Title
CLASSIFICATION OF CYBER ATTACK
Abstract
As there are many types of cyber attacks. In this paper, a literature is given on the new classification of cyber attacks. Recent developments in the fields of networking and cyberspace have greatly benefited mankind, but the rapid growth of cyberspace has also contributed to unethical practices by individuals who are bent on using the technology to exploit others. There has been a dearth of knowledge about these attacks which has rendered many individuals/agencies/organizations vulnerable to these attacks [1]. Hence there is a need to have comprehensive understanding of cyber attacks and its classification. The purpose of this survey is to do a comprehensive study of these attacks in order to create awareness about the various types of attacks and their mode of action so that appropriate defense measures can be initiated against such attacks. Ever since the industrial revolution various new technologies have been developed which have contributed to the improvement of lifestyle [2]. The most recent development in the field of technology since the 1980’s is the use of computers. Computers have refined from bulky, complex machines to user friendly and interactive machines which could be used by any person [3]. Cyber space has gradually permeated all aspects of human life such as Banking, Hospitals, Education, Emergency services and Military. The complexity has also been increasing [4]. Such threats are called cyber attacks. The nature, complexity and severity of these attacks are increasing over a period of time [5]. At present there is a relative lack of understanding about the various types of attacks, their mod of spread and their relative severity which has rendered many organization/ countries vulnerable to such attacks. The study attempts to classify the attacks based of various characteristics such as severity, purpose, legality in order to provide an understanding of the motivation behind such attacks which may allow programmers to develop security devices and mechanisms based on the mode of attack [6].
The World Economic Forum has established cyber-attacks as a global risk within its 2013 Global Risk report [7]. Previous taxonomies lack the ability to show temporal and causal relationships to display the evolution of cyber related attacks. I propose cyber cyber attack taxonomy, as a solution addressing the deficiency in existing taxonomies.
Key Words
Cyber space, cyber-attacks, Buffer overflow, fgets(),fputs().
Cite This Article
"CLASSIFICATION OF CYBER ATTACK", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.6, Issue 6, page no.723-728, June 2019, Available :
http://www.jetir.org/papers/JETIR1908901.pdf
ISSN
2349-5162 | Impact Factor 7.95 Calculate by Google Scholar
An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator
Cite This Article
"CLASSIFICATION OF CYBER ATTACK", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.6, Issue 6, page no. pp723-728, June 2019, Available at : http://www.jetir.org/papers/JETIR1908901.pdf
Publication Details
Published Paper ID: JETIR1908901
Registration ID: 226869
Published In: Volume 6 | Issue 6 | Year June-2019
DOI (Digital Object Identifier):
Page No: 723-728
Country: Jabalpur, MADHYA PRADESH, India .
Area: Science & Technology
ISSN Number: 2349-5162
Download Paper / Preview Article
Preview This Article
Downlaod
Click here for Article Preview