Abstract
The article explores the changes are occurring in the security of the information and communication systems as a result of a state-of-the-art-technologies usage. The research is centered over the impact of new technologies on the cyber attack surface. The focus is on the synergy of a set of advanced technologies with existing digital environment and the consequences for cyber security particularly on the cyber attack surface extension. The study summarizes the evidences for increasing the surface area for attacks due to the advent of the listed advanced technologies. Explores how emerging technologies complicate cyber protection, introducing new risks as consequence from increasing possibilities for malicious threats. Indicate guidelines about future research related to refinement of legislation that is intended to regulate the cyber-physical world.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Agrafiotis, I., Nurse, J.R.C., Goldsmith, M., Creese, S., Upton, D.: A taxonomy of cyber-harms: defining the impacts of cyber-attacks and understanding how they propagate. J. Cybersecur. 4(1), tyy006 (2018)
Kadhim, Q.K., Yusof, R., Mahdi, H.S., Al-shami, S.S.A., Selamat, S.R.: A review study on cloud computing issues. J. Phys: Conf. Ser. 1018, 012006 (2018)
Bisong, A., Rahman, S.S.M.: An overview of the security concerns in enterprise cloud computing. Int. J. Netw. Secur. Appl. 3(1), 30–45 (2011)
Noyes, D., Liu, H., Fortier, P.: Security analysis and improvement of USB technology. In: 2016 IEEE Symposium on Technologies for Homeland Security (HST). IEEE, May 2016
Prasad, R., Rohokale, V.: Mobile device cyber security. In: Springer Series in Wireless Technology. Springer International Publishing, pp. 217–229 (2019)
Almutairy, N.M., Al-Shqeerat, K.H.A., Hamad, H.A.A.: A taxonomy of virtualization security issues in cloud computing environments. Indian J. Sci. Technol. 12(3), 1–19 (2019)
Theisen, C., Munaiah, N., Al-Zyoud, M., Carver, J.C., Meneely, A., Williams, L.: Attack surface definitions: a systematic literature review. Inf. Softw. Technol. 104, 94–103 (2018)
Attack surface, February 2019. https://whatis.techtarget.com/definition/attack-surface
Tripware: Unbalanced Security is Increasing Your Attack Surface The State of Security, March 2014. https://www.tripwire.com/state-of-security/featured/unbalanced-security-increasing-attack-surface-2
Friedman, J.: Attack your attack surface. How to reduce your exposure to cyberattacks with an attack surface visualization solution, Whitepapper, Skybox security (2016)
CISOMAG: Cybercriminals use Google Calendar alerts to steal sensitive information, June 2019. https://www.cisomag.com/cybercriminals-use-google-calendar-alerts-to-steal-sensitive-information
Shaik, A., Borgaonkar, R., Park, S., Seifert, J.-P.: On the impact of rogue base stations in 4g/LTE self organizing networks. In: Proceedings of the 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks - WiSec 2018. ACM Press (2018)
Sophos: Security weaknesses in 5G, 4G and 3G could expose users’ locations, February 2019. https://nakedsecurity.sophos.com/2019/02/04/security-weaknesses-in-5g-4g-and-3g-could-expose-users-locations
Chlosta, M., Rupprecht, D., Holz, T., Pöpper, C.: LTE security disabled. In: Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks - WiSec 2019. ACM Press (2019)
5G Mobile Technology Poses An Espionage Risk, March 2019. https://www.cybersecurityintelligence.com/blog/5g-mobile-technology-poses-an-espionage-risk-4005.html
Kemp, R.: Legal aspects of big data: part I legal rights in data. http://www.kempitlaw.com/p97
Harris, B., Chin, D., Watson, G.: DOE/DHS/DOT volpe technical meeting on electric vehicle and charging station cybersecurity report. DOT-VNTSC-DOE-18-01, Kevin Harnett (2018)
Michael Bruemmer, E.M.B.: Why AI raises your risk of cybercrime and what to do about it, November 2018. https://www.cisoforum.com/why-ai-raises-your-risk-of-cybercrime-and-what-to-do-about-it
Zheng, C.: The cybersecurity vulnerabilities to artificial intelligence, June 2019. https://www.cfr.org/blog/cybersecurity-vulnerabilities-artificial-intelligence
Giles, M.: AI for cybersecurity is a hot new thing–and a dangerous gamble. MIT Technol. Rev. (2018)
Faggella, D.: Artificial intelligence and security: current applications and tomorrow’s potentials. https://emerj.com/ai-sector-overviews/artificial-intelligence-and-security-applications
Kumar, M.: Cryptocurrency firm loses 145 million after CEO dies with only password, February 2019. https://thehackernews.com/-2019/02/cryptocurrency-exchange-exit-scam.html
Kumar, M.: New mac malware targets cookies to steal from cryptocurrency wallets, October 2019. https://thehackernews.com/2019/02/mac-malware-cryptocurrency.htm
Digital Shadows, The New Gold Rush: Cryptocurrencies are the New Frontier of Fraud (2018)
Khandelwal, S.: First hacker convicted of ‘SIM swapping’ attack gets 10 years in prison, 04 February 2019. https://thehackernews.com/2019/02/sim-swapping-hack.html
Bradbury, D.: Blockchain hustler beats the house with smart contract hack, September 2018. https://nakedsecurity.sophos.com/2018/09/14/-blockchain-hustler-beats-the-house-with-smart-contract-hack
Armerding, T.: 300m deleted! How a tiny bug flushed away a fortune, November 2017. https://nakedsecurity.sophos.com/2017/11/09/300m-deleted-how-a-tiny-bug-flushed-away-a-fortune
Leyden, J.: Someone checked and, yup, you can still hijack Gmail, Bitcoin wallets etc via dirty SS7 tricks, January 2018. https://www.theregister.co.uk/2017/09/18/ss7-vuln-bitcoin-wallet-hack-risk
Cox, J.: You can spy like the NSA for a few thousand bucks, March 2018. https://www.thedailybeast.com/you-can-spy-like-the-nsa-for-a-few-thousand-bucks
Prvulovic, M.: Hypothetical blockchain security vulnerabilities and how they can be addressed, June 2018. https://kapitalized.com/blog/hypothetical-blockchain-security-vulnerabilities-and-how-they-can-be
Praitheeshan, P., Pan, L., Yu, J., Liu, J., Doss, R.: Security analysis methods on ethereum smart contract vulnerabilities: a survey (2019)
Yarramreddy, A., Gromkowski, P., Baggili, I.: Forensic analysis of immersive virtual reality social applications: a primary account. In: 2018 IEEE Security and Privacy Workshops (SPW). IEEE, May 2018
Roesner, F., Kohno, T., Molnar, D.: Security and privacy for augmented reality systems. Commun. ACM 57(4), 88–96 (2014)
McKie, R.: Virtual reality headsets could put childrens health at risk (2017)
Wong, J.C.: Sexual harassment in virtual reality feels all too real “it’s creepy beyond creepy”, October 2016. https://www.theguardian.com/technology/2016/oct/26/virtual-reality-sexual-harassment-online-groping-quivr
Buchleitner, J.: When virtual reality feels real, so does the sexual harassment, 5 April. https://www.revealnews.org/article/when-virtual-reality-feels-real-so-does-the-sexual-harassment
McPherson, R., Jana, S., Shmatikov, V.: No escape from reality. In: Proceedings of the 24th International Conference on World Wide Web - WWW 2015. ACM Press (2015)
Hackers Use Ultrasonic Waves To Disrupt VR Headsets - VRScout, July 2017. https://vrscout.com/news/hackers-ultrasonic-waves-disrupt-vr-headset
Fineman, B., Lewis, N.: Securing your reality: addressing security and privacy in virtual and augmented reality applications, January 2019. https://er.educause.edu/articles/2018/5/securing-your-reality-addressing-security-and-privacy-in-virtual
T. S. Responce. ISTR 24: Symantec’s Annual Threat Report Reveals More Ambitious and Destructive Attacks, September 2019
de Kerckhove, D., de Almeida, C.M.: What is a digital persona? Tech. Arts 11(3), 277–287 (2013)
Cyber Security Review: Attack Uses Docker Containers To Hide, Persist, Plant Malware Cyber Security Review, February 2019. https://www.csiac.org/digest-article/attack-uses-docker-containers-to-hide-persist-plant-malware/
Chelladhurai, J., Chelliah, P.R., Kumar, S.A.: Securing docker containers from denial of service (DoS) attacks. In: 2016 IEEE International Conference on Services Computing (SCC). IEEE, June 2016
Bettini, A.: Container security: the foundation of true cybersecurity, February 2019. https://www.itproportal.com/features/container-security-the-foundation-of-true-cybersecurity
Fortinet, SD-WAN in the age of digital transformation achieving business agility without complicating network security, December 2018
Malley, E.O.: Driving the Convergence of Networking and Security, 3 May 2018. https://www.securityweek.com/driving-convergence-networking-and-security
Garson, S.: Warning: security vulnerabilities found in SD-WAN appliances, November 2017. https://www.networkworld.com/article/3238725/warning-security-vulnerabilities-found-in-sd-wan-appliances.html
T. B. 1901, Tripwire state of container security report, January 2019
Zurkus, K.: Cyber-criminals work around road blocks, June 2018. https://www.infosecurity-magazine.com/news/cybercriminals-work-around-road
Kavanagh, C.: New Tech, new threats, and new governance challenges: an opportunity to craft smarter responses? Working Papper, Carnegie Endowment for International Peace, June 2019
Decentralized Application Security Project, DASP - TOP 10, November 2018. https://dasp.co
Acknowledgements
The research is supported by the KoMEIN Project (Conceptual Modelling and Simulation of Internet of Things Ecosystems) funded by the Bulgarian National Science Foundation, Competition for financial support of fundamental research (2016) under the thematic priority: Mathematical Sciences and Informatics, contract DN02/1/13.12.2016.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Dimitrov, W. (2020). The Impact of the Advanced Technologies over the Cyber Attacks Surface. In: Silhavy, R. (eds) Artificial Intelligence and Bioinspired Computational Methods. CSOC 2020. Advances in Intelligent Systems and Computing, vol 1225. Springer, Cham. https://doi.org/10.1007/978-3-030-51971-1_42
Download citation
DOI: https://doi.org/10.1007/978-3-030-51971-1_42
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-51970-4
Online ISBN: 978-3-030-51971-1
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)