Abstract
In this short research, cyber-attack and the well-known attacking methods are discussed. Moreover, how many attacks were made in 2021 compared to the attacks in the previous year is found, to determine how fast this malicious activity is growing and the reasons which motivate such cyber-attacks are studied. The risk measurement methods are also discussed in this article based on some previous research. The conclusions are made on the suitable solution for cyber-attack, reviewed based on the point of view of different research.
References
- Vladimir Marbukh (2021). Towards Robust Security Risk Metrics for Networked Systems: Work in Progress. International symposium on integrated network management (IEEE), 658-661
- Sunil. C. Pawar, Dr. R. S. Mente & Bapu. D. Chendage (2021). Cyber Crime, Cyber Space and Effects of Cyber Crime. International Journal of scientific Research in computer science engineering and information technology (IJSRCSEIT), 7(1), 210-214
- Varsha P.Desai Assistant Professor, Dr.K.S.Oza Assistant Professor, Dr.P.G.Naik Professor (2021). Data Mining Approach for Cyber Security. International journal of computer applications technology and research (IJCATR), 10(01), 035-041
- Mugunthan, S. R. (2019). Soft computing based autonomous low rate DDOS attack detection and security for cloud computing. J. Soft Comput. Paradig (JSCP), 1(02), 80-90
- Vivekanandam, B (2021). Design an Adaptive Hybrid Approach for Genetic Algorithm to Detect Effective Malware Detection in Android Division. Journal of Ubiquitous Computing and Communication Technologies, 3(2), 135-149
- Kirubakaran, S. Stewart (2020). Study of Security Mechanisms to Create a Secure Cloud in a Virtual Environment with the Support of Cloud Service Providers. Journal of trends in Computer Science and Smart technology (TCSST), 2(03), 148-154
- Manoharan, J. Samuel (2021). A Novel User Layer Cloud Security Model based on Chaotic Arnold Transformation using Fingerprint Biometric Traits. Journal of Innovative Image Processing (JIIP), 3, 36-51
- Joe, C. Vijesh, and Jennifer S. Raj (2021). Deniable Authentication Encryption for Privacy Protection using Blockchain. Journal of Artificial Intelligence and Capsule Networks, 3(3), 259-271
- Jambhale, Tejas, and M. Sudha (2020/2021). A Privacy Preserving Hybrid Neural-Crypto Computing-Based Image Steganography for Medical Images. In Intelligent Data Communication Technologies and Internet of Things: Proceedings of (ICICI), 57, 277-290
- Gautam, Apurv Singh, Yamini Gahlot, and Pooja Kamat (2019). Hacker forum exploit and classification for proactive cyber threat intelligence. In International Conference on Inventive Computation Technologies, 98, 279-285
- Banu, S. Aashiq, M. S. Sucharita, Y. Leela Soundarya, Lankipalli Nithya, R. Dhivya, and Amirtharajan Rengarajan (2021). Robust Image Encryption in Transform Domain Using Duo Chaotic Maps—A Secure Communication. In Evolutionary Computing and Mobile Sustainable Networks, 271-281
- Saroja Roy Grandhi, Priyanka Kacker (2020). Cybercrime Investigation through BEOS profiling. A global journal of interdisciplinary studies (ISSN), 3(2), 67-72
- Reghav Gupta (2021). Effects of Cybercrime in Real Word. International Journal of Research in Science and technology (IJRST), 11(3), 42-48
- Rincy Raphael (2019). Various data mining techniques to detect the android malware application: a case study. International journal of new technology and research (IJNTR), 5(6), 65-72
- Rupali Komatwar, Manesh Kokare (2020). A survey on malware detection and classification. Journal of Applied Security Research (JASR), 16(12), 1-31.
