Affiliation:
1. Department of Arts, Communications and Social Sciences, University Canada West, Vancouver, BC V6B 1V9, Canada
2. GUS Institute, Global University Systems, London EC1N 2LX, UK
Abstract
Amidst an unprecedented period of technological progress, incorporating digital platforms into diverse domains of existence has become indispensable, fundamentally altering the operational processes of governments, businesses, and individuals. Nevertheless, the swift process of digitization has concurrently led to the emergence of cybercrime, which takes advantage of weaknesses in interconnected systems. The growing dependence of society on digital communication, commerce, and information sharing has led to the exploitation of these platforms by malicious actors for hacking, identity theft, ransomware, and phishing attacks. With the growing dependence of organizations, businesses, and individuals on digital platforms for information exchange, commerce, and communication, malicious actors have identified the susceptibilities present in these systems and have begun to exploit them. This study examines 28 research papers focusing on intrusion detection systems (IDS), and phishing detection in particular, and how quickly responses and detections in cybersecurity may be made. We investigate various approaches and quantitative measurements to comprehend the link between reaction time and detection time and emphasize the necessity of minimizing both for improved cybersecurity. The research focuses on reducing detection and reaction times, especially for phishing attempts, to improve cybersecurity. In smart grids and automobile control networks, faster attack detection is important, and machine learning can help. It also stresses the necessity to improve protocols to address increasing cyber risks while maintaining scalability, interoperability, and resilience. Although machine-learning-based techniques have the potential for detection precision and reaction speed, obstacles still need to be addressed to attain real-time capabilities and adjust to constantly changing threats. To create effective defensive mechanisms against cyberattacks, future research topics include investigating innovative methodologies, integrating real-time threat intelligence, and encouraging collaboration.
Reference66 articles.
1. Bogatinov, D.S., Bogdanoski, M., and Angelevski, S. (2016). Handbook of Research on Civil Society and National Security in the Era of Cyber Warfare, IGI Global.
2. Rodrigues, D., de Rosa, G.H., Passos, L.A., and Papa, J.P. (2020). Nature-Inspired Computation in Data Mining and Machine Learning, Springer.
3. A care-based stakeholder approach to ethics of cybersecurity in business;Morgan;Ethics Cybersecur.,2020
4. Winterrose, M.L., Carter, K.M., Wagner, N., and Streilein, W.W. (2020). Advances in Cyber Security Analytics and Decision Systems, Springer.
5. Review and insight on the behavioral aspects of cybersecurity;Caulkins;Cybersecurity,2020
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Navigating the road to automotive cybersecurity compliance;2024 IEEE 30th International Symposium on On-Line Testing and Robust System Design (IOLTS);2024-07-03