Classification of cyberattacks on the basis of fundamental principles of cybersecurity.

Classification of cyberattacks on the basis of fundamental principles of cybersecurity.

Source publication
Article
Full-text available
Cybersecurity is one of the most important concepts of cyberworld which provides protection to the cyberspace from various types of cybercrimes. This paper provides an updated survey of cybersecurity. We conduct the survey of security of recent prominent researches and categorize the recent incidents in context to various fundamental principles of...

Similar publications

Article
Full-text available
In the literature on fear of crime in physical space, there is a well-established relationship between direct experiences of victimization, the environmental characteristics of the place of victimization and its impact on the perceived risk of future victimization. However, nowadays there is very limited evidence about this relationship in cyberspa...
Article
Full-text available
The increased use of the internet raises concerns about the security of data and other resources shared in cyberspace. Although efforts to improve data security are visible, the need to continuously explore other avenues for preventing and mitigating cyberattacks is apparent. Swarm intelligence models have, in the past, been considered in cybersecu...
Article
Full-text available
Cyberattacks are becoming more sophisticated and ubiquitous. Cybercriminals are inevitably adopting Artificial Intelligence (AI) techniques to evade the cyberspace and cause greater damages without being noticed. Researchers in cybersecurity domain have not researched the concept behind AI-powered cyberattacks enough to understand the level of soph...
Technical Report
Full-text available
Technology has consistently played a key role in the modernization and nation-building project of independent India’s state and society, and information and communications technology (ICT) became a centrepiece of its post-liberalization economic growth trajectory. Since the 1990s, India has developed a strategic edge in cyberspace, building one of...
Chapter
Full-text available
Maritime supply chains are a highly dynamic environment in which multiple public and private stakeholders interact by exchanging digital data through various systems and technologies in cyberspace. The maritime industry is immersed in a digital transformation process that is evolving to be highly dependent on cyber-physical systems composed of info...

Citations

... Brar and Kumar (2018) propose a scientific classification of cybercrimes and examine the difficulties related with battling them (Brar, 2018). They feature the significance of understanding various kinds of cyber threats and executing powerful safety efforts to safeguard basic framework, including smart matrix frameworks. ...
Article
Full-text available
The joining of information technology into smart grids has altered the energy area, improving proficiency and maintainability. Notwithstanding, this combination additionally delivers critical cybersecurity challenges. This paper digs into the investigation of cybersecurity challenges in smart grids, especially underlining the job of information technology. One basic viewpoint analyzed in this study is the use of organized Robust Principal Component Analysis (RPCA) with the Proximal Point identifier. Through definite estimations and examinations, the paper presents a thorough outline of the RPCA-based approach's viability. It gives experiences into the computational prerequisites for carrying out this method, featuring its true capacity in identifying oddities inside smart lattice frameworks. The exploration uses genuine data from the IEEE 30 and IEEE 118 power frameworks to assess the exhibition of the RPCA-based proximal tendency locater. Results exhibit promising results, including high detection probability and diminished recognizable proof latency. In addition, the review exhibits the calculation's ability to recognize False Data Injection Attacks (FDIA) with a great ID probability surpassing 95%. Besides, trial re-enactments led for both arbitrary and assigned assault situations on the IEEE 30 and IEEE 118 power frameworks display essentially lower detection latencies. These discoveries highlight the significance and viability of utilizing RPCA-based approaches in moderating cyber security dangers inside smart framework foundations.
... In order to enhance the cybersecurity of this nation and effectively address emerging threats, it is imperative to consistently pursue two primary objectives [61]: ...
Article
Full-text available
Currently, the majority of economic, commercial, cultural, social, and governmental activity and contacts between countries, encompassing individuals, non-governmental organizations, and government institutions, occur in the virtual realm known as cyberspace. In recent times, numerous private enterprises and governmental institutions worldwide have encountered the issue of cyber-attacks and the peril associated with wireless communication technology. The modern society heavily relies on electronic technology, and safeguarding this data from cyber-attacks poses a formidable challenge. Cyber-attacks are intended to inflict financial harm onto companies. Cyber-attacks may serve military or political objectives in certain instances. Some examples of these damages include PC infections, knowledge breaches, data distribution service (DDS), and other attack routes. For this purpose, different companies employ diverse strategies to mitigate the harm caused by cyber-attacks. Cybersecurity monitors up-to-date information on the most recent IT data. Researchers worldwide have proposed several techniques to prevent cyber-attacks or mitigate their impact. Several approaches are currently in the operational phase, while others are still in the study phase. The objective of this study is to conduct a thorough examination and evaluation of the latest advancements in the field of cyber security, with the purpose of identifying and analyzing the 108 problems, vulnerabilities, and strengths of the proposed methodologies. A comprehensive analysis is conducted on several forms of novel descendant attacks. The discussion revolves around conventional security frameworks, encompassing their historical context and early-generation approaches to cyber-security. Furthermore, this report presents the latest advancements and developing patterns in the field of cyber security, as well as the current problems and risks to security. The comprehensive review study offered for IT and cyber security researchers is anticipated to be beneficial.
... In past studies, the authors made different classification methods of smart grid cyber attacks. Then a classification method for cyber attacks according to the three basic principles of cyber security will be introduced in detail [5]. The three basic principles of cyber security are Confidentiality, Integrity, and Availability. ...
... The three basic principles of cyber security are Confidentiality, Integrity, and Availability. The most important aspect of cyber security, according to these three fundamental principles, is encryption [5]. Attacks on data and information on the Internet may have an impact on these three tenets. ...
... Important information will leak under these kinds of attacks on confidentiality. Classifications of cyber attacks [5] (2) Integrity: On the Internet, data and information are susceptible to malicious manipulation. Integrity guarantees the quality and consistency of the data on the network. ...
Article
Full-text available
Renewable energy is gradually replacing traditional fossil fuels. The change of power generation energy structure brings new challenges to the traditional power grid. Through the efficient bidirectional movement of electricity and information, smart grids might include renewable energy. For the complex informational and financial operations required by smart grid, communication systems are crucial, but they also make smart grid vulnerable to numerous cyber attacks. Smart grid cyber security has been widely concerned. The purpose of this paper is to explore the use of artificial intelligence technology in smart grid cyber security. Three methods in the field of artificial intelligence are highlighted: Machine Learning, Reinforcement Learning, and Ensemble Methods. This paper summarizes the benefits and drawbacks of their use of smart grid cyber security, and further makes a qualitative comparison of the three methods from multiple performance indicators.
... Cybersecurity experts have expressed concerns, revealing that 70% of IoT devices are vulnerable to cyberattacks [65]. The wireless sensor network of IoT exhibits vulnerabilities across various layers, and cyberattacks can manifest at different stages [66]. Likewise, LPWAN is not exempt from cyber threats [67]. ...
... vulnerable to cyberattacks [65]. The wireless sensor network of IoT exhibits vulnerabilities across various layers, and cyberattacks can manifest at different stages [66]. Likewise, LPWAN is not exempt from cyber threats [67]. ...
Article
Full-text available
Smart grids incorporate diverse power equipment used for energy optimization in intelligent cities. This equipment may use Internet of Things (IoT) devices and services in the future. To ensure stable operation of smart grids, cybersecurity of IoT is paramount. To this end, use of cryptographic security methods is prevalent in existing IoT. Non-cryptographic methods such as radio frequency fingerprinting (RFF) have been on the horizon for a few decades but are limited to academic research or military interest. RFF is a physical layer security feature that leverages hardware impairments in radios of IoT devices for classification and rogue device detection. The article discusses the potential of RFF in wireless communication of IoT devices to augment the cybersecurity of smart grids. The characteristics of a deep learning (DL)-aided RFF system are presented. Subsequently, a deployment framework of RFF for smart grids is presented with implementation and regulatory aspects. The article culminates with a discussion of existing challenges and potential research directions for maturation of RFF.
... Aunque definiciones como esta parecen de sentido común, en realidad existen múltiples concepciones, disensos, matices, clasificaciones y tipologías variables sobre el cibercrimen (e.g.,Brands y Van Doorn, 2021;Brar y Kumar, 2018;Ibrahim, 2016;Payne, 2020; UNODC, 2013). De igual manera, cabe pensar que este tipo de criminalidad exacerba el temor de victimización de ciertos individuos en cuanto que personas jurídicas, lo que puede añadir capas de complejidad a la comprensión y estudio del fenómeno. ...
Book
Full-text available
A pesar del incremento de las noticias y las anécdotas que confirman la presencia del cibercrimen en la sociedad salvadoreña, el miedo a esta forma de criminalidad constituye un fenómeno inexplorado en El Salvador, a pesar de ser un país que se encuentra bastante familiarizado con el estudio de la inseguridad ciudadana. Se llevó a cabo una investigación por encuesta para explorar el miedo al cibercrimen en una muestra no probabilística de 315 adultos salvadoreños. La escala de miedo al cibercrimen construida se compone de dos factores: ciberfraude e invasión a la intimidad. Algunos de los resultados principales reflejan que 20% de la muestra ha sido victimizada, 64% considera que el cibercrimen ha empeorado y temen más al cibercrimen las mujeres que los hombres. Un análisis de regresión múltiple mostró que el miedo al delito constituye el predictor principal del miedo al cibercrimen o sus dimensiones. La edad destaca en el modelo predictor de ciberfraude y ser mujer en el modelo de invasión a la intimidad. Se discute la implicación criminógena de la difuminación actual entre los mundos en línea y fuera de línea, la vulnerabilidad en función del poder adquisitivo y del género, y algunas pistas para pensar políticas públicas. Despite the increase in news and anecdotes confirming the presence of cybercrime in Salvadoran society, fear of this form of criminality constitutes an unexplored phenomenon in El Salvador, despite being a country that is quite familiar with the study of citizen insecurity. A survey research was conducted to explore the fear of cybercrime in a non-probabilistic sample of 315 Salvadoran adults. The fear of cybercrime scale constructed is composed of two factors: cyberfraud and invasion of privacy. Some of the main results reflect that 20% of the sample has been victimized, 64% consider that cybercrime has worsened, and women fear cybercrime more than men. A multiple regression analysis showed that fear of crime is the main predictor of fear of cybercrime or its dimensions. Age stands out in the predictor model of cyberfraud and being female in the model of invasion of privacy. The criminogenic implication of the current blurring between the online and offline worlds, vulnerability according to purchasing power and gender, and some clues for public policy thinking are discussed.
... Depending on their specific aims, online harm taxonomies offer different approaches to distinguish between the "types" of harm that exist. While technical taxonomies of online harm often focus on the specific factors which can lead to harm-such as technical vulnerabilities [30], perpetrator intentions [31], or methods used to inflict harm [11]-social science taxonomies foreground broader social impacts or dimensions of harm e.g., [1,43,50]. For example, Livingstone et al. [43] propose four general "motivations" of online harm-aggressive, sexual, value-based, and commercial harms, whereas O'Connell and Bryce [50] suggest five "themes" of harm-information, human interaction, health/body/spirit, sex education/recreation and communication, and activities harms. ...
Preprint
Full-text available
The phrase "online harms" has emerged in recent years out of a growing political willingness to address the ethical and social issues associated with the use of the Internet and digital technology at large. The broad landscape that surrounds online harms gathers a multitude of disciplinary, sectoral and organizational efforts while raising myriad challenges and opportunities for the crossing entrenched boundaries. In this paper we draw lessons from a journey of co-creating a transdisciplinary knowledge infrastructure within a large research initiative animated by the online harms agenda. We begin with a reflection of the implications of mapping, taxonomizing and constructing knowledge infrastructures and a brief review of how online harm and adjacent themes have been theorized and classified in the literature to date. Grounded on our own experience of co-creating a map of online harms, we then argue that the map -- and the process of mapping -- perform three mutually constitutive functions, acting simultaneously as method, medium and provocation. We draw lessons from how an open-ended approach to mapping, despite not guaranteeing consensus, can foster productive debate and collaboration in ethically and politically fraught areas of research. We end with a call for CSCW research to surface and engage with the multiple temporalities, social lives and political sensibilities of knowledge infrastructures.
... Availability is also a type of security service that ensures that only authorised individuals have access to systems and devices. To protect, data, cryptography and encryption techniques are widely used in network security protocols [6][7][8]; the data was encrypted, and it can only be decrypted with a compatible key. ...
Article
Full-text available
Network security protocols are implemented to address network security challenges. Computer networks and applications have advanced and developed significantly in recent years, but consumers ‘excitement for network technology and high‐tech devices has been dampened by continual exposure to data security vulnerabilities. As of now, some individuals refuse to use smart devices due to concerns about the authenticity, confidentiality and integrity of data security leaks. This not only prompts Internet service providers to follow market protection mechanisms but also requires software developers to apply appropriate security protocols to protect computer network security. These applications’ dependability and integrity are dependent not just on the effectiveness of cryptographic algorithms, but also on key management protocols. Understanding network security protocols and implementing high‐quality standards to govern the transmission of data in the network are critical components of guaranteeing network security. The article explores data security, primarily at the application layer, various attack methods for different network security protocols and highlights the potential security implications. The study also looks at the corresponding, practical security measures and future research prospects for certain kinds of attacks. Finally, some technical challenges that remain unsolved at the time of writing are summarised, and future trends in cybersecurity are discussed.
... Smart microgrids are a major target of cyberattacks that can be typically clustered into three distinct types of attack classification [31,[46][47][48][49][50][51]: ...
... Smart microgrids are a major target of cyberattacks that can be typically clustered into three distinct types of attack classification [31,[46][47][48][49][50][51] This section seeks to provide a general overview and description of the main types of cyberattacks currently identified in the literature, Figure 3. The reader interested in a detailed analysis for each cyberattack is kindly referred to the reference works cited in each subsection. ...
... A variant of DoS attacks is denoted as a distributed denial-of-service (DDoS) attack. A DDoS consists of a distributed attack coordinated by an attacker who acts as the "Attacker-in-Chief" or several bots that attack the target and make the network resources unavailable to the user [50,[52][53][54][55][56][57]. The DDoS attack is considered one of the most destructive network attacks [56]. ...
Article
Full-text available
The current energy transition combined with the modernization of power systems has provided meaningful transformations in the transmission, distribution, operation, planning, monitoring, and control of power systems. These advancements are heavily dependent on the employment of new computing and communications technologies, which, combined with traditional physical systems, lead to the emergence of cyber–physical systems (CPSs). In this sense, besides the traditional challenges of keeping a reliable, affordable, and safe power grid, one must now deal with the new vulnerabilities to cyberattacks that emerge with the advancement of CPSs. Aware of this perspective and the severity of the ongoing challenges faced by the industry due to cyberattacks, this paper aims to provide a comprehensive survey of the literature on cybersecurity in cyber–physical power systems. For this, clear definitions, historical timelines, and classifications of the main types of cyberattacks, including the concepts, architectures, and basic components that make up, as well as the vulnerabilities in managing, controlling, and protecting, a CPS are presented. Furthermore, this paper presents defense strategies and future trends for cybersecurity. To conduct this study, a careful search was made in relevant academic and industrial databases, leading to a detailed reporting of key works focused on mitigating cyberattacks and ensuring the cybersecurity of modern CPSs. Finally, the paper presents some standards and regulations that technical and international institutions on cybersecurity in smart grids have created.
... If a customer does not discard a receipt or bill and the information is passed on to the hacker, he can manipulate the information easier to create fake messages, and emails, or obtain crucial information about the organization. Classification of Cyber-attack [11,12]. ...
Article
Full-text available
The incorporation of communication technology with Smart Grid (SG) is proposed as an optimal solution to fulfill the requirements of the modern power system. A smart grid integrates multiple energy sources or microgrids and is supported by an extensive control and communication network using the Internet of Things (IoT) for a carbon-free, more reliable, and intelligent energy system. Along with many benefits, the system faces novel security challenges, data management, integration, and interoperability challenges. The advanced control and communication network in the smart grid is susceptible to cyber and cyber-physical threats. A lot of research has been done to improve the cyber security of the smart grid. This review aims to provide an overview of the types of cyber security threats present for smart grids with an insight into strategies to overcome the challenges. As the selection of techniques and technologies may vary according to the threats faced, therefore the adoption of researched methods is compared and discussed. As cyber-security is the greatest challenge in smart grid implementation, this review is beneficial during the planning and operation of smart grids for enhanced security.
... long with the well-known increasing demands on capacity and reach performance in long-haul, high speed optical fibre communications, improving data security has also attracted a lot of attention recently, especially as cybercrime activities are increasing [1]. The conventional way to realize secure communications is to apply complex digital cryptographic algorithms in the upper network layers [2]. However, securing information by software encryption is rapidly becoming an ineffective method to achieve secure optical communications networks, due to the rapid development in the power of quantum computers, this is This work was supported by The DSP Centre and has been part-funded by the European Regional Development Fund through the Welsh Government and by the North Wales Growth Deal through Ambition North Wales, Welsh Government and UK Government (Corresponding author: R. P. Giddings). ...
Article
Full-text available
A novel digital signal processing (DSP)-based scheme for physical layer security in coherent optical communication systems is proposed and numerically investigated. The optical layer signal encryption is accomplished by two dispersive elements and one phase modulator (PM) driven by a DSP-generated encryption key, whilst signal decryption uses similar components but with inverted dispersion values and security keys. A critical aspect of the DSP-based physical layer security is that the security keys, driving the PMs to hide/recover the data signals, must be highly unpredictable and noise-like, thus orthogonal frequency division multiplexing (OFDM) signals are employed as they possess these characteristics, they can also be easily generated and cover a suitably wide range of unique keys. Numerical simulations are conducted to determine optimum system parameters for achieving a high level of security, the key parameters requiring optimization are the dispersion of the dispersive elements and the bandwidth of the security keys. Using these determined optimum parameters, in-depth investigations are undertaken of encryption/decryption induced transmission performance penalties, sensitives to various parameter offsets and operation over various transmission distances. To observe any data signal dependencies, various performance metrics are investigated for different combinations of modulation formats (DQPSK and 16QAM) and baud rates (40Gbaud and 100Gbaud) for the transmitted data signals. The proposed DSP-based physical layer security scheme is shown to have the potential to achieve, in a low-cost and highly effective manner, a high level of physical layer security with acceptable performance penalties for existing coherent optical communication systems.