Skip to main content

A Recent Survey on Cybercrime and Its Defensive Mechanism

  • Conference paper
  • First Online:
Cyber Security, Privacy and Networking

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 370))

  • 400 Accesses

Abstract

Cybercrime  is one of the severe issues in today’s world that is increasing day by day due to unawareness of people about the harm it can cause. The main reason against the augmentation of cybercrime is the lack of education or knowledge about the impact it can lead to. Cybercrime can be done against individuals, society, or any organization whether it is private or government. The aim of the paper is to focus on what cybercrime is, its types, related work, and its defensive mechanism. Defensive mechanism against cybercrime includes the ways or measures that how can any individual or any organization protects them against cybercrime. This paper also includes the related work which includes some points about the work which has been done so far on cybercrime.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Furnell S (2002) Cybercrime: vandalizing the information society. Addison-Wesley, London, pp 3–540

    MATH  Google Scholar 

  2. Gunjan VK, Kumar A, Avdhanam S (2013) A survey of cyber crime in India. In: 2013 15th international conference on advanced computing technologies (ICACT), Sept 2013. IEEE, pp 1–6

    Google Scholar 

  3. Gordon S, Ford R (2006) On the definition and classification of cybercrime. J Comput Virol 2(1):13–20

    Article  Google Scholar 

  4. Pandove K, Jindal A, Kumar R (2010) Email spoofing. Int J Comput Appl 5(1):27–30

    Google Scholar 

  5. Pittaro ML (2007) Cyber stalking: an analysis of online harassment and intimidation. Int J Cyber Criminol 1(2):180–197

    Google Scholar 

  6. Erickson J (2008) Hacking: the art of exploitation. No Starch Press

    Google Scholar 

  7. Lewis JA (2002) Assessing the risks of cyber terrorism, cyber war and other cyber threats. Center for Strategic & International Studies, Washington, DC, p 12

    Google Scholar 

  8. Jagatic TN, Johnson NA, Jakobsson M, Menczer F (2007) Social phishing. Commun ACM 50(10):94–100

    Article  Google Scholar 

  9. Bolton RJ, Hand DJ (2002) Statistical fraud detection: a review. Stat Sci 17(3):235–255

    Article  MathSciNet  Google Scholar 

  10. McMillen J (1996) Understanding gambling. In: Gambling cultures: studies in history and interpretation, pp 6–42

    Google Scholar 

  11. Fick J (2009) Prevention is better than prosecution: deepening the defence against cyber crime. J Digit Forensics Secur Law 4(4):3

    MathSciNet  Google Scholar 

  12. Buil-Gil D, Miró-Llinares F, Moneva A, Kemp S, Díaz-Castaño N (2020) Cybercrime and shifts in opportunities during COVID-19: a preliminary analysis in the UK. Eur Soc 1–13

    Google Scholar 

  13. Mishra A, Gupta N, Gupta BB (2020) Security threats and recent countermeasures in cloud computing. In: Modern principles, practices, and algorithms for cloud security. IGI Global, pp 145–161

    Google Scholar 

  14. Mishra A, Gupta N (2019) Analysis of cloud computing vulnerability against DDoS. In: 2019 international conference on innovative sustainable computational technologies (CISCT), Oct 2019. IEEE, pp 1–6

    Google Scholar 

  15. Bhushan K, Gupta BB (2019) Distributed denial of service (DDoS) attack mitigation in software defined network (SDN)-based cloud computing environment. J Ambient Intell Humaniz Comput 10(5):1985–1997

    Article  Google Scholar 

  16. Alsmirat MA et al (2019) Impact of digital fingerprint image quality on the fingerprint recognition accuracy. Multimed Tools Appl 78(3):3649–3688

    Google Scholar 

  17. Dahiya A, Gupta BB (2020) Multi attribute auction based incentivized solution against DDoS attacks. Comput Secur 92:101763

    Google Scholar 

  18. Al-Qerem A et al (2020) IoT transaction processing through cooperative concurrency control on fog cloud computing environment. Soft Comput 24(8):5695–5711

    Google Scholar 

  19. Gupta S, Gupta BB (2015) PHP-sensor: a prototype method to discover workflow violation and XSS vulnerabilities in PHP web applications. In: Proceedings of the 12th ACM international conference on computing frontiers, May 2015, pp 1–8

    Google Scholar 

  20. Dahiya A, Gupta BB (2020) A reputation score policy and Bayesian game theory based incentivised mechanism for DDoS attacks mitigation and cyber defense. Future Gener Comput Syst

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Garima Bajaj .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Bajaj, G., Tailwal, S., Mishra, A. (2022). A Recent Survey on Cybercrime and Its Defensive Mechanism. In: Agrawal, D.P., Nedjah, N., Gupta, B.B., Martinez Perez, G. (eds) Cyber Security, Privacy and Networking. Lecture Notes in Networks and Systems, vol 370. Springer, Singapore. https://doi.org/10.1007/978-981-16-8664-1_29

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-8664-1_29

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-8663-4

  • Online ISBN: 978-981-16-8664-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics