Abstract
The advent of digital media, Internet, web and online social media has drawn the attention of relevant research community significantly and created many new research challenges on cyber security. People, organisations and governments around the world are losing a huge amount of money because of having cyber-attacks. For this reason, cyber security has become one of the most difficult and significant problems across the world. Currently, cyber security researchers of both industries and academic institutes are analysing existing cyber-attacks happening across the world and are developing different types of techniques to protect the systems against potential cyber-threats and attacks. This paper discusses the recent cyber security-attacks and the economic loss resulted from the growing cyber-attacks. This paper also analyses the increasing exploitation of a computer system, which has created more opportunities for the current cyber-crimes. Protective mechanisms and relevant laws are being implemented to reduce cyber- crimes around the world. Contemporary and important mitigation approaches for cyber-crimes have also been articulated in this paper.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Clough, J.: Principles of Cybercrime. Cambridge University Press, Cambridge (2015)
Passeri, P.: Cyber Attacks StatisticsPaolo Passeri, May 2016. http://www.hackmageddon.com/category/security/cyber-attacks-statistics/. Accessed 07 October 2016
Aviram, N., et al.: DROWN: Breaking TLS using SSLv2 (2016). https://www.lemarson.com/public/upload/ressource/filename/DROWN_SSL.pdf. Accessed 08 November 2016
Al Fardan, N.J., Paterson, K.G.: Lucky thirteen: breaking the TLS and DTLS record protocols. In: 2013 IEEE Symposium on Security and Privacy (SP). IEEE (2013)
Bhargavan, K., Leurent, G.: Transcript collision attacks: breaking authentication in TLS, IKE, and SSH. In: NDSS, February 2016
Beattie, D.: The DROWN Attack Vulnerability and Changing Your Server Configuration (2016)
Dukhovni, V., Käsper, E.: An OpenSSL User’s Guide to DROWN, OpenSSL, Editor (2016)
GitHub. Fast and full-featured SSL scanner (2016). https://github.com/iSECPartners/sslyze?_sm_byp=iVVWSrMVJZLN4jMF. Accessed 08 November 2016
Chen, P., Huygens, C., Desmet, L., Joosen, W.: Advanced or not? A comparative study of the use of anti-debugging and anti-VM techniques in generic and targeted malware. In: Hoepman, J.-H., Katzenbeisser, S. (eds.) SEC 2016. IFIP AICT, vol. 471, pp. 323–336. Springer, Heidelberg (2016). doi:10.1007/978-3-319-33630-5_22
OWASP. Category: OWASP Top Ten Project (2016). https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project#tab=OWASP_Top_10_for_2013. Accessed 07 October 2016
Sharma, P., Singh, A.: A review on detection and prevention techniques of denial of service attack in vanet. Int. J. Adv. Res. Comput. Sci. 6(5) (2015)
Keane, J.: DDoS attacks hit record numbers in Q2 2015 (2015). http://www.digitaltrends.com/computing/ddos-attacks-hit-record-numbers-in-q2-2015/. Accessed 07 October 2016
Networks, A. DDoS attacks: Understanding the Threat (2013). http://www.slideshare.net/Arbor_Networks/ddos-attacks-understanding-the-threat. Accessed 07 October 2016
Lab, K. Kaspersky DDoS Intelligence Report for Q1 2016 (2016). https://securelist.com/analysis/quarterly-malware-reports/74550/kaspersky-ddos-intelligence-report-for-q1-2016/. Accessed 07 October 2016
Karp, P.: Census website back online after day of recriminations over 43-hour outage. The Guardian, Australia (2016)
Bond, M., et al.: Chip and Skim: cloning EMV cards with the pre-play attack. In: 2014 IEEE Symposium on Security and Privacy. IEEE (2014)
CSC. Breaking down the threat of cyber terrorism (2016). http://blogs.csc.com/2016/02/04/breaking-down-the-threat-of-cyber-terrorism/. Accessed 08 November 2016
Zolkipli, M.F., Jantan, A.: An approach for malware behavior identification and classification. In: 2011 3rd International Conference on Computer Research and Development (ICCRD). IEEE (2011)
Goodin, D.: Massive US-planned cyberattack against Iran went well beyond Stuxnet (2016). http://arstechnica.com/tech-policy/2016/02/massive-us-planned-cyberattack-against-iran-went-well-beyond-stuxnet/. Accessed 08 November 2016
Talbot, D.: Cyber-Espionage Nightmare (2015). https://www.technologyreview.com/s/538201/cyber-espionage-nightmare. Accessed 08 November 2016
Ajayi, E.F.G.: The Impact of Cyber Crimes on Global Trade and Commerce. Available at SSRN (2016)
Milian, M.: Top Ten Hacking Countries (2016). http://www.bloomberg.com/slideshow/2013-04-23/top-ten-hacking-countries.html. Accessed 07 October 2016
S, V. How to block DROWN attack – Fix SSL vulnerability in Linux, Apache, Nginx, Exim and other servers (2016). https://bobcares.com/blog/how-to-fix-drown-attack-ssl-vulnerability/. Accessed 08 November 2016
Shields, K.: Cybersecurity: recognizing the risk and protecting against attacks. NC Bank. Inst. 19, 345 (2015)
Donaldson, S.E., et al.: Measuring a Cybersecurity Program. In: Enterprise Cybersecurity, pp. 213–229. Springer (2015)
Cavelty, M.D., Mauer, V.: Power and Security in the Information Age: Investigating the Role of the State in Cyberspace. Routledge, London (2016)
Wang, D., et al.: Preserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymity. Inf. Sci. 321, 162–178 (2015)
Das, M.L.: Two-factor user authentication in wireless sensor networks. IEEE Trans. Wireless Commun. 8(3), 1086–1090 (2009)
Jin, A.T.B., Ling, D.N.C., Goh, A.: Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recogn. 37(11), 2245–2255 (2004)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Chowdhury, A. (2016). Recent Cyber Security Attacks and Their Mitigation Approaches – An Overview. In: Batten, L., Li, G. (eds) Applications and Techniques in Information Security. ATIS 2016. Communications in Computer and Information Science, vol 651. Springer, Singapore. https://doi.org/10.1007/978-981-10-2741-3_5
Download citation
DOI: https://doi.org/10.1007/978-981-10-2741-3_5
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-2740-6
Online ISBN: 978-981-10-2741-3
eBook Packages: Computer ScienceComputer Science (R0)