Beyond Everything: The Role and Importance of Cybersecurity in Smart Era
Keywords:Ethical Hacking, Cybersecurity, Intrusion Detection System, Cyber-Crime, Digital Forensics
In a world where everything is ruled by technology and software, it is very important that our personal and private files and details remain secure and undiscovered by other systems in the network. Today, the immediate way of sending any urgent information is through e-mails, WhatsApp etc., all of which is sent and travels through the network (public or private). A network is an interconnection of billions of computers, these computers are connected to each other. Though they cannot be accessed directly due to restrictions and different protocols and nature of different systems, but it is not impossible. There have been many major (serious) cyber-attacks in the past three decades. Even today situation is that developed counties are interested to do launch trade war or cyber war against their enemy nation except a physical war (without killing anyone, demolishing a nation financially). Note that many computer criminals are wanted till date. Now days, everything from money transaction, sending or sharing important/ confidential information and even in hospitals medical equipment like in an oxygen cylinder the pressure and speed of the devices are all monitored by machines that are operated on software. So, any unauthorized access into any software with criminal intention not only affects property but also tampers with health of people (or patient or citizen of a nation). So, to detect any kind of intrusion into a software or system, many researchers recommend to use Intrusion Detection Systems (IDS), but still unable to secure systems completely. Hence, this research article provides the essential information like importance of keeping user’s information private and secure, algorithms that can protect the system from intrusion, vulnerabilities in network and the major cyber-attacks in history (in previous decade) and how to prevent yourself from such kind of attacks and to be aware (with providing several rules, policies, digital forensics, threat hunting, etc.) in this smart era.
A. Gandomi & M.Haider, “Beyond the hype: Big data concepts, methods, and analytics”, International Journal of Information Management,35(2), 137–144, 2015, doi:10.1016/j.ijinfomgt.2014.10.007
P. Wang, L.Wu, R. Cunningham & C. C. Zou, “Honeypot detection in advanced botnet attacks”, International Journal of Information and Computer Security, Vol. 4, No. 30-52, 2010
C. Palmer, “Ethical hacking”, IBM Systems Journal, 40(3), 769–780, 2001 , doi:10.1147/sj.403.0769
K. Ashok , P.Shweta & A.Praveen , “The WannacryRansomeware, a Mega Cyber Attack And Their Consequences On The Modern India”, International Journal of Management Information Technology and Engineering, Vol. 6, Issue 4, 1-4, 2018.
N.B. Sukhai, “Hacking and cybercrime”, Proceedings of the 1st Annual Conference on Information Security Curriculum Development - InfoSecCD ’04. 2004. doi:10.1145/1059524.1059553
N. Jovanovic, C. Kruegel & E. Kirda, “Pixy: a static analysis tool for detecting Web application vulnerabilities. in Security and Privacy”, 2006 IEEE Symposium on , vol., no., pp.6 pp.-263, 21-24 May 2006 doi: 10.1109/SP.2006.29
J.M. Chen & C. L. Wu, “An automated vulnerability scanner for injection attack based on injection point”, Computer Symposium (ICS), 2010 International, pp.113-118, 16-18 Dec. 2010.doi: 10.1109/COMPSYM.2010.5685537
M.E.Ruse, & S.Basu “Detecting Cross-Site Scripting Vulnerability Using Concolic Testing. in Information Technology: New Generations (ITNG) ”, 2013 Tenth International Conference, pp.633-638, 15-17 April 2013 doi: 10.1109/ITNG.2013.97
M.K. Gupta, M.C. Govil & G. Singh, “Static analysis approaches to detect SQL injection and cross site scripting vulnerabilities in web applications: A survey”, Recent Advances and Innovations in Engineering (ICRAIE), vol., no., pp.1-5, 9-11 ,May 2014 , doi: 10.1109/ICRAIE.2014.6909173
Z.J.Wang, Y. Liu & Z.J.Wang, “E-mail filtration and classification based on variable weights of the Bayesian algorithm”, ApplMech Mater, 513–517:2111–2114, 2014.
W.C. Hsu, & T.Y. Yu , “E-mail spam filtering based on support vector machines with Taguchi method for parameter selection”, J ConvergInfTechnol, 5(8):78–88, 2010
G. Caruana G, M.Li & M. Qi , “A MapReduce based parallel SVM for large scale spam filtering”, In: IEEE 2011 eighth international conference on fuzzy systems and knowledge discovery (FSKD), 2011; pp 2659–2662
Z. Zheng, S. Xie, H. Dai, X. Chen & H.Wang, “An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends”, 2017 IEEE International Congress on Big Data (BigData Congress), 2017
A.K. Tyagi, G. Rekha, & N.Sreenath, “Beyond the Hype: Internet of Things Concepts, Security and Privacy Concerns”, In: S. Satapathy, K. Raju , K. Shyamala., D. Krishna, & M. Favorskaya. (eds) “Advances in Decision Sciences, Image Processing, Security and ComputerVision”, ICETE 2019.Learning and Analytics in Intelligent Systems, vol 3. Springer, Cham.
H.J. Liao, C.H. Richard, Y.C Lin & K.Y Tung, “ Intrusion detection system: A comprehensive review”, Journal of Network and Computer Applications, 36(1),16–24, 2013, doi:10.1016/j.jnca.2012.09.004
E.Hodo, X. Bellekens, A. Hamilton, P.L. Dubouilh, E.Iorkyase, C.Tachtatzis, & R.Atkinson, “Threat analysis of IoT networks using artificial neural network intrusion detection system”, 2016 International Symposium on Networks, Computers andCommunications(ISNCC),2016,doi:10.1109/isncc.2016.7746067
A.R. Sadeghi, C. Wachsmann, & M. Waidner, “Security and privacy challenges in industrial internet of things”, Proceedings of the 52nd Annual Design Automation Conference on - DAC ’15.2015. doi:10.1145/2744769.2747942
M. Shamila, K. Vinuthnaand T.K.Tyagi,” A Review on Several Critical Issues and Challenges in IoT based e-HealthcareSystem”.International Conference on Intelligent Computing and Control Systems [ICICCS 2019], IEEE, 2019
C.W.Ten, C.C. Liu, & G.Manimaran, “Vulnerability Assessment of Cybersecurity for SCADA Systems”, IEEE Transactions on Power Systems, 23(4), 1836–1846, 2008, doi:10.1109/tpwrs.2008.2002298
A. K. Tyagi, “Article: Cyber Physical Systems (CPSs) – Opportunities and Challenges for Improving Cybersecurity”, International Journal of Computer Applications 137(14):19-27, March 2016. Published by Foundation of Computer Science (FCS), NY, USA.
M.K. El-Najdawi &A.C. Stylianou, “ Expert support systems: integrating AI technologies”, Communications of the ACM, 36(12),55–59, 1993, doi:10.1145/163298.163306
F.Lau, S.H. Rubin, M.H. Smith,& L.Trajkovic, “Distributed denial of service attacks” , SMC 2000 Conference Proceedings. 2000 IEEE International Conference on Systems, Man and Cybernetics. doi:10.1109/icsmc.2000.886455
E.A.Lee, “Cyber Physical Systems: Design Challenges”, 2008 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC).2008. doi:10.1109/isorc.2008.25