Int J Performability Eng ›› 2024, Vol. 20 ›› Issue (11): 688-698.doi: 10.23940/ijpe.24.11.p5.688698
Previous Articles Next Articles
Rashmi Kushwah*
Submitted on
;
Revised on
;
Accepted on
Contact:
*E-mail address: rashmi.kushwah@mail.jiit.ac.in
Rashmi Kushwah. Navigating the Cybersecurity Landscape: Vulnerabilities, Mitigation Strategies and Future Outlooks [J]. Int J Performability Eng, 2024, 20(11): 688-698.
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
[1] Jullian O., Otero B., Rodriguez E., Gutierrez N., Antona H., and Canal R., 2023. Deep-learning based detection for cyber-attacks in IoT networks: A distributed attack detection framework. [2] Hasan M.K., Habib A.A., Shukur Z., Ibrahim F., Islam S., and Razzaque M.A., 2023. Review on cyber-physical and cyber-security system in smart grid: Standards, protocols, constraints, and recommendations. [3] Wang C., and Zhu H., 2022. Wrongdoing monitor: A graph-based behavioral anomaly detection in cyber security. [4] Syafitri W., Shukur Z., Asma’Mokhtar U., Sulaiman R., and Ibrahim M.A., 2022. Social engineering attacks prevention: A systematic literature review. [5] Liu F., Wen Y., Zhang D., Jiang X., Xing X., and Meng D., 2019. Log2vec: A heterogeneous graph embedding based approach for detecting cyber threats within enterprise. InProceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp. 1777-1794. [6] Li F., Shi Y., Shinde A., Ye J., and Song W., 2019. Enhanced cyber-physical security in internet of things through energy auditing. [7] Crespo-Martínez I.S., Campazas-Vega A., Guerrero-Higueras Á.M., Riego-DelCastillo V., Álvarez-Aparicio C., and Fernández-Llamas C., 2023. SQL injection attack detection in network flow data. [8] Hwang W.S., Shon J.G., and Park J.S., 2022. Web session hijacking defense technique using user information. [9] Prentosito A., Skoczen M., Kahrs L., and Bhunia S., 2022. Case Study on a Session Hijacking Attack: The 2021 CVS Health Data Breach. InInternational Conference on Mobile Web and Intelligent Information Systems, pp. 93-105. [10] Anthi E., Williams L., Javed A., and Burnap P., 2021. Hardening machine learning denial of service (DoS) defences against adversarial attacks in IoT smart home networks. [11] Chen D., Yan Q., Wu C., and Zhao J., 2021. Sql injection attack detection and prevention techniques using deep learning. In [12] Malviya V.K., Rai S., and Gupta A., 2021. Development of web browser prototype with embedded classification capability for mitigating Cross-Site Scripting attacks. [13] Mokbal F.M.M., Dan W., Xiaoxi W., Wenbin Z., and Lihua F., 2021. XGBXSS: an extreme gradient boosting detection framework for cross-site scripting attacks based on hybrid feature selection approach and parameters optimization. [14] Gazzan M., and Sheldon F.T., 2023. Opportunities for early detection and prediction of ransomware attacks against industrial control systems. [15] Zhang Y., Li M., Zhang X., He Y., and Li Z., 2022. Defeat magic with magic: a novel ransomware attack method to dynamically generate malicious payloads based on PLC control logic. [16] Navarrete Á., and Curty M., 2022. Improved finite-key security analysis of quantum key distribution against Trojan-horse attacks. [17] Shetty N.P., Muniyal B., Anand A., and Kumar S., 2022. An enhanced sybil guard to detect bots in online social networks.Journal of Cyber Security and Mobility, pp. 105-126. [18] Kedia M.K., and Das B., 2021. A Unique Approach for Detection and Removal of Key Loggers. InProceedings of International Conference on Computational Intelligence, Data Science and Cloud Computing: IEM-ICDC 2020, pp. 591-600. [19] Rath S., Zografopoulos I., and Konstantinou C., 2021. Stealthy rootkit attacks on cyber-physical microgrids: Poster. InProceedings of the Twelfth ACM International Conference on Future Energy Systems, pp. 294-295. [20] Cai T., Jia T., Adepu S., Li Y., and Yang Z., 2023. ADAM: an adaptive DDoS attack mitigation scheme in software-defined cyber-physical system. [21] Ali M.H., Jaber M.M., Abd S.K., Rehman A., Awan M.J., Damaševičius R., and Bahaj S.A., 2022. Threat analysis and distributed denial of service (DDoS) attack recognition in the internet of things (IoT). [22] Manesh M.R., and Kaabouch N., 2019. Cyber-attacks on unmanned aerial system networks: Detection, countermeasure, and future research directions. [23] Guo H., Pang Z.H., Sun J., and Li J., 2021. An output-coding-based detection scheme against replay attacks in cyber-physical systems. [24] Li D., Gebraeel N., and Paynabar K., 2020. Detection and differentiation of replay attack and equipment faults in SCADA systems. [25] Myint Oo M., Kamolphiwong S., Kamolphiwong T., and Vasupongayya S., 2019. Advanced support vector machine‐(ASVM‐) based detection for distributed denial of service (DDoS) attack on software defined networking (SDN). [26] Rajić B., Stanisavljević Ž., and Vuletić P., 2023. Early web application attack detection using network traffic analysis. [27] Erdogan E., Altunbas I., Kurt G.K., and Yanikomeroglu H., 2021. The secrecy comparison of RF and FSO eavesdropping attacks in mixed RF-FSO relay networks. [28] Alby M.F., Ruslan I.F., and Muharman M.L., 2022. Information security test on websites and social media using footprinting method. InProceedings of the 8th International Conference on Industrial and Business Engineering, pp. 521-525. [29] Basak S., and Gowda M., 2022. mmspy: Spying phone calls using mmwave radars. In2022 IEEE Symposium on Security and Privacy (SP), pp. 1211-1228. [30] Yu J., Lu L., Chen Y., Zhu Y., and Kong L., 2019. An indirect eavesdropping attack of keystrokes on touch screen through acoustic sensing. [31] Alshehri A., Granley J., and Yue C., 2020, March. Attacking and protecting tunneled traffic of smart home devices. InProceedings of the Tenth ACM Conference on Data and Application Security and Privacy, pp. 259-270. [32] Wlazlo P., Sahu A., Mao Z., Huang H., Goulart A., Davis K., and Zonouz S., 2021. Man‐in‐the‐middle attacks and defence in a power system cyber‐physical testbed. [33] Wu H., Meng X., Yang X., Li X., Wang P., He W., and Chen H., 2021. Ciphertext-only attack on optical cryptosystem with spatially incoherent illumination based deep-learning correlography. [34] Chen J., Chen L., and Zhou Y., 2020. Universal chosen-ciphertext attack for a family of image encryption schemes. [35] Qin Y., Wan Y., and Gong Q., 2020. Learning-based chosen-plaintext attack on diffractive-imaging-based encryption scheme. [36] Nandi M.,2020, May. Mind the composition: birthday bound attacks on EWCDMD and SoKAC21. InAnnual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 203-220. [37] Javed A.R., Beg M.O., Asim M., Baker T., and Al-Bayatti A.H., 2023. Alphalogger: Detecting motion-based side-channel attack using smartphone keystrokes.Journal of Ambient Intelligence and Humanized Computing, pp. 1-14. |
[1] | Vikas Verma, Arun Malik, and Isha Batra. Analyzing and Classifying Malware Types on Windows Platform using an Ensemble Machine Learning Approach [J]. Int J Performability Eng, 2024, 20(5): 312-318. |
[2] | Rahul Bhandari, Sanjay Singla, Purushottam Sharma, and Sandeep Singh Kang. AINIS: An Intelligent Network Intrusion System [J]. Int J Performability Eng, 2024, 20(1): 24-31. |
[3] | Darius Muyizere, Lawrence K. Letting, and Bernard B. Munyazikwiye. Effect on Transient Stability and Analyses Resulting from a Cyber-Attack on Frequency Relay Device [J]. Int J Performability Eng, 2023, 19(1): 20-32. |
[4] | Zhong Li and Jia Wang. Security Storage of Sensitive Information in Cloud Computing Data Center [J]. Int J Performability Eng, 2019, 15(3): 1023-1032. |
[5] | Wenpeng Li, Sance Gao, Renjie Ding, Yanjun Hao, and Cheng Yang. Fault Detection Method for Energy Routing Nodes of Smart Grids Oriented to Electricity Information Security [J]. Int J Performability Eng, 2019, 15(12): 3304-3311. |
[6] | Rong Li, Bing Tian, Yan Li, and Yansheng Qu. Information Security Evaluation based on Artificial Neural Network [J]. Int J Performability Eng, 2019, 15(11): 2908-2915. |
|