A Systematic Review of Cyber Security and Classification of Attacks in Networks

被引:0
|
作者
Kashif, Muhammad [1 ]
Malik, Sheraz Arshad [1 ]
Abdullah, Muhammad Tahir [1 ]
Umair, Muhammad [1 ]
Khan, Prince Waqas [2 ]
机构
[1] GC Univ, Dept Informat Technol, Faisalabad, Pakistan
[2] Univ Agr Faisalabad, Dept Comp Sci, Faisalabad, Pakistan
关键词
Cyber security; internet; intranet; network security; cybercrime and security alludes;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cyber security plays an important role to secure the people who use internet via different electronic devices in their daily life. Some causes occurred all over world that people face problems when they connect their devices and system via internet. There are some highly sensitive data like biotechnology and military assets which are highly threatened by the hackers; cyber security plays a vital role in securing such data. Misusing the internet becomes a current issue in different sectors of life especially in social media, universities and government organizations. Internet is very useful for students in study institutes and employees who work in different organizations. Internet source gives the facility to people to fetch some information via internet. However, they must be protected when use the internet and secure for any unauthorized access. In this paper we have covered the different aspect of cyber security and Network security in the modern era. We have also tried to cover the threats in Intranet of organizations.
引用
收藏
页码:201 / 207
页数:7
相关论文
共 50 条
  • [1] Security attacks in Opportunistic Mobile Networks: A systematic literature review
    Altaweel, Ala
    Aslam, Sidra
    Kamel, Ibrahim
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2024, 221
  • [2] A systematic literature review of blockchain cyber security
    Taylor, Paul J.
    Dargahi, Tooska
    Dehghantanha, Ali
    Parizi, Reza M.
    Choo, Kim-Kwang Raymond
    DIGITAL COMMUNICATIONS AND NETWORKS, 2020, 6 (02) : 147 - 156
  • [3] A systematic literature review of blockchain cyber security
    Paul JTaylor
    Tooska Dargahi
    Ali Dehghantanha
    Reza MParizi
    KimKwang Raymond Choo
    Digital Communications and Networks, 2020, 6 (02) : 147 - 156
  • [4] Behaviour classification of cyber attacks using convolutional neural networks
    Lin, Wen-Hui
    Wang, Ping
    Lin, Hsiao-Chung
    Wu, Bao-Hua
    Tsai, Jeng-Ying
    Journal of Computers (Taiwan), 2021, 32 (01): : 65 - 82
  • [5] Contagion in cyber security attacks
    Baldwin, Adrian
    Gheyas, Iffat
    Ioannidis, Christos
    Pym, David
    Williams, Julian
    JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY, 2017, 68 (07) : 780 - 791
  • [6] A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions
    Aslan, Omer
    Aktug, Semih Serkant
    Ozkan-Okay, Merve
    Yilmaz, Abdullah Asim
    Akin, Erdal
    ELECTRONICS, 2023, 12 (06)
  • [7] Information Security Technology for Computer Networks through Classification of Cyber-Attacks using Soft Computing Algorithms
    Villaluna, Jason A.
    Cruz, Febus Reidj G.
    2017 IEEE 9TH INTERNATIONAL CONFERENCE ON HUMANOID, NANOTECHNOLOGY, INFORMATION TECHNOLOGY, COMMUNICATION AND CONTROL, ENVIRONMENT AND MANAGEMENT (IEEE HNICEM), 2017,
  • [8] An intelligent cyber security system against DDoS attacks in SIP networks
    Semerci, Murat
    Cemgil, Ali Taylan
    Sankur, Bulent
    COMPUTER NETWORKS, 2018, 136 : 137 - 154
  • [9] Analysis of Attacks and Security Requirements for Wireless Body Area Networks - A Systematic Literature Review
    Paul, Pangkaj Chandra
    Loane, John
    Regan, Gilbert
    McCaffery, Fergal
    SYSTEMS, SOFTWARE AND SERVICES PROCESS IMPROVEMENT (EUROSPI 2019), 2019, 1060 : 439 - 452
  • [10] A New Classification of Attacks against the Cyber-Physical Security of Smart Grids
    Elbez, Ghada
    Keller, Hubert B.
    Hagenmeyer, Veit
    13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,