Advertisement

Research Challenges and Future Scope

  • Ramjee PrasadEmail author
  • Vandana Rohokale
Chapter
Part of the Springer Series in Wireless Technology book series (SSWT)

Abstract

The cyber security has several potential open research challenges as well as future scope. There are various flaws in the ICT and cyber systems such as level code defects, trustworthy computing and selfish behavior of the users and machines, security architecture imperfections, privacy shortcomings, usability issues, and weak security metrics. To overcome these flaws with effective solutions is a challenging task. Key research challenges and future scope is discussed subject wise in this chapter.

References

  1. Asian Schools of cyber law (2010) A to Z of cybercrimes. Department of Science and Technology Government of India, Lexcode Education and Assessment Platform (LEAP)Google Scholar
  2. Ben Henda N (2014) Generic and efficient attacker models in SPIN. In: SPIN ’14, San Jose, USA, 21–23 July 2014Google Scholar
  3. Bhargava N, Sharma MM, Garhwal AS, Mathuria M (2012) Digital image authentication system based on digital watermarking. In: International conference on radar, communication and computing (ICRCC), pp 185–189Google Scholar
  4. Bisson D (2016) 6 common phishing attacks and how to protect against them. Tripwire-the state of security. https://www.tripwire.com/state-of-security/security-awareness/6-common-phishing-attacks-and-how-to-protect-against-them/
  5. Buyuk OO (2018) A novel actual time cyber security approach to smart grids. In: 6th international Istanbul smart grids and cities congress and fair (ICSG)Google Scholar
  6. Choi Y, Lee J-Y, Choi S, Kim J-H, Kim I (2016) Introduction to a network forensics system for cyber incidents analysis. In: 18th international conference on advanced communication technology (ICACT)Google Scholar
  7. CYWARE malware and Vulnerabilities Blog (2019) Latest Bluetooth hacking techniques expose new attack vectors for hackers. https://cyware.com/news/latest-bluetooth-hacking-techniques-expose-new-attack-vectors-for-hackers-a16cfb5e
  8. El-Wahed SA, Elfatatry A, Abougabal MS (2007) A new look at software plagiarism investigation and copyright infringement. In: ITI 5th international conference on information and communications technology, pp 315–318Google Scholar
  9. Farshchi SMR, Gharib F, Ziyaee R (2011) Study of security issues on traditional and new generation of e-commerce model. In: International conference on software and computer applicationsGoogle Scholar
  10. FOSSBYTES (2017 Feb 28) What is social engineering? What are different types of social engineering attacks? https://fossbytes.com/what-is-social-engineering-types-techniques/
  11. Garbade MJ (2019) Top 8 open source AI technologies in machine learning. opensource.com. https://opensource.com/article/18/5/top-8-open-source-ai-technologies-machine-learning
  12. Geers K (2011) Strategic cyber security. CCDCOE, NATO Cooperative Cyber Defense Center of Excellence, 19–22 June 2011Google Scholar
  13. Ghosh S (2019) Top seven social media threats. Computer Weekly Blog. https://www.computerweekly.com/tip/Top-seven-social-media-threats
  14. Halabi T, Bellaiche M, Abusitta A (2018) A cooperative game for online cloud federation formation based on security risk assessment. In: 5th IEEE international conference on cyber security and cloud computing (CSCloud) and 4th IEEE international conference on edge computing and scalable cloud (EdgeCom), pp 83–88Google Scholar
  15. Holkar AM, Holkar NS, Nitnawwre D (2013) Investigative analysis of repudiation attack on MANET with different routing protocols. Int J Emerg Trends Technol Comput Sci (IJETTCS) 2(3)Google Scholar
  16. Houben R, Snyers A (2018) Cryptocurrencies and Blockchain—legal context and implications for financial crime, money laundering and tax evasion. In: European Parliament Study Requested by TAX3 committeeGoogle Scholar
  17. Hussain F, Ferdouse L, Karim L (2016) Security threats in M2M networks: a survey with case study. Comput Syst Sci EngGoogle Scholar
  18. GSMA Intelligence (2014 Feb) Analysis from concept to delivery: the M2M market todayGoogle Scholar
  19. Liska A (2003) Network security: understanding types of attacks. Pearson InformIT. http://www.informit.com/articles/article.aspx?p=31964&seqNum=3
  20. Liţă CV, Cosovan D, Gavriluţ D (2017) Anti-emulation trends in modern packers: a survey on the evolution of anti-emulation techniques in UPA packers. J Comput Virol Hacking TechGoogle Scholar
  21. Lord N (2018) What is a phishing attack? Defining and identifying different types of phishing attacks. Digital Guardian Blog. https://digitalguardian.com/blog/what-phishing-attack-defining-and-identifying-different-types-phishing-attacks
  22. Neumann PG (2000) Denial-of-service attacks. In: Communications of the ACM, p 136. Academic OneFileGoogle Scholar
  23. Niranjana Murthy M, Chahar D (2013) The study of e-commerce security issues and solutions. Int J Adv Res Comput Commun Eng 2(7)Google Scholar
  24. Priyadarshini I (2019) Introduction to blockchain technology. In: Le D-N et al (eds) Cyber security in parallel and distributed computing, pp 93–262CrossRefGoogle Scholar
  25. Puri S, Agnihotri M (2017) A proactive approach for cyber attack mitigation in cloud network. In: International conference on energy, communication, data analytics and soft computing (ICECDS)Google Scholar
  26. Raphael JR (2019) 7 mobile security threats you should take seriously in 2019. https://www.csoonline.com/article/3241727/7-mobile-security-threats-you-should-take-seriously-in-2019.html
  27. Rodrıguez Gomez RA, Macia Fernandez G, García-Teodoro P (2013) Survey and taxonomy of botnet research through life-cycle. ACM Comput Surv 4–10:45. Article 45Google Scholar
  28. Saibharath S, Geethakumari G (2015) Cloud forensics: evidence collection and preliminary analysis. In: IEEE international advance computing conference (IACC)Google Scholar
  29. Stephen C, Lee A (2014) Malware is called malicious for a reason: the risks of weaponizing code. In: 6th international conference on cyber conflictGoogle Scholar
  30. Tekade PS, Shelke CJ (2014) A survey on different attacks on mobile devices and its security. Int J Appl Innovation Eng Manage (IJAIEM) 3(2). ISSN 2319 - 4847Google Scholar
  31. The Government of the Hong Kong Special Administrative Region (2012 Sept) Information security incident handling guidelines. Version: 5.0Google Scholar
  32. Tyugu E (2011) Artificial intelligence in cyber defense. In: Czosseck C, Tyugu E, Wingfield T (eds) 2011 3rd international conference on cyber conflict, Tallinn, EstoniaGoogle Scholar
  33. United States Government Accountability Office (2014 Apr) Information security-agencies need to improve cyber incident response practices. Report to Congressional RequestersGoogle Scholar
  34. Xiang Y, Wang L (2019) An improved defender-attacker-defender model for transmission line defense considering offensive resource uncertainties. IEEE Trans Smart Grid 10(3):2534–2546MathSciNetCrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Department of Business Development and Technology, CTIF Global CapsuleAarhus UniversityHerningDenmark
  2. 2.Department of Electronics and TelecommunicationSinhgad Institute of Technology and SciencePuneIndia

Personalised recommendations