Abstract
Cybercrime is one of the severe issues in today’s world that is increasing day by day due to unawareness of people about the harm it can cause. The main reason against the augmentation of cybercrime is the lack of education or knowledge about the impact it can lead to. Cybercrime can be done against individuals, society, or any organization whether it is private or government. The aim of the paper is to focus on what cybercrime is, its types, related work, and its defensive mechanism. Defensive mechanism against cybercrime includes the ways or measures that how can any individual or any organization protects them against cybercrime. This paper also includes the related work which includes some points about the work which has been done so far on cybercrime.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Furnell S (2002) Cybercrime: vandalizing the information society. Addison-Wesley, London, pp 3–540
Gunjan VK, Kumar A, Avdhanam S (2013) A survey of cyber crime in India. In: 2013 15th international conference on advanced computing technologies (ICACT), Sept 2013. IEEE, pp 1–6
Gordon S, Ford R (2006) On the definition and classification of cybercrime. J Comput Virol 2(1):13–20
Pandove K, Jindal A, Kumar R (2010) Email spoofing. Int J Comput Appl 5(1):27–30
Pittaro ML (2007) Cyber stalking: an analysis of online harassment and intimidation. Int J Cyber Criminol 1(2):180–197
Erickson J (2008) Hacking: the art of exploitation. No Starch Press
Lewis JA (2002) Assessing the risks of cyber terrorism, cyber war and other cyber threats. Center for Strategic & International Studies, Washington, DC, p 12
Jagatic TN, Johnson NA, Jakobsson M, Menczer F (2007) Social phishing. Commun ACM 50(10):94–100
Bolton RJ, Hand DJ (2002) Statistical fraud detection: a review. Stat Sci 17(3):235–255
McMillen J (1996) Understanding gambling. In: Gambling cultures: studies in history and interpretation, pp 6–42
Fick J (2009) Prevention is better than prosecution: deepening the defence against cyber crime. J Digit Forensics Secur Law 4(4):3
Buil-Gil D, Miró-Llinares F, Moneva A, Kemp S, Díaz-Castaño N (2020) Cybercrime and shifts in opportunities during COVID-19: a preliminary analysis in the UK. Eur Soc 1–13
Mishra A, Gupta N, Gupta BB (2020) Security threats and recent countermeasures in cloud computing. In: Modern principles, practices, and algorithms for cloud security. IGI Global, pp 145–161
Mishra A, Gupta N (2019) Analysis of cloud computing vulnerability against DDoS. In: 2019 international conference on innovative sustainable computational technologies (CISCT), Oct 2019. IEEE, pp 1–6
Bhushan K, Gupta BB (2019) Distributed denial of service (DDoS) attack mitigation in software defined network (SDN)-based cloud computing environment. J Ambient Intell Humaniz Comput 10(5):1985–1997
Alsmirat MA et al (2019) Impact of digital fingerprint image quality on the fingerprint recognition accuracy. Multimed Tools Appl 78(3):3649–3688
Dahiya A, Gupta BB (2020) Multi attribute auction based incentivized solution against DDoS attacks. Comput Secur 92:101763
Al-Qerem A et al (2020) IoT transaction processing through cooperative concurrency control on fog cloud computing environment. Soft Comput 24(8):5695–5711
Gupta S, Gupta BB (2015) PHP-sensor: a prototype method to discover workflow violation and XSS vulnerabilities in PHP web applications. In: Proceedings of the 12th ACM international conference on computing frontiers, May 2015, pp 1–8
Dahiya A, Gupta BB (2020) A reputation score policy and Bayesian game theory based incentivised mechanism for DDoS attacks mitigation and cyber defense. Future Gener Comput Syst
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Bajaj, G., Tailwal, S., Mishra, A. (2022). A Recent Survey on Cybercrime and Its Defensive Mechanism. In: Agrawal, D.P., Nedjah, N., Gupta, B.B., Martinez Perez, G. (eds) Cyber Security, Privacy and Networking. Lecture Notes in Networks and Systems, vol 370. Springer, Singapore. https://doi.org/10.1007/978-981-16-8664-1_29
Download citation
DOI: https://doi.org/10.1007/978-981-16-8664-1_29
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-8663-4
Online ISBN: 978-981-16-8664-1
eBook Packages: EngineeringEngineering (R0)