Skip to main content

Recent Cyber Security Attacks and Their Mitigation Approaches – An Overview

  • Conference paper
  • First Online:
Applications and Techniques in Information Security (ATIS 2016)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 651))

Abstract

The advent of digital media, Internet, web and online social media has drawn the attention of relevant research community significantly and created many new research challenges on cyber security. People, organisations and governments around the world are losing a huge amount of money because of having cyber-attacks. For this reason, cyber security has become one of the most difficult and significant problems across the world. Currently, cyber security researchers of both industries and academic institutes are analysing existing cyber-attacks happening across the world and are developing different types of techniques to protect the systems against potential cyber-threats and attacks. This paper discusses the recent cyber security-attacks and the economic loss resulted from the growing cyber-attacks. This paper also analyses the increasing exploitation of a computer system, which has created more opportunities for the current cyber-crimes. Protective mechanisms and relevant laws are being implemented to reduce cyber- crimes around the world. Contemporary and important mitigation approaches for cyber-crimes have also been articulated in this paper.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Clough, J.: Principles of Cybercrime. Cambridge University Press, Cambridge (2015)

    Book  Google Scholar 

  2. Passeri, P.: Cyber Attacks StatisticsPaolo Passeri, May 2016. http://www.hackmageddon.com/category/security/cyber-attacks-statistics/. Accessed 07 October 2016

  3. Aviram, N., et al.: DROWN: Breaking TLS using SSLv2 (2016). https://www.lemarson.com/public/upload/ressource/filename/DROWN_SSL.pdf. Accessed 08 November 2016

  4. Al Fardan, N.J., Paterson, K.G.: Lucky thirteen: breaking the TLS and DTLS record protocols. In: 2013 IEEE Symposium on Security and Privacy (SP). IEEE (2013)

    Google Scholar 

  5. Bhargavan, K., Leurent, G.: Transcript collision attacks: breaking authentication in TLS, IKE, and SSH. In: NDSS, February 2016

    Google Scholar 

  6. Beattie, D.: The DROWN Attack Vulnerability and Changing Your Server Configuration (2016)

    Google Scholar 

  7. Dukhovni, V., Käsper, E.: An OpenSSL User’s Guide to DROWN, OpenSSL, Editor (2016)

    Google Scholar 

  8. GitHub. Fast and full-featured SSL scanner (2016). https://github.com/iSECPartners/sslyze?_sm_byp=iVVWSrMVJZLN4jMF. Accessed 08 November 2016

  9. Chen, P., Huygens, C., Desmet, L., Joosen, W.: Advanced or not? A comparative study of the use of anti-debugging and anti-VM techniques in generic and targeted malware. In: Hoepman, J.-H., Katzenbeisser, S. (eds.) SEC 2016. IFIP AICT, vol. 471, pp. 323–336. Springer, Heidelberg (2016). doi:10.1007/978-3-319-33630-5_22

    Chapter  Google Scholar 

  10. OWASP. Category: OWASP Top Ten Project (2016). https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project#tab=OWASP_Top_10_for_2013. Accessed 07 October 2016

  11. Sharma, P., Singh, A.: A review on detection and prevention techniques of denial of service attack in vanet. Int. J. Adv. Res. Comput. Sci. 6(5) (2015)

    Google Scholar 

  12. Keane, J.: DDoS attacks hit record numbers in Q2 2015 (2015). http://www.digitaltrends.com/computing/ddos-attacks-hit-record-numbers-in-q2-2015/. Accessed 07 October 2016

  13. Networks, A. DDoS attacks: Understanding the Threat (2013). http://www.slideshare.net/Arbor_Networks/ddos-attacks-understanding-the-threat. Accessed 07 October 2016

  14. Lab, K. Kaspersky DDoS Intelligence Report for Q1 2016 (2016). https://securelist.com/analysis/quarterly-malware-reports/74550/kaspersky-ddos-intelligence-report-for-q1-2016/. Accessed 07 October 2016

  15. Karp, P.: Census website back online after day of recriminations over 43-hour outage. The Guardian, Australia (2016)

    Google Scholar 

  16. Bond, M., et al.: Chip and Skim: cloning EMV cards with the pre-play attack. In: 2014 IEEE Symposium on Security and Privacy. IEEE (2014)

    Google Scholar 

  17. CSC. Breaking down the threat of cyber terrorism (2016). http://blogs.csc.com/2016/02/04/breaking-down-the-threat-of-cyber-terrorism/. Accessed 08 November 2016

  18. Zolkipli, M.F., Jantan, A.: An approach for malware behavior identification and classification. In: 2011 3rd International Conference on Computer Research and Development (ICCRD). IEEE (2011)

    Google Scholar 

  19. Goodin, D.: Massive US-planned cyberattack against Iran went well beyond Stuxnet (2016). http://arstechnica.com/tech-policy/2016/02/massive-us-planned-cyberattack-against-iran-went-well-beyond-stuxnet/. Accessed 08 November 2016

  20. Talbot, D.: Cyber-Espionage Nightmare (2015). https://www.technologyreview.com/s/538201/cyber-espionage-nightmare. Accessed 08 November 2016

  21. Ajayi, E.F.G.: The Impact of Cyber Crimes on Global Trade and Commerce. Available at SSRN (2016)

    Google Scholar 

  22. Milian, M.: Top Ten Hacking Countries (2016). http://www.bloomberg.com/slideshow/2013-04-23/top-ten-hacking-countries.html. Accessed 07 October 2016

  23. S, V. How to block DROWN attack Fix SSL vulnerability in Linux, Apache, Nginx, Exim and other servers (2016). https://bobcares.com/blog/how-to-fix-drown-attack-ssl-vulnerability/. Accessed 08 November 2016

  24. Shields, K.: Cybersecurity: recognizing the risk and protecting against attacks. NC Bank. Inst. 19, 345 (2015)

    MathSciNet  Google Scholar 

  25. Donaldson, S.E., et al.: Measuring a Cybersecurity Program. In: Enterprise Cybersecurity, pp. 213–229. Springer (2015)

    Google Scholar 

  26. Cavelty, M.D., Mauer, V.: Power and Security in the Information Age: Investigating the Role of the State in Cyberspace. Routledge, London (2016)

    Google Scholar 

  27. Wang, D., et al.: Preserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymity. Inf. Sci. 321, 162–178 (2015)

    Article  Google Scholar 

  28. Das, M.L.: Two-factor user authentication in wireless sensor networks. IEEE Trans. Wireless Commun. 8(3), 1086–1090 (2009)

    Article  Google Scholar 

  29. Jin, A.T.B., Ling, D.N.C., Goh, A.: Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recogn. 37(11), 2245–2255 (2004)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abdullahi Chowdhury .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Chowdhury, A. (2016). Recent Cyber Security Attacks and Their Mitigation Approaches – An Overview. In: Batten, L., Li, G. (eds) Applications and Techniques in Information Security. ATIS 2016. Communications in Computer and Information Science, vol 651. Springer, Singapore. https://doi.org/10.1007/978-981-10-2741-3_5

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-2741-3_5

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-2740-6

  • Online ISBN: 978-981-10-2741-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics