A Review on Cyber Crimes on the Internet of Things
- URL: http://arxiv.org/abs/2009.05708v1
- Date: Sat, 12 Sep 2020 02:56:59 GMT
- Title: A Review on Cyber Crimes on the Internet of Things
- Authors: Mohan Krishna Kagita, Navod Thilakarathne, Thippa Reddy Gadekallu,
Praveen Kumar Reddy Maddikunta, Saurabh Singh
- Abstract summary: The global cybercrime damages predicted to cost up to 6 trillion dollars annually on the global economy by cyber crime.
The reasons for cyber-attacks can be Countries having week cyber securities, Cybercriminals use new technologies to attack.
MSP (Managed Service Providers) face different difficulties in fighting with Cyber-crime.
- Score: 4.207621961895129
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Internet of Things (IoT) devices are rapidly becoming universal. The success
of IoT cannot be ignored in the scenario today, along with its attacks and
threats on IoT devices and facilities are also increasing day by day. Cyber
attacks become a part of IoT and affecting the life and society of users, so
steps must be taken to defend cyber seriously. Cybercrimes threaten the
infrastructure of governments and businesses globally and can damage the users
in innumerable ways. With the global cybercrime damages predicted to cost up to
6 trillion dollars annually on the global economy by cyber crime. Estimated of
328 Million Dollar annual losses with the cyber attacks in Australia itself.
Various steps are taken to slow down these attacks but unfortunately not able
to achieve success properly. Therefor secure IoT is the need of this time and
understanding of attacks and threats in IoT structure should be studied. The
reasons for cyber-attacks can be Countries having week cyber securities,
Cybercriminals use new technologies to attack, Cybercrime is possible with
services and other business schemes. MSP (Managed Service Providers) face
different difficulties in fighting with Cyber-crime. They have to ensure that
security of the customer as well as their security in terms of their servers,
devices, and systems. Hence, they must use effective, fast, and easily usable
antivirus and antimalware tools.
Related papers
- Different Cybercrimes and their Solution for Common People [0.0]
This paper explores cybercrime trends and highlights the need for cybercrime awareness (cyberawareness) to mitigate vulnerabilities.
We present a list of 31 technical as well as non-technical solutions considering that a "common man" may not be technologically aware.
arXiv Detail & Related papers (2024-10-08T04:23:11Z) - Classification of cyber attacks on IoT and ubiquitous computing devices [49.1574468325115]
This paper provides a classification of IoT malware.
Major targets and used exploits for attacks are identified and referred to the specific malware.
The majority of current IoT attacks continue to be of comparably low effort and level of sophistication and could be mitigated by existing technical measures.
arXiv Detail & Related papers (2023-12-01T16:10:43Z) - knowCC: Knowledge, awareness of computer & cyber ethics between CS/non-CS university students [0.0]
This research focuses on the relations between cybersecurity awareness, cyber knowledge, computer ethics, cyber ethics, and cyber behavior.
The findings express that while internet users are alert of cyber threats, they only take the most elementary and easy-to-implement precautions.
arXiv Detail & Related papers (2023-10-19T12:29:26Z) - Graph Mining for Cybersecurity: A Survey [61.505995908021525]
The explosive growth of cyber attacks nowadays, such as malware, spam, and intrusions, caused severe consequences on society.
Traditional Machine Learning (ML) based methods are extensively used in detecting cyber threats, but they hardly model the correlations between real-world cyber entities.
With the proliferation of graph mining techniques, many researchers investigated these techniques for capturing correlations between cyber entities and achieving high performance.
arXiv Detail & Related papers (2023-04-02T08:43:03Z) - A systematic literature review on Ransomware attacks [0.0]
Cyber attacks, which are on the rise and include Ransomware, are the first thing that springs to mind when we think about cybersecurity.
Despite several cybersecurity measures, ransomware continues to terrify people.
arXiv Detail & Related papers (2022-12-08T04:09:40Z) - Artificial Intelligence for Cybersecurity: Threats, Attacks and
Mitigation [1.80476943513092]
The surging menace of cyber-attacks got a jolt from the recent advancements in Artificial Intelligence.
The intervention of AI not only automates a particular task but also improves efficiency by many folds.
This article discusses cybersecurity and cyber threats along with both conventional and intelligent ways of defense against cyber-attacks.
arXiv Detail & Related papers (2022-09-27T15:20:23Z) - Cyber Pirates Ahoy! An Analysis of Cybersecurity Challenges in the
Shipping Industry [0.0]
Maritime shipping has become a trillion-dollar industry that now impacts the economy of virtually every country around the world.
The implementation of these technologies has also caught the attention of cybercriminals.
This paper describes cybersecurity vulnerabilities present in the international shipping business.
arXiv Detail & Related papers (2022-08-07T00:49:36Z) - Proceedings of the Artificial Intelligence for Cyber Security (AICS)
Workshop at AAAI 2022 [55.573187938617636]
The workshop will focus on the application of AI to problems in cyber security.
Cyber systems generate large volumes of data, utilizing this effectively is beyond human capabilities.
arXiv Detail & Related papers (2022-02-28T18:27:41Z) - Fixed Points in Cyber Space: Rethinking Optimal Evasion Attacks in the
Age of AI-NIDS [70.60975663021952]
We study blackbox adversarial attacks on network classifiers.
We argue that attacker-defender fixed points are themselves general-sum games with complex phase transitions.
We show that a continual learning approach is required to study attacker-defender dynamics.
arXiv Detail & Related papers (2021-11-23T23:42:16Z) - Adversarial Machine Learning Attacks and Defense Methods in the Cyber
Security Domain [58.30296637276011]
This paper summarizes the latest research on adversarial attacks against security solutions based on machine learning techniques.
It is the first to discuss the unique challenges of implementing end-to-end adversarial attacks in the cyber security domain.
arXiv Detail & Related papers (2020-07-05T18:22:40Z) - Phishing and Spear Phishing: examples in Cyber Espionage and techniques
to protect against them [91.3755431537592]
Phishing attacks have become the most used technique in the online scams, initiating more than 91% of cyberattacks, from 2012 onwards.
This study reviews how Phishing and Spear Phishing attacks are carried out by the phishers, through 5 steps which magnify the outcome.
arXiv Detail & Related papers (2020-05-31T18:10:09Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.