banner image

recent posts

banner image

Developing Pressures in Cybersecurity

cyber security

The exponential growth of the Internet interconnections has led to some significant expansion of cyber-attack incidents often with disastrous and grievous consequences. Malware is the primary choice of weapon to perform malicious intents in the cyberspace, either by exploitation into present vulnerabilities or use of special features of emerging technologies. The development of more innovative and efficient malware defense mechanisms has been regarded as a pressing requirement in the cybersecurity community. This can be followed by critiques of existing innovative reduction techniques as to why they do or do not do the job. We then share new attack patterns in emerging technologies like sociable websites, cloud computing, smartphone technologies, and critical infrastructure. Finally, we clarify our speculative observations on potential research directions.


INTRODUCTION:


Our society, economy, and critical infrastructures are very Largely dependent on computer networks and information technology options. Cybersecurity becomes more appealing and potentially more disastrous as our dependence on information technology increases. According to the Symantec cybercrime report printed in April 2012, cyber-attacks cost US$114 billion each year. In the event the time dropped by companies hoping to recover from cyber-attacks is counted, the total cost of cyber-attacks would attain a staggering US$385 billion. Victims of cyber-attacks are also significantly growing. Based on the survey conducted by Symantec that entailed interviewing 20,000 individuals across 24 countries, 69% reported being the victim of a cyber-attack within their lifetime. Symantec calculated that 14 adults become the casualty of a cyber-attack every second, or more than one million strikes every day.

Why cyber Security flourish? It is because cyber-attacks are more economical, convenient and less insecure than physical attacks. Cybercriminals only require a few expenses beyond a computer and an Internet connection. They are unconstrained by geography and distance. They're difficult to identity and prosecute due to the anonymous nature of the Internet. Given that attacks against information technology systems are extremely appealing, it's anticipated that the amount and sophistication of cyber-attacks will continue growing.

Cybersecurity concerns with the understanding of encompassing issues of diverse cyber-attacks and inventing defense strategies (i.e., countermeasures) that maintain confidentiality, integrity and availability of any digital and information technology.

Integrity is the term used to prevent some modification/deletion in an unauthorized manner.

Availability is the term used to assure that the systems responsible for delivering, storing and processing information are accessible when needed and by people who want them.

Many cybersecurity specialists Consider that malware is the secret selection of weapon to carry out malicious intends to breach cybersecurity efforts in cyberspace. Malware refers to a wide class of attacks that is packed on a system, normally without the understanding of the legitimate owner, to undermine the machine to the benefit of an adversary. Malware infects systems in many different manners for example propagation from infected machines, tricking user to start tainted files, or users that are alluring to visit malware propagating websites. In more concrete cases of malware infection, malware may load itself on a USB drive inserted into an infected apparatus and then infect every other system into that device is subsequently inserted. Malware may propagate from devices and equipment's that contain embedded systems and computational logic. Victims of malware can vary anything from end-user systems, servers, network devices (i.e., routers, switches, etc.) and process control systems like Supervisory Control and Data Acquisition (SCADA). The proliferation and sophistication of rapid growing amount of malware is a significant concern in the online today.

Traditionally, Malware attacks happened at a single point of surface among hardware gear's, applications pieces or at network level exploiting existing design and implementation vulnerabilities at every layer. As opposed to protecting each asset, the perimeter defense strategy was used predominantly to set a wall out all inner resources to protect everything indoors from any unwanted intrusion from outside. Nearly all perimeter defense mechanisms utilizes firewall and anti-virus software installed within intrusion prevention/detection systems. Any traffic coming from outside is intercepted and examined to make sure there is no malware penetrating into the interior resources. The general acceptance of the perimeter defense version has happened as it is far simpler and apparently less expensive to secure 1 perimeter than it is to secure tens of thousands of applications or a large number of internal components. To give more defined access to specific internal resources, the access control mechanisms are used in conjunction with the perimeter defense mechanism. On top of perimeter protection and access management, liability is added to identify or punish for any misbehaviors, as reflected. On the other hand, the joint efforts of perimeter defense plan have been proven to be increasingly ineffective as the advancement and sophistication of malware improves. Ever evolving malware constantly appears to find loopholes to skip the perimeter defense altogether. We describe in detail the most common exploitations in the 3 distinct layers of present information system at hardware, software and network layers. We then discuss the advantages and disadvantages of their most representative defense mechanisms which have been utilized in these layers.

Malware evolves through time capitalizing on New approaches and harnessing the flaws from the emerging technology to prevent detection. We describe a range of new designs of malware attacks existing from emerging technologies. In picking emerging technologies for illustration, we focus a few which have changed how we live our everyday life. These include social media, cloud computing, smartphone technology, and critical infrastructure. We discuss unique characteristics of each of these emerging technologies and malware utilizes the special characteristics to interrogate itself. By way of instance, social networking, such as social networking sites and blogs, are now an integral part of our life style due to the fact that a lot of people are journaling about their lifestyle events, sharing information, in addition to making friends. Realizing its potential to connect millions individuals at one go, adversaries use social networking accounts to befriend unsuspecting customers to use as vehicles for sending spam to the victim's buddies while the victim's device is repurposed into a part of botnet.

Usage of computer resources like utilities where the consumers pay only for the usage without having to set up any upfront expense or requiring any abilities in handling complex computing infrastructure. The growing trove of information focused in the cloud storage solutions is currently attracting attackers. Together with the exposed growth by two billion smartphone users by 2015, a significant expansion in mobile malware has been witnessed in recent times. By way of instance, the number of special detections of malware for Android improved internationally by 17 times in 2012 from the previous year. There is also growing concerns in cyber threats to critical infrastructure like electricity grids and healthcare systems to use in terrorism, sabotage and information warfare. Aside from investigating exploitations through unique attributes from the selected emerging technologies, we also discuss general malware attack patterns appear in them to comprehend the methods and trends of the new strikes.

Finally, we provide Our speculative observations as to where future research directions are heading. These include: 

(1) privacy issues to protect increasing volumes of personal information entered in the worldwide web, 

(2) The necessity to have a new generation of secure Internet from scratch with attentive thought of their subjected growth and usage patterns that were not true with the net we use today, 

(3) Trusted system whose basic architecture differs from their beginning to withstand from ever-evolving malware, 

(4) being able to identify and trace the source of attacks assisted by the evolution of international scale identity management system and traceback processes, and 

(5) a strong emphasis on usable security to provide individuals security controls they can understand and control.

The Rest of the article Section Gives an insight of this malware. The section provides an overview And efforts to mitigate any current vulnerabilities exploited by adversaries. Section reviews emerging approaches to malware infiltration and discuss the overall attack Patterns and methods. The section discusses future research Instructions we identified; this will probably be accompanied by concluding comments in Section.

Get Bitdefender VPN Antivirus


Developing Pressures in Cybersecurity Developing Pressures in Cybersecurity Reviewed by Web Tech Land on 10:52 PM Rating: 5

No comments:

top navigation

Powered by Blogger.