the effectiveness of these methods, this study is intended to gain insights into designing resilient and dynamic security mechanisms th
APA, Harvard, Vancouver, ISO, and other styles
34

Barczak, Michał. "Cyber Threats of Machine Learning." Studia Informatica. System and information technology 31, no. 2 (2025): 35–48. https://doi.org/10.34739/si.2024.31.03.

Full text
Abstract:
This paper offers a detailed and comprehensive analysis of the various cyber threats that target machine learning models and applications. It begins by characterizing basic classifiers and exploring the objectives of intentional attacks on typical classifiers, providing a foundational understanding of the threat landscape. The paper then thoroughly examines the vulnerabilities that machine learning systems face, alongside the methods for detecting, countering, and responding to these cyber threats. Special attention is given to specific types of threats, including attacks on machine learning m
APA, Harvard, Vancouver, ISO, and other styles
35

Kadhim, Vinas Khalid. "TECHNIQUES TO PROTECT AGAINST CYBER ATTACKS." American Journal of Engineering and Technology 6, no. 7 (2024): 81–93. http://dx.doi.org/10.37547/tajet/volume06issue07-09.

Full text
Abstract:
Strong cybersecurity measures are required in this digital era due to the high risk of cyber assaults on people, businesses, and governments. Protecting yourself from cyber threats is the focus of this study, which delves into preventative and reactive measures. To address security weaknesses proactively, it is recommended that advanced encryption technologies and multi-factor authentication (MFA) be implemented and frequent security audits conducted. Implementing intrusion detection and prevention systems (IDPS), real-time monitoring, and quick incident response protocols are all components o
APA, Harvard, Vancouver, ISO, and other styles
36

Aprilia Tobing, Elsa Kristi, Rara Eka Septya, and Yustian Servanda. "Comparative Analysis of Network Security: Firewall, IDS, and AI-Based Defense Against DDoS Attacks." Journal of Artificial Intelligence and Engineering Applications (JAIEA) 4, no. 3 (2025): 1818–22. https://doi.org/10.59934/jaiea.v4i3.1026.

Full text
Abstract:
Distributed Denial of Service (DDoS) attacks have become one of the most significant threats in today’s network security landscape. By overwhelming a network with excessive traffic, these attacks can disrupt service availability and render digital systems inaccessible. Various defense mechanisms have been developed to counter this threat, including firewalls for initial traffic filtering, Intrusion Detection Systems (IDS) for real-time anomaly detection, and Artificial Intelligence (AI)-based systems that can adaptively recognize new attack patterns. This study aims to analyze and compare the
APA, Harvard, Vancouver, ISO, and other styles
37

GUEDES, ELLOÁ B., F. M. DE ASSIS, and BERNARDO LULA. "Quantum attacks on pseudorandom generators." Mathematical Structures in Computer Science 23, no. 3 (2012): 608–34. http://dx.doi.org/10.1017/s0960129512000825.

Full text
Abstract:
There are advantages in the use of quantum computing in the elaboration of attacks on certain pseudorandom generators when compared with analogous attacks using classical computing. This paper presents a polynomial time quantum attack on the Blum–Micali generator, which is considered secure against threats from classical computers. The proposed attack uses a Grover inspired procedure together with the quantum discrete logarithm, and is able to recover previous and future outputs of the generator under attack, thereby completely compromising its unpredictability. The attack can also be adapted
APA, Harvard, Vancouver, ISO, and other styles
38

Kumar, R. Dhileep. "ML Based Detection & Classification of High- and Low-Rate DDoS Attacks." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 02 (2025): 1–9. https://doi.org/10.55041/ijsrem41808.

Full text
Abstract:
The Machine Learning-Based Detection and Classification of High-Rate (HR) and Low-Rate (LR) DDoS Attacks system is designed to strengthen network security by identifying and categorizing different types of attack traffic. This intelligent detection framework leverages machine learning techniques to analyze network behaviour and distinguish between legitimate and malicious requests. The system utilizes the XGBoost classifier to accurately classify HR attacks, which generate overwhelming traffic surges causing immediate disruptions, and LR attacks, which operate subtly to evade traditional detec
APA, Harvard, Vancouver, ISO, and other styles
39

Tkachov, Andrii, Roman Korolov, Irada Rahimova, Iryna Aksonova, and Yelyzaveta Sevriukova. "CYBERSECURITY CHALLENGES AND SOLUTIONS FOR CRITICAL INFRASTRUCTURE PROTECTION." Ukrainian Scientific Journal of Information Security 30, no. 1 (2024): 58–66. http://dx.doi.org/10.18372/2225-5036.30.18604.

Full text
Abstract:
Critical infrastructure can be vulnerable to attack from natural disasters or malicious actors such as hackers or terrorists. If these threats are not addressed quickly, they can lead to significant disruption in service delivery or even complete shutdowns which could have devastating consequences for those relying on them for their day-to-day activities. Therefore, it is important that governments take steps towards protecting critical infrastructure from potential threats by implementing comprehensive security measures both online and offline. Based on a comprehensive analysis of current iss
APA, Harvard, Vancouver, ISO, and other styles
40

Farrel, Farhan Ibnu Farrel, Is Mardianto, S.Si, M.Kom, and Ir. Adrian Sjamsul Qamar, MTI. "IMPLEMENTATION OF SECURITY INFORMATION & EVENT MANAGEMENT (SIEM) WAZUH WITH ACTIVE RESPONSE AND TELEGRAM NOTIFICATION FOR MITIGATING BRUTE FORCE ATTACKS ON THE GT-I2TI USAKTI INFORMATION SYSTEM." Intelmatics 4, no. 1 (2024): 1–7. http://dx.doi.org/10.25105/itm.v4i1.18529.

Full text
Abstract:
In an era of widespread information system usage across various sectors, digital threats to organizations have become increasingly significant. These threats have the potential to disrupt operations and result in substantial financial losses. One enduring threat is brute force attacks, which exploit human tendencies to use easily remembered passwords. By utilizing The Security Lifecycle Methodology, this research aims to identify an efficient and cost-effective solution to enhance information system security and continuously evaluate the implemented solution rather than stop right after the po
APA, Harvard, Vancouver, ISO, and other styles
41

Sufi, Fahim. "A New Time Series Dataset for Cyber-Threat Correlation, Regression and Neural-Network-Based Forecasting." Information 15, no. 4 (2024): 199. http://dx.doi.org/10.3390/info15040199.

Full text
Abstract:
In the face of escalating cyber threats that have contributed significantly to global economic losses, this study presents a comprehensive dataset capturing the multifaceted nature of cyber-attacks across 225 countries over a 14-month period from October 2022 to December 2023. The dataset, comprising 77,623 rows and 18 fields, provides a detailed chronology of cyber-attacks, categorized into eight critical dimensions: spam, ransomware, local infection, exploit, malicious mail, network attack, on-demand scan, and web threat. The dataset also includes ranking data, offering a comparative view of
APA, Harvard, Vancouver, ISO, and other styles
42

A. K. Bagdat and Z. M. Alimzhanova. "INFORMATION SECURITY THREATS FOR INTEGRATION SYSTEMS." Bulletin of Toraighyrov University. Physics & Mathematics series, no. 4.2024 (December 30, 2024): 20–29. https://doi.org/10.48081/dfqb8925.

Full text
Abstract:
This article considers threats to integration systems, as well as methods of prevention. Threat modeling involves identifying potential threats to a system, assessing the likelihood and impact of each threat, and developing strategies to prevent or mitigate those threats. For integration systems, there are many potential information security threats, including unauthorized access, malware, insider threats, DoS attacks, SQL injection, and data leakage. To ensure the security and integrity of enterprise integration systems, it is crucial for organizations to understand these threats and implemen
APA, Harvard, Vancouver, ISO, and other styles
43

Lysenko, Serhii. "MODERN INFORMATION SECURITY ANALYSIS: INTEGRATION OF BEST PRACTICES AND TECHNOLOGIES INTO ADMINISTRATIVE AND LEGAL MEASURES." International Humanitarian Journal – Sophia Prima: dialogue of eternal recurrence 2, no. 1(3) (2020): 31–38. http://dx.doi.org/10.34170/2707-370x-2020-31-38.

Full text
Abstract:
The article is devoted to modern approaches to the analysis of information security and the search for the most effective practices and technologies for countering threats using administrative and legal measures. The article proposes an information security concept based on several advanced administrative and legal measures, which includes an examination of a number of threat response cycles and with a direct attack on the protected object. Given the high dynamics of modern information processes and the accompanying information threats, it is necessary to have such a complex of measures to cou
APA, Harvard, Vancouver, ISO, and other styles
44

Dixit, Ms Keerti. "Attack Taxonomy for Cyber-Physical System." International Journal for Research in Applied Science and Engineering Technology 10, no. 1 (2022): 194–200. http://dx.doi.org/10.22214/ijraset.2022.39734.

Full text
Abstract:
Abstract: Cyber-physical systems are the systems that combine the physical world with the world of information processing. CPS involves interaction between heterogeneous components that include electronic chips, software systems, sensors and actuators. It makes the CPS vulnerable to attacks. How to deal with the attacks in CPSs has become a research hotspot. In this paper we have study the Architecture of CPS and various security threats at each layer of the archicture of CPS. We have also developed attack taxonomy for CPS. Keywords: Cyber Physical System, Threat, Attack
APA, Harvard, Vancouver, ISO, and other styles
45

Laila, Bubaker, Yousef Aisha, and Algariani Walid. "A Systematic Mapping Study on Web services Security Threats, Vulnerabilities, and Countermeasures." AlQalam Journal of Medical and Applied Sciences 4, no. 1 (2021): 91–100. https://doi.org/10.5281/zenodo.4460572.

Full text
Abstract:
Web Services (WS) Technology during the past few years for heterogeneous systems integration, has become the reference architecture for those systems. Since it is extremely important nowadays for companies to make applications communicate over the internet, they are vulnerable to attacks in multiple forms. These attacks include SQL injection, XML injections, denial of service, XSS attacks, XPath, and spoofing, which makes implementing web service security critical to secure valuable data stored on computers and servers during data exchange operations over a network. Although web services provi
APA, Harvard, Vancouver, ISO, and other styles
46

Darshini, S., A. Thrisha, M. Navya Sree, G. Varshitha, and G. Thippanna. "Dark Sides of Cyber Attacks: Protection from the Assorted Cyber Attacks." Journal of Cyber Security, Privacy Issues and Challenges 4, no. 1 (2025): 14–21. https://doi.org/10.46610/jcspic.2025.v04i01.002.

Full text
Abstract:
Cyber attacks have increased due to the quick development of digital communications, revealing a dark side where bad actors take advantage of system flaws to do serious damage. These assaults, which target people, businesses, and even governments, can take many different forms, such as ransomware, phishing, data breaches, and Advanced Persistent Threats (APTs). These attacks are becoming more complicated and frequent, which puts sensitive data, financial assets, and national security in danger. This paper investigates the diverse nature of cyber attacks, highlighting the motivations, methods,
APA, Harvard, Vancouver, ISO, and other styles
47

Le, Ngoc Thuy, and Doan B. Hoang. "A Threat Computation Model using a Markov Chain and Common Vulnerability Scoring System and its Application to Cloud Security." Journal of Telecommunications and the Digital Economy 7, no. 1 (2019): 37–56. http://dx.doi.org/10.18080/jtde.v7n1.181.

Full text
Abstract:
Securing cyber infrastructures has become critical because they are increasingly exposed to attackers while accommodating a huge number of IoT devices and supporting numerous sophisticated emerging applications. Security metrics are essential for assessing the security risks and making effective decisions concerning system security. Many security metrics rely on mathematical models, but are mainly based on empirical data, qualitative methods, or compliance checking, and this renders the outcome far from satisfactory. Computing the probability of an attack, or more precisely a threat that mater
APA, Harvard, Vancouver, ISO, and other styles
48

Jaganathan, Venkatesh, Priyesh Cherurveettil, and Premapriya Muthu Sivashanmugam. "Using a Prediction Model to Manage Cyber Security Threats." Scientific World Journal 2015 (2015): 1–5. http://dx.doi.org/10.1155/2015/703713.

Full text
Abstract:
Cyber-attacks are an important issue faced by all organizations. Securing information systems is critical. Organizations should be able to understand the ecosystem and predict attacks. Predicting attacks quantitatively should be part of risk management. The cost impact due to worms, viruses, or other malicious software is significant. This paper proposes a mathematical model to predict the impact of an attack based on significant factors that influence cyber security. This model also considers the environmental information required. It is generalized and can be customized to the needs of the i
APA, Harvard, Vancouver, ISO, and other styles
49

K.M, Akhil, Rahul C.T, and Athira V.B. "Distributed Denial of Service (DDoS) Attacks and Defence Mechanism." International Journal of Computer Science and Mobile Computing 10, no. 3 (2021): 83–88. http://dx.doi.org/10.47760/ijcsmc.2021.v10i03.010.

Full text
Abstract:
Denial of Service (DoS) attacks is one of the major threats to Internet sites and one of the major security problems Internet faces today. The nature of threats caused by Distributed Denial of Service (DDoS) attacks on networks. With little or no warning, a DDoS attack could easily destroy its victim's communication and network resources in a short period of time. This paper outlines the problem of DDoS attacks and developing a classification of DDoS attacks and DDoS defense mechanisms. Important features of each attack and defense system category are described and advantages and disadvantages
APA, Harvard, Vancouver, ISO, and other styles
50

Aslan, Ömer, Semih Serkant Aktuğ, Merve Ozkan-Okay, Abdullah Asim Yilmaz, and Erdal Akin. "A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions." Electronics 12, no. 6 (2023): 1333. http://dx.doi.org/10.3390/electronics12061333.

Full text
Abstract:
Internet usage has grown exponentially, with individuals and companies performing multiple daily transactions in cyberspace rather than in the real world. The coronavirus (COVID-19) pandemic has accelerated this process. As a result of the widespread usage of the digital environment, traditional crimes have also shifted to the digital space. Emerging technologies such as cloud computing, the Internet of Things (IoT), social media, wireless communication, and cryptocurrencies are raising security concerns in cyberspace. Recently, cyber criminals have started to use cyber attacks as a service to
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!