A Review on Cyber Crimes on the Internet of Things
- URL: http://arxiv.org/abs/2009.05708v1
- Date: Sat, 12 Sep 2020 02:56:59 GMT
- Title: A Review on Cyber Crimes on the Internet of Things
- Authors: Mohan Krishna Kagita, Navod Thilakarathne, Thippa Reddy Gadekallu,
Praveen Kumar Reddy Maddikunta, Saurabh Singh
- Abstract summary: The global cybercrime damages predicted to cost up to 6 trillion dollars annually on the global economy by cyber crime.
The reasons for cyber-attacks can be Countries having week cyber securities, Cybercriminals use new technologies to attack.
MSP (Managed Service Providers) face different difficulties in fighting with Cyber-crime.
- Score: 4.207621961895129
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Internet of Things (IoT) devices are rapidly becoming universal. The success
of IoT cannot be ignored in the scenario today, along with its attacks and
threats on IoT devices and facilities are also increasing day by day. Cyber
attacks become a part of IoT and affecting the life and society of users, so
steps must be taken to defend cyber seriously. Cybercrimes threaten the
infrastructure of governments and businesses globally and can damage the users
in innumerable ways. With the global cybercrime damages predicted to cost up to
6 trillion dollars annually on the global economy by cyber crime. Estimated of
328 Million Dollar annual losses with the cyber attacks in Australia itself.
Various steps are taken to slow down these attacks but unfortunately not able
to achieve success properly. Therefor secure IoT is the need of this time and
understanding of attacks and threats in IoT structure should be studied. The
reasons for cyber-attacks can be Countries having week cyber securities,
Cybercriminals use new technologies to attack, Cybercrime is possible with
services and other business schemes. MSP (Managed Service Providers) face
different difficulties in fighting with Cyber-crime. They have to ensure that
security of the customer as well as their security in terms of their servers,
devices, and systems. Hence, they must use effective, fast, and easily usable
antivirus and antimalware tools.
Related papers
- Countering Autonomous Cyber Threats [40.00865970939829]
Foundation Models present dual-use concerns broadly and within the cyber domain specifically.
Recent research has shown the potential for these advanced models to inform or independently execute offensive cyberspace operations.
This work evaluates several state-of-the-art FMs on their ability to compromise machines in an isolated network and investigates defensive mechanisms to defeat such AI-powered attacks.
arXiv Detail & Related papers (2024-10-23T22:46:44Z) - Different Cybercrimes and their Solution for Common People [0.0]
This paper explores cybercrime trends and highlights the need for cybercrime awareness (cyberawareness) to mitigate vulnerabilities.
We present a list of 31 technical as well as non-technical solutions considering that a "common man" may not be technologically aware.
arXiv Detail & Related papers (2024-10-08T04:23:11Z) - An In Depth Analysis of a Cyber Attack: Case Study and Security Insights [0.0]
Nation-sponsored cyberattacks pose a significant threat to national security.
One of the most impactful cyber threats affecting South Korea's banking sector and infrastructure was the DarkSeoul cyberattack.
Believed to have been orchestrated by North Korean state-sponsored hackers, the attack caused widespread disruption.
arXiv Detail & Related papers (2024-09-28T00:47:38Z) - Navigating the road to automotive cybersecurity compliance [39.79758414095764]
The automotive industry is compelled to adopt robust cybersecurity measures to safeguard both vehicles and data against potential threats.
The future of automotive cybersecurity lies in the continuous development of advanced protective measures and collaborative efforts among all stakeholders.
arXiv Detail & Related papers (2024-06-29T16:07:48Z) - Classification of cyber attacks on IoT and ubiquitous computing devices [49.1574468325115]
This paper provides a classification of IoT malware.
Major targets and used exploits for attacks are identified and referred to the specific malware.
The majority of current IoT attacks continue to be of comparably low effort and level of sophistication and could be mitigated by existing technical measures.
arXiv Detail & Related papers (2023-12-01T16:10:43Z) - knowCC: Knowledge, awareness of computer & cyber ethics between CS/non-CS university students [0.0]
This research focuses on the relations between cybersecurity awareness, cyber knowledge, computer ethics, cyber ethics, and cyber behavior.
The findings express that while internet users are alert of cyber threats, they only take the most elementary and easy-to-implement precautions.
arXiv Detail & Related papers (2023-10-19T12:29:26Z) - Graph Mining for Cybersecurity: A Survey [61.505995908021525]
The explosive growth of cyber attacks nowadays, such as malware, spam, and intrusions, caused severe consequences on society.
Traditional Machine Learning (ML) based methods are extensively used in detecting cyber threats, but they hardly model the correlations between real-world cyber entities.
With the proliferation of graph mining techniques, many researchers investigated these techniques for capturing correlations between cyber entities and achieving high performance.
arXiv Detail & Related papers (2023-04-02T08:43:03Z) - Artificial Intelligence for Cybersecurity: Threats, Attacks and
Mitigation [1.80476943513092]
The surging menace of cyber-attacks got a jolt from the recent advancements in Artificial Intelligence.
The intervention of AI not only automates a particular task but also improves efficiency by many folds.
This article discusses cybersecurity and cyber threats along with both conventional and intelligent ways of defense against cyber-attacks.
arXiv Detail & Related papers (2022-09-27T15:20:23Z) - Cyber Pirates Ahoy! An Analysis of Cybersecurity Challenges in the
Shipping Industry [0.0]
Maritime shipping has become a trillion-dollar industry that now impacts the economy of virtually every country around the world.
The implementation of these technologies has also caught the attention of cybercriminals.
This paper describes cybersecurity vulnerabilities present in the international shipping business.
arXiv Detail & Related papers (2022-08-07T00:49:36Z) - Proceedings of the Artificial Intelligence for Cyber Security (AICS)
Workshop at AAAI 2022 [55.573187938617636]
The workshop will focus on the application of AI to problems in cyber security.
Cyber systems generate large volumes of data, utilizing this effectively is beyond human capabilities.
arXiv Detail & Related papers (2022-02-28T18:27:41Z) - Adversarial Machine Learning Attacks and Defense Methods in the Cyber
Security Domain [58.30296637276011]
This paper summarizes the latest research on adversarial attacks against security solutions based on machine learning techniques.
It is the first to discuss the unique challenges of implementing end-to-end adversarial attacks in the cyber security domain.
arXiv Detail & Related papers (2020-07-05T18:22:40Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.