Advertisement

Some Specific Examples of Attacks on Information Systems and Smart Cities Applications

  • Muzafer SaračevićEmail author
  • Aybeyan Selimi
  • Šemsudin Plojović
Chapter
  • 555 Downloads
Part of the Advanced Sciences and Technologies for Security Applications book series (ASTSA)

Abstract

In this chapter, are enlisted some specific examples of attacks in information systems and smart cities applications. The chapter consists of five parts. In the first and second part, the basic introductory considerations and some of our previous research in the field of security of information systems and security management in the cyberspace are listed. In the third part, are given specific examples of XSS and CSRF attacks. In addition, is given a specific implementation of the executive script, which has a task for the collection of confidential information in smart environments. In the fourth part, is listed the procedure for attacking hash digest data as well as the procedure for hiding information using the Python programming language and the Kali Linux environment. Finally, lists the final considerations and gives suggestions for further research in the field of cybersecurity attacks on smart cities.

Keywords

Cybersecurity Attacks on information Smart cities applications Authentication Hiding information XSS/CSRF attacks 

References

  1. 1.
    Shema M (2010) Hacking web apps, 1st edn. Wiley publication, ISBN-13: 978-1597499514, ISBN-10: 159749951XGoogle Scholar
  2. 2.
    Cannings R, Dwivedi H, Lackey Z (2007) Hacking Exposed Web 2.0, 1st edn. ISBN-13: 978-0071494618, ISBN-10: 0071494618 17 Dec 2007Google Scholar
  3. 3.
    Scambraz J, Liu V, Sima C (2010) Hacking Exposed web application 3, ISBN: 9780071740647, Division: Professional, Pub DateGoogle Scholar
  4. 4.
    Clark J (2012) SQL Injection Attack, and Defense. Wiley publication, ISBN: 978-1-118-36218-1, 552 p, Dec 2012Google Scholar
  5. 5.
    Stuttard D, Pinto M (2012) The web application hacker’s handbook, 2nd edn. ISBN-13: 978-1118026472, ISBN-10: 1118026470Google Scholar
  6. 6.
    Barnett R (2012) Web application defender’s cookbook: battling hackers and protecting users, 1st edn. ISBN-13: 978-1118362181Google Scholar
  7. 7.
    Saracevic M, Hadzic M (2017) Security management in cyberspace and protection mechanisms of web applications, Legal issues, ISSN: 2334-8100, No. 9Google Scholar
  8. 8.
    Saracevic M, Selimi A, Plojovic S (2018) Security in the web environment and concrete examples of attacks on the internet, ICEB’ 18–4. International congress on economics and business, Budapest/Hungary, ISBN: 978-975-8628-67-4Google Scholar
  9. 9.
    Rasori M, Perazzo P, Dini G (2018) ABE-Cities: an attribute-based encryption system for smart cities. In: IEEE international conference on smart computing (SMARTCOMP), pp 65–72Google Scholar
  10. 10.
    Saracevic M, Adamovic S, Bisevac E (2018) Applications of catalan numbers and lattice path combinatorial problem in cryptography. Acta Polytech Hung: J Appl Sci 15(7):91–110Google Scholar
  11. 11.
    Saracevic M, Aybeyan S, Selimovic F (2018) Generation of cryptographic keys with algorithm of polygon triangulation and Catalan numbers, Computer Science—AGH, Vol. 19, No. 3, pp. 243–256, AGH University of Science and Technology, PolandGoogle Scholar
  12. 12.
    Saracevic M, Hadzic M, Koricanin E (2017) Generating catalan-keys based on dynamic programming and their application in steganography. Int J Ind Eng Manag 8(4):219–227Google Scholar
  13. 13.
    Al Dairi A, Tawalbeh L (2017) Cyber security attacks on smart cities and associated mobile technologies. Procedia Comput Sci 109:1086–1091CrossRefGoogle Scholar
  14. 14.
    Braun T, Fung B, Iqbal F, Shah B (2018) Security and privacy challenges in Smart cities. Sustain Cities Soc 39:499–507CrossRefGoogle Scholar
  15. 15.
    Cui L, Xie G, Qu Y, Gao L, Yang Y (2018) Security and privacy in smart cities: challenges and opportunities. IEEE Access 6:46134–46145CrossRefGoogle Scholar
  16. 16.
    Kitchin R, Dodge M (2017) The (in)security of smart cities: vulnerabilities, risks, mitigation and prevention. J Urban Technol pp. 1–19, Taylor and Francis  https://doi.org/10.1080/10630732.2017.1408002CrossRefGoogle Scholar
  17. 17.
    Sharma G, Kalra SJ (2017) A secure remote user authentication scheme for smart cities e-governance applications. Reliable Intell Environ 3(3):177–188, 2017, SpringerGoogle Scholar
  18. 18.
    Butt TA, Afzaal M (2017) Security and privacy in smart cities: issues and current solutions, 1st AUEIRC Conference 2017, SpringerGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Muzafer Saračević
    • 1
    Email author
  • Aybeyan Selimi
    • 2
  • Šemsudin Plojović
    • 3
  1. 1.Department of Computer SciencesUniversity of Novi PazarNovi PazarSerbia
  2. 2.Department of Computer SciencesInternational Vision UniversityGostivarMacedonia
  3. 3.Department of Economic SciencesUniversity of Novi PazarNovi PazarSerbia

Personalised recommendations