Affiliation:
1. Research Scholar, Parul Institute of Engineering and Technology - MCA, Parul University, Gujarat, India
2. Director-MCA, Dean-FITCS, Parul Institute of Engineering and Technology - MCA, Parul University, Gujarat, India
Abstract
Tens of millions of cyber-attacks (Emails, online transactions, live video streaming, online games, and navigation are all examples of fraudulent Internet-based intelligence gathering.) are launched every day against Internet users throughout the world. Various defences have been developed by researchers in response to these attacks. At present, the techniques that cyber attackers use to perpetrate attacks are related to human exploitation. These attacks are more frequent than before, and they are harder to contain. In the area of information management, cybersecurity is essential. In today's world, protecting privacy has been one of the most difficult tasks. "Cyber-crimes" is the first thing that has come to me when I think about cyber security, which are on the rise at an alarming rate. Various governments and corporations are taking various actions to tackle cybercrime. Despite different initiatives, cyber security remains a major issue for many people. Traditional non-confidence counter-measures are unable to prevent violations against individuals. This paper explains the current state of cybersecurity threats, counter-measures and non-confidence tools that are relevant to day-to-day online operations. It offers a valuable cyber-attack taxonomy and classification that aids in the identification of cyber-attacks and cyber-security initiatives.
Reference9 articles.
1. G.NIKHITA REDDY, G.J.UGANDER REDDY A STUDY OF CYBER SECURITY CHALLENGES https://arxiv.org/ftp/arxiv/papers/1402/1402.1842.pdf
2. Ram B. Basnet. Andrew H. Sung, Qingshang Liu Rule-Based Phishing Attack Detection https://www.cs.nmt.edu/~rbasnet/research/RuleBasedPhishingAttackDetectionFinal.pdf
3. Patil, Prajakta & Rane, Rashmi & Bhalekar, Madhuri. Detecting spam and phishing mails using SVM and obfuscation URL detection algorithm. 1-4. 10.1109/ICISC.2017.8068633. https://www.researchgate.net/publication/320651414
4. Ammar Ahmed E. Elhadi, Mohd Aizaini Maarof and Ahmed HamzaOsman Malware Detection Based on Hybrid Signature Behaviour Application Programming Interface Call Graph. ISSN 1546-9239 http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.854.2710&rep=rep1&type=pdf
5. A. M. Shabut, K. T. Lwin and M. A. Hossain, "Cyberattacks, countermeasures, and protection schemes — A state of the art survey," DOI: 10.1109/SKIMA.2016.7916194 https://ieeexplore.ieee.org/abstract/document/7916194