A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions
Internet usage has grown exponentially, with individuals and companies performing multiple daily transactions in cyberspace rather than in the real world. The coronavirus (COVID-19) pandemic has accelerated this process. As a result of the widespread usage of the digital environment, traditional cri...
Gespeichert in:
Veröffentlicht in: | Electronics (Basel) 2023-03, Vol.12 (6), p.1333 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | 6 |
container_start_page | 1333 |
container_title | Electronics (Basel) |
container_volume | 12 |
creator | Aslan, Ömer Aktuğ, Semih Serkant Ozkan-Okay, Merve Yilmaz, Abdullah Asim Akin, Erdal |
description | Internet usage has grown exponentially, with individuals and companies performing multiple daily transactions in cyberspace rather than in the real world. The coronavirus (COVID-19) pandemic has accelerated this process. As a result of the widespread usage of the digital environment, traditional crimes have also shifted to the digital space. Emerging technologies such as cloud computing, the Internet of Things (IoT), social media, wireless communication, and cryptocurrencies are raising security concerns in cyberspace. Recently, cyber criminals have started to use cyber attacks as a service to automate attacks and leverage their impact. Attackers exploit vulnerabilities that exist in hardware, software, and communication layers. Various types of cyber attacks include distributed denial of service (DDoS), phishing, man-in-the-middle, password, remote, privilege escalation, and malware. Due to new-generation attacks and evasion techniques, traditional protection systems such as firewalls, intrusion detection systems, antivirus software, access control lists, etc., are no longer effective in detecting these sophisticated attacks. Therefore, there is an urgent need to find innovative and more feasible solutions to prevent cyber attacks. The paper first extensively explains the main reasons for cyber attacks. Then, it reviews the most recent attacks, attack patterns, and detection techniques. Thirdly, the article discusses contemporary technical and nontechnical solutions for recognizing attacks in advance. Using trending technologies such as machine learning, deep learning, cloud platforms, big data, and blockchain can be a promising solution for current and future cyber attacks. These technological solutions may assist in detecting malware, intrusion detection, spam identification, DNS attack classification, fraud detection, recognizing hidden channels, and distinguishing advanced persistent threats. However, some promising solutions, especially machine learning and deep learning, are not resistant to evasion techniques, which must be considered when proposing solutions against intelligent cyber attacks. |
doi_str_mv | 10.3390/electronics12061333 |
format | Article |
fullrecord | <record><control><sourceid>gale_proqu</sourceid><recordid>TN_cdi_proquest_journals_2791606486</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A743763484</galeid><sourcerecordid>A743763484</sourcerecordid><originalsourceid>FETCH-LOGICAL-c350t-eff18240687bc157bea4385253bf67ed94d09cb1ebab4ee139904b7ebb1116db3</originalsourceid><addsrcrecordid>eNptkM9LwzAYhoMoOOb-Ai8Fr1aTJk2aYyn-goHgpuCpJOlXl9k1M0kn---tTNCD7-V7Dg_fCy9C5wRfUSrxNXRgone9NYFkmBNK6RGaZFjIVGYyO_7Dp2gWwhqPkYQWFE_Qa5lUbrP1sII-2B0kT7Cz8Jm4Nqn2GnyyADN4G_fJy9D14JW2nY0WwmWyXHlQcYQyRmXeR1B9kyxcN0Tr-nCGTlrVBZj93Cl6vr1ZVvfp_PHuoSrnqaE5jim0LSkyhnkhtCG50KAYLfIsp7rlAhrJGiyNJqCVZgCESomZFqA1IYQ3mk7RxeHv1ruPAUKs127w_VhZZ0ISjjkr-K_1pjqobd-66JXZ2GDqUjAqOGUFGy16sIx3IXho6623G-X3NcH199j1P2PTL6RWdM4</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2791606486</pqid></control><display><type>article</type><title>A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions</title><source>MDPI - Multidisciplinary Digital Publishing Institute</source><source>EZB-FREE-00999 freely available EZB journals</source><creator>Aslan, Ömer ; Aktuğ, Semih Serkant ; Ozkan-Okay, Merve ; Yilmaz, Abdullah Asim ; Akin, Erdal</creator><creatorcontrib>Aslan, Ömer ; Aktuğ, Semih Serkant ; Ozkan-Okay, Merve ; Yilmaz, Abdullah Asim ; Akin, Erdal</creatorcontrib><description>Internet usage has grown exponentially, with individuals and companies performing multiple daily transactions in cyberspace rather than in the real world. The coronavirus (COVID-19) pandemic has accelerated this process. As a result of the widespread usage of the digital environment, traditional crimes have also shifted to the digital space. Emerging technologies such as cloud computing, the Internet of Things (IoT), social media, wireless communication, and cryptocurrencies are raising security concerns in cyberspace. Recently, cyber criminals have started to use cyber attacks as a service to automate attacks and leverage their impact. Attackers exploit vulnerabilities that exist in hardware, software, and communication layers. Various types of cyber attacks include distributed denial of service (DDoS), phishing, man-in-the-middle, password, remote, privilege escalation, and malware. Due to new-generation attacks and evasion techniques, traditional protection systems such as firewalls, intrusion detection systems, antivirus software, access control lists, etc., are no longer effective in detecting these sophisticated attacks. Therefore, there is an urgent need to find innovative and more feasible solutions to prevent cyber attacks. The paper first extensively explains the main reasons for cyber attacks. Then, it reviews the most recent attacks, attack patterns, and detection techniques. Thirdly, the article discusses contemporary technical and nontechnical solutions for recognizing attacks in advance. Using trending technologies such as machine learning, deep learning, cloud platforms, big data, and blockchain can be a promising solution for current and future cyber attacks. These technological solutions may assist in detecting malware, intrusion detection, spam identification, DNS attack classification, fraud detection, recognizing hidden channels, and distinguishing advanced persistent threats. However, some promising solutions, especially machine learning and deep learning, are not resistant to evasion techniques, which must be considered when proposing solutions against intelligent cyber attacks.</description><identifier>ISSN: 2079-9292</identifier><identifier>EISSN: 2079-9292</identifier><identifier>DOI: 10.3390/electronics12061333</identifier><language>eng</language><publisher>Basel: MDPI AG</publisher><subject>Access control ; Anti-virus software ; Cloud computing ; Communication ; Computer crimes ; Computer networks ; Computers ; Confidentiality ; Crime ; Cryptography ; Cybercrime ; Cybersecurity ; Data encryption ; Data integrity ; Data security ; Deep learning ; Denial of service attacks ; Digital currencies ; Fraud ; Global economy ; Information systems ; Internet ; Internet of Things ; Intrusion detection systems ; Machine learning ; Malware ; Methods ; Network security ; New technology ; Phishing ; Prevention ; Safety and security measures ; Security programs ; Software ; State government ; System effectiveness ; Wireless communications</subject><ispartof>Electronics (Basel), 2023-03, Vol.12 (6), p.1333</ispartof><rights>COPYRIGHT 2023 MDPI AG</rights><rights>2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c350t-eff18240687bc157bea4385253bf67ed94d09cb1ebab4ee139904b7ebb1116db3</citedby><cites>FETCH-LOGICAL-c350t-eff18240687bc157bea4385253bf67ed94d09cb1ebab4ee139904b7ebb1116db3</cites><orcidid>0000-0003-0737-1966 ; 0000-0002-3014-609X ; 0000-0002-2223-3927 ; 0000-0002-1071-2541</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><creatorcontrib>Aslan, Ömer</creatorcontrib><creatorcontrib>Aktuğ, Semih Serkant</creatorcontrib><creatorcontrib>Ozkan-Okay, Merve</creatorcontrib><creatorcontrib>Yilmaz, Abdullah Asim</creatorcontrib><creatorcontrib>Akin, Erdal</creatorcontrib><title>A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions</title><title>Electronics (Basel)</title><description>Internet usage has grown exponentially, with individuals and companies performing multiple daily transactions in cyberspace rather than in the real world. The coronavirus (COVID-19) pandemic has accelerated this process. As a result of the widespread usage of the digital environment, traditional crimes have also shifted to the digital space. Emerging technologies such as cloud computing, the Internet of Things (IoT), social media, wireless communication, and cryptocurrencies are raising security concerns in cyberspace. Recently, cyber criminals have started to use cyber attacks as a service to automate attacks and leverage their impact. Attackers exploit vulnerabilities that exist in hardware, software, and communication layers. Various types of cyber attacks include distributed denial of service (DDoS), phishing, man-in-the-middle, password, remote, privilege escalation, and malware. Due to new-generation attacks and evasion techniques, traditional protection systems such as firewalls, intrusion detection systems, antivirus software, access control lists, etc., are no longer effective in detecting these sophisticated attacks. Therefore, there is an urgent need to find innovative and more feasible solutions to prevent cyber attacks. The paper first extensively explains the main reasons for cyber attacks. Then, it reviews the most recent attacks, attack patterns, and detection techniques. Thirdly, the article discusses contemporary technical and nontechnical solutions for recognizing attacks in advance. Using trending technologies such as machine learning, deep learning, cloud platforms, big data, and blockchain can be a promising solution for current and future cyber attacks. These technological solutions may assist in detecting malware, intrusion detection, spam identification, DNS attack classification, fraud detection, recognizing hidden channels, and distinguishing advanced persistent threats. However, some promising solutions, especially machine learning and deep learning, are not resistant to evasion techniques, which must be considered when proposing solutions against intelligent cyber attacks.</description><subject>Access control</subject><subject>Anti-virus software</subject><subject>Cloud computing</subject><subject>Communication</subject><subject>Computer crimes</subject><subject>Computer networks</subject><subject>Computers</subject><subject>Confidentiality</subject><subject>Crime</subject><subject>Cryptography</subject><subject>Cybercrime</subject><subject>Cybersecurity</subject><subject>Data encryption</subject><subject>Data integrity</subject><subject>Data security</subject><subject>Deep learning</subject><subject>Denial of service attacks</subject><subject>Digital currencies</subject><subject>Fraud</subject><subject>Global economy</subject><subject>Information systems</subject><subject>Internet</subject><subject>Internet of Things</subject><subject>Intrusion detection systems</subject><subject>Machine learning</subject><subject>Malware</subject><subject>Methods</subject><subject>Network security</subject><subject>New technology</subject><subject>Phishing</subject><subject>Prevention</subject><subject>Safety and security measures</subject><subject>Security programs</subject><subject>Software</subject><subject>State government</subject><subject>System effectiveness</subject><subject>Wireless communications</subject><issn>2079-9292</issn><issn>2079-9292</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><recordid>eNptkM9LwzAYhoMoOOb-Ai8Fr1aTJk2aYyn-goHgpuCpJOlXl9k1M0kn---tTNCD7-V7Dg_fCy9C5wRfUSrxNXRgone9NYFkmBNK6RGaZFjIVGYyO_7Dp2gWwhqPkYQWFE_Qa5lUbrP1sII-2B0kT7Cz8Jm4Nqn2GnyyADN4G_fJy9D14JW2nY0WwmWyXHlQcYQyRmXeR1B9kyxcN0Tr-nCGTlrVBZj93Cl6vr1ZVvfp_PHuoSrnqaE5jim0LSkyhnkhtCG50KAYLfIsp7rlAhrJGiyNJqCVZgCESomZFqA1IYQ3mk7RxeHv1ruPAUKs127w_VhZZ0ISjjkr-K_1pjqobd-66JXZ2GDqUjAqOGUFGy16sIx3IXho6623G-X3NcH199j1P2PTL6RWdM4</recordid><startdate>20230301</startdate><enddate>20230301</enddate><creator>Aslan, Ömer</creator><creator>Aktuğ, Semih Serkant</creator><creator>Ozkan-Okay, Merve</creator><creator>Yilmaz, Abdullah Asim</creator><creator>Akin, Erdal</creator><general>MDPI AG</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>COVID</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>L7M</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><orcidid>https://orcid.org/0000-0003-0737-1966</orcidid><orcidid>https://orcid.org/0000-0002-3014-609X</orcidid><orcidid>https://orcid.org/0000-0002-2223-3927</orcidid><orcidid>https://orcid.org/0000-0002-1071-2541</orcidid></search><sort><creationdate>20230301</creationdate><title>A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions</title><author>Aslan, Ömer ; Aktuğ, Semih Serkant ; Ozkan-Okay, Merve ; Yilmaz, Abdullah Asim ; Akin, Erdal</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c350t-eff18240687bc157bea4385253bf67ed94d09cb1ebab4ee139904b7ebb1116db3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Access control</topic><topic>Anti-virus software</topic><topic>Cloud computing</topic><topic>Communication</topic><topic>Computer crimes</topic><topic>Computer networks</topic><topic>Computers</topic><topic>Confidentiality</topic><topic>Crime</topic><topic>Cryptography</topic><topic>Cybercrime</topic><topic>Cybersecurity</topic><topic>Data encryption</topic><topic>Data integrity</topic><topic>Data security</topic><topic>Deep learning</topic><topic>Denial of service attacks</topic><topic>Digital currencies</topic><topic>Fraud</topic><topic>Global economy</topic><topic>Information systems</topic><topic>Internet</topic><topic>Internet of Things</topic><topic>Intrusion detection systems</topic><topic>Machine learning</topic><topic>Malware</topic><topic>Methods</topic><topic>Network security</topic><topic>New technology</topic><topic>Phishing</topic><topic>Prevention</topic><topic>Safety and security measures</topic><topic>Security programs</topic><topic>Software</topic><topic>State government</topic><topic>System effectiveness</topic><topic>Wireless communications</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Aslan, Ömer</creatorcontrib><creatorcontrib>Aktuğ, Semih Serkant</creatorcontrib><creatorcontrib>Ozkan-Okay, Merve</creatorcontrib><creatorcontrib>Yilmaz, Abdullah Asim</creatorcontrib><creatorcontrib>Akin, Erdal</creatorcontrib><collection>CrossRef</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>Coronavirus Research Database</collection><collection>ProQuest Central Korea</collection><collection>SciTech Premium Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><jtitle>Electronics (Basel)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Aslan, Ömer</au><au>Aktuğ, Semih Serkant</au><au>Ozkan-Okay, Merve</au><au>Yilmaz, Abdullah Asim</au><au>Akin, Erdal</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions</atitle><jtitle>Electronics (Basel)</jtitle><date>2023-03-01</date><risdate>2023</risdate><volume>12</volume><issue>6</issue><spage>1333</spage><pages>1333-</pages><issn>2079-9292</issn><eissn>2079-9292</eissn><abstract>Internet usage has grown exponentially, with individuals and companies performing multiple daily transactions in cyberspace rather than in the real world. The coronavirus (COVID-19) pandemic has accelerated this process. As a result of the widespread usage of the digital environment, traditional crimes have also shifted to the digital space. Emerging technologies such as cloud computing, the Internet of Things (IoT), social media, wireless communication, and cryptocurrencies are raising security concerns in cyberspace. Recently, cyber criminals have started to use cyber attacks as a service to automate attacks and leverage their impact. Attackers exploit vulnerabilities that exist in hardware, software, and communication layers. Various types of cyber attacks include distributed denial of service (DDoS), phishing, man-in-the-middle, password, remote, privilege escalation, and malware. Due to new-generation attacks and evasion techniques, traditional protection systems such as firewalls, intrusion detection systems, antivirus software, access control lists, etc., are no longer effective in detecting these sophisticated attacks. Therefore, there is an urgent need to find innovative and more feasible solutions to prevent cyber attacks. The paper first extensively explains the main reasons for cyber attacks. Then, it reviews the most recent attacks, attack patterns, and detection techniques. Thirdly, the article discusses contemporary technical and nontechnical solutions for recognizing attacks in advance. Using trending technologies such as machine learning, deep learning, cloud platforms, big data, and blockchain can be a promising solution for current and future cyber attacks. These technological solutions may assist in detecting malware, intrusion detection, spam identification, DNS attack classification, fraud detection, recognizing hidden channels, and distinguishing advanced persistent threats. However, some promising solutions, especially machine learning and deep learning, are not resistant to evasion techniques, which must be considered when proposing solutions against intelligent cyber attacks.</abstract><cop>Basel</cop><pub>MDPI AG</pub><doi>10.3390/electronics12061333</doi><orcidid>https://orcid.org/0000-0003-0737-1966</orcidid><orcidid>https://orcid.org/0000-0002-3014-609X</orcidid><orcidid>https://orcid.org/0000-0002-2223-3927</orcidid><orcidid>https://orcid.org/0000-0002-1071-2541</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2079-9292 |
ispartof | Electronics (Basel), 2023-03, Vol.12 (6), p.1333 |
issn | 2079-9292 2079-9292 |
language | eng |
recordid | cdi_proquest_journals_2791606486 |
source | MDPI - Multidisciplinary Digital Publishing Institute; EZB-FREE-00999 freely available EZB journals |
subjects | Access control Anti-virus software Cloud computing Communication Computer crimes Computer networks Computers Confidentiality Crime Cryptography Cybercrime Cybersecurity Data encryption Data integrity Data security Deep learning Denial of service attacks Digital currencies Fraud Global economy Information systems Internet Internet of Things Intrusion detection systems Machine learning Malware Methods Network security New technology Phishing Prevention Safety and security measures Security programs Software State government System effectiveness Wireless communications |
title | A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-15T14%3A43%3A35IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_proqu&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Comprehensive%20Review%20of%20Cyber%20Security%20Vulnerabilities,%20Threats,%20Attacks,%20and%20Solutions&rft.jtitle=Electronics%20(Basel)&rft.au=Aslan,%20%C3%96mer&rft.date=2023-03-01&rft.volume=12&rft.issue=6&rft.spage=1333&rft.pages=1333-&rft.issn=2079-9292&rft.eissn=2079-9292&rft_id=info:doi/10.3390/electronics12061333&rft_dat=%3Cgale_proqu%3EA743763484%3C/gale_proqu%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2791606486&rft_id=info:pmid/&rft_galeid=A743763484&rfr_iscdi=true |