Cyber attacks, countermeasures, and protection schemes—A state of the art survey

Antesar M Shabut, K T Lwin, Alamgir Hossain

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearch

Abstract

Thousands of cyber-attacks (fraudulent online activities to acquire users' sensitive information via email, during online transactions, live video streaming, online gaming and browsing) are launched every day against Internet users across the world. To prevent these attacks, researchers have responded with a number of protection systems. Currently, the methods which cyber-attackers use to conduct attacks is associated with exploiting humans. Such attacks are recorded more frequently than before, and they are more challenging to control. Traditional security countermeasures are unable to prevent breaches targeting the human element. This paper describes the state of the art of cyber security attacks, countermeasures, and protection tools related to everyday online activities. It provides a useful cyber-attack taxonomy and classification which helps to involve in a protection process to identify attacks and measures for cyber security. Existing protection schemes that target the cyber threats and risks are evaluated against three of our criteria for an effective measure: resilience to cyber-attacks' countermeasures; real-time support and needs-based action; and training and educational materials to increase users' awareness of cybercrimes. Potential features of smart solutions to cybercrime are also identified.
Original languageEnglish
Title of host publication 2016 10th International Conference on Software, Knowledge, Information Management & Applications
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)978-1-5090-3297-6
DOIs
Publication statusPublished - 17 Dec 2016
Event10th International Conference on Software, Knowledge, Information Management & Applications - Chengdu, China
Duration: 15 Dec 201617 Dec 2016

Conference

Conference10th International Conference on Software, Knowledge, Information Management & Applications
Abbreviated titleSKIMA
CountryChina
CityChengdu
Period15/12/1617/12/16

Fingerprint

Video streaming
Electronic mail
Taxonomies
Internet

Cite this

Shabut, A. M., Lwin, K. T., & Hossain, A. (2016). Cyber attacks, countermeasures, and protection schemes—A state of the art survey. In 2016 10th International Conference on Software, Knowledge, Information Management & Applications Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/SKIMA.2016.7916194
Shabut, Antesar M ; Lwin, K T ; Hossain, Alamgir. / Cyber attacks, countermeasures, and protection schemes—A state of the art survey. 2016 10th International Conference on Software, Knowledge, Information Management & Applications. Institute of Electrical and Electronics Engineers Inc., 2016.
@inproceedings{9fb0ad83b92d4dd387c1d5aed6bf25a1,
title = "Cyber attacks, countermeasures, and protection schemes—A state of the art survey",
abstract = "Thousands of cyber-attacks (fraudulent online activities to acquire users' sensitive information via email, during online transactions, live video streaming, online gaming and browsing) are launched every day against Internet users across the world. To prevent these attacks, researchers have responded with a number of protection systems. Currently, the methods which cyber-attackers use to conduct attacks is associated with exploiting humans. Such attacks are recorded more frequently than before, and they are more challenging to control. Traditional security countermeasures are unable to prevent breaches targeting the human element. This paper describes the state of the art of cyber security attacks, countermeasures, and protection tools related to everyday online activities. It provides a useful cyber-attack taxonomy and classification which helps to involve in a protection process to identify attacks and measures for cyber security. Existing protection schemes that target the cyber threats and risks are evaluated against three of our criteria for an effective measure: resilience to cyber-attacks' countermeasures; real-time support and needs-based action; and training and educational materials to increase users' awareness of cybercrimes. Potential features of smart solutions to cybercrime are also identified.",
author = "Shabut, {Antesar M} and Lwin, {K T} and Alamgir Hossain",
year = "2016",
month = "12",
day = "17",
doi = "10.1109/SKIMA.2016.7916194",
language = "English",
booktitle = "2016 10th International Conference on Software, Knowledge, Information Management & Applications",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
address = "United States",

}

Shabut, AM, Lwin, KT & Hossain, A 2016, Cyber attacks, countermeasures, and protection schemes—A state of the art survey. in 2016 10th International Conference on Software, Knowledge, Information Management & Applications. Institute of Electrical and Electronics Engineers Inc., 10th International Conference on Software, Knowledge, Information Management & Applications, Chengdu, China, 15/12/16. https://doi.org/10.1109/SKIMA.2016.7916194

Cyber attacks, countermeasures, and protection schemes—A state of the art survey. / Shabut, Antesar M ; Lwin, K T; Hossain, Alamgir.

2016 10th International Conference on Software, Knowledge, Information Management & Applications. Institute of Electrical and Electronics Engineers Inc., 2016.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearch

TY - GEN

T1 - Cyber attacks, countermeasures, and protection schemes—A state of the art survey

AU - Shabut, Antesar M

AU - Lwin, K T

AU - Hossain, Alamgir

PY - 2016/12/17

Y1 - 2016/12/17

N2 - Thousands of cyber-attacks (fraudulent online activities to acquire users' sensitive information via email, during online transactions, live video streaming, online gaming and browsing) are launched every day against Internet users across the world. To prevent these attacks, researchers have responded with a number of protection systems. Currently, the methods which cyber-attackers use to conduct attacks is associated with exploiting humans. Such attacks are recorded more frequently than before, and they are more challenging to control. Traditional security countermeasures are unable to prevent breaches targeting the human element. This paper describes the state of the art of cyber security attacks, countermeasures, and protection tools related to everyday online activities. It provides a useful cyber-attack taxonomy and classification which helps to involve in a protection process to identify attacks and measures for cyber security. Existing protection schemes that target the cyber threats and risks are evaluated against three of our criteria for an effective measure: resilience to cyber-attacks' countermeasures; real-time support and needs-based action; and training and educational materials to increase users' awareness of cybercrimes. Potential features of smart solutions to cybercrime are also identified.

AB - Thousands of cyber-attacks (fraudulent online activities to acquire users' sensitive information via email, during online transactions, live video streaming, online gaming and browsing) are launched every day against Internet users across the world. To prevent these attacks, researchers have responded with a number of protection systems. Currently, the methods which cyber-attackers use to conduct attacks is associated with exploiting humans. Such attacks are recorded more frequently than before, and they are more challenging to control. Traditional security countermeasures are unable to prevent breaches targeting the human element. This paper describes the state of the art of cyber security attacks, countermeasures, and protection tools related to everyday online activities. It provides a useful cyber-attack taxonomy and classification which helps to involve in a protection process to identify attacks and measures for cyber security. Existing protection schemes that target the cyber threats and risks are evaluated against three of our criteria for an effective measure: resilience to cyber-attacks' countermeasures; real-time support and needs-based action; and training and educational materials to increase users' awareness of cybercrimes. Potential features of smart solutions to cybercrime are also identified.

U2 - 10.1109/SKIMA.2016.7916194

DO - 10.1109/SKIMA.2016.7916194

M3 - Conference contribution

BT - 2016 10th International Conference on Software, Knowledge, Information Management & Applications

PB - Institute of Electrical and Electronics Engineers Inc.

ER -

Shabut AM, Lwin KT, Hossain A. Cyber attacks, countermeasures, and protection schemes—A state of the art survey. In 2016 10th International Conference on Software, Knowledge, Information Management & Applications. Institute of Electrical and Electronics Engineers Inc. 2016 https://doi.org/10.1109/SKIMA.2016.7916194