Skip to main content

The Impact of the Advanced Technologies over the Cyber Attacks Surface

  • Conference paper
  • First Online:
Artificial Intelligence and Bioinspired Computational Methods (CSOC 2020)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1225))

Included in the following conference series:

Abstract

The article explores the changes are occurring in the security of the information and communication systems as a result of a state-of-the-art-technologies usage. The research is centered over the impact of new technologies on the cyber attack surface. The focus is on the synergy of a set of advanced technologies with existing digital environment and the consequences for cyber security particularly on the cyber attack surface extension. The study summarizes the evidences for increasing the surface area for attacks due to the advent of the listed advanced technologies. Explores how emerging technologies complicate cyber protection, introducing new risks as consequence from increasing possibilities for malicious threats. Indicate guidelines about future research related to refinement of legislation that is intended to regulate the cyber-physical world.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Agrafiotis, I., Nurse, J.R.C., Goldsmith, M., Creese, S., Upton, D.: A taxonomy of cyber-harms: defining the impacts of cyber-attacks and understanding how they propagate. J. Cybersecur. 4(1), tyy006 (2018)

    Article  Google Scholar 

  2. Kadhim, Q.K., Yusof, R., Mahdi, H.S., Al-shami, S.S.A., Selamat, S.R.: A review study on cloud computing issues. J. Phys: Conf. Ser. 1018, 012006 (2018)

    Google Scholar 

  3. Bisong, A., Rahman, S.S.M.: An overview of the security concerns in enterprise cloud computing. Int. J. Netw. Secur. Appl. 3(1), 30–45 (2011)

    Google Scholar 

  4. Noyes, D., Liu, H., Fortier, P.: Security analysis and improvement of USB technology. In: 2016 IEEE Symposium on Technologies for Homeland Security (HST). IEEE, May 2016

    Google Scholar 

  5. Prasad, R., Rohokale, V.: Mobile device cyber security. In: Springer Series in Wireless Technology. Springer International Publishing, pp. 217–229 (2019)

    Google Scholar 

  6. Almutairy, N.M., Al-Shqeerat, K.H.A., Hamad, H.A.A.: A taxonomy of virtualization security issues in cloud computing environments. Indian J. Sci. Technol. 12(3), 1–19 (2019)

    Article  Google Scholar 

  7. Theisen, C., Munaiah, N., Al-Zyoud, M., Carver, J.C., Meneely, A., Williams, L.: Attack surface definitions: a systematic literature review. Inf. Softw. Technol. 104, 94–103 (2018)

    Article  Google Scholar 

  8. Attack surface, February 2019. https://whatis.techtarget.com/definition/attack-surface

  9. Tripware: Unbalanced Security is Increasing Your Attack Surface The State of Security, March 2014. https://www.tripwire.com/state-of-security/featured/unbalanced-security-increasing-attack-surface-2

  10. Friedman, J.: Attack your attack surface. How to reduce your exposure to cyberattacks with an attack surface visualization solution, Whitepapper, Skybox security (2016)

    Google Scholar 

  11. CISOMAG: Cybercriminals use Google Calendar alerts to steal sensitive information, June 2019. https://www.cisomag.com/cybercriminals-use-google-calendar-alerts-to-steal-sensitive-information

  12. Shaik, A., Borgaonkar, R., Park, S., Seifert, J.-P.: On the impact of rogue base stations in 4g/LTE self organizing networks. In: Proceedings of the 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks - WiSec 2018. ACM Press (2018)

    Google Scholar 

  13. Sophos: Security weaknesses in 5G, 4G and 3G could expose users’ locations, February 2019. https://nakedsecurity.sophos.com/2019/02/04/security-weaknesses-in-5g-4g-and-3g-could-expose-users-locations

  14. Chlosta, M., Rupprecht, D., Holz, T., Pöpper, C.: LTE security disabled. In: Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks - WiSec 2019. ACM Press (2019)

    Google Scholar 

  15. 5G Mobile Technology Poses An Espionage Risk, March 2019. https://www.cybersecurityintelligence.com/blog/5g-mobile-technology-poses-an-espionage-risk-4005.html

  16. Kemp, R.: Legal aspects of big data: part I legal rights in data. http://www.kempitlaw.com/p97

  17. Harris, B., Chin, D., Watson, G.: DOE/DHS/DOT volpe technical meeting on electric vehicle and charging station cybersecurity report. DOT-VNTSC-DOE-18-01, Kevin Harnett (2018)

    Google Scholar 

  18. Michael Bruemmer, E.M.B.: Why AI raises your risk of cybercrime and what to do about it, November 2018. https://www.cisoforum.com/why-ai-raises-your-risk-of-cybercrime-and-what-to-do-about-it

  19. Zheng, C.: The cybersecurity vulnerabilities to artificial intelligence, June 2019. https://www.cfr.org/blog/cybersecurity-vulnerabilities-artificial-intelligence

  20. Giles, M.: AI for cybersecurity is a hot new thing–and a dangerous gamble. MIT Technol. Rev. (2018)

    Google Scholar 

  21. Faggella, D.: Artificial intelligence and security: current applications and tomorrow’s potentials. https://emerj.com/ai-sector-overviews/artificial-intelligence-and-security-applications

  22. Kumar, M.: Cryptocurrency firm loses 145 million after CEO dies with only password, February 2019. https://thehackernews.com/-2019/02/cryptocurrency-exchange-exit-scam.html

  23. Kumar, M.: New mac malware targets cookies to steal from cryptocurrency wallets, October 2019. https://thehackernews.com/2019/02/mac-malware-cryptocurrency.htm

  24. Digital Shadows, The New Gold Rush: Cryptocurrencies are the New Frontier of Fraud (2018)

    Google Scholar 

  25. Khandelwal, S.: First hacker convicted of ‘SIM swapping’ attack gets 10 years in prison, 04 February 2019. https://thehackernews.com/2019/02/sim-swapping-hack.html

  26. Bradbury, D.: Blockchain hustler beats the house with smart contract hack, September 2018. https://nakedsecurity.sophos.com/2018/09/14/-blockchain-hustler-beats-the-house-with-smart-contract-hack

  27. Armerding, T.: 300m deleted! How a tiny bug flushed away a fortune, November 2017. https://nakedsecurity.sophos.com/2017/11/09/300m-deleted-how-a-tiny-bug-flushed-away-a-fortune

  28. Leyden, J.: Someone checked and, yup, you can still hijack Gmail, Bitcoin wallets etc via dirty SS7 tricks, January 2018. https://www.theregister.co.uk/2017/09/18/ss7-vuln-bitcoin-wallet-hack-risk

  29. Cox, J.: You can spy like the NSA for a few thousand bucks, March 2018. https://www.thedailybeast.com/you-can-spy-like-the-nsa-for-a-few-thousand-bucks

  30. Prvulovic, M.: Hypothetical blockchain security vulnerabilities and how they can be addressed, June 2018. https://kapitalized.com/blog/hypothetical-blockchain-security-vulnerabilities-and-how-they-can-be

  31. Praitheeshan, P., Pan, L., Yu, J., Liu, J., Doss, R.: Security analysis methods on ethereum smart contract vulnerabilities: a survey (2019)

    Google Scholar 

  32. Yarramreddy, A., Gromkowski, P., Baggili, I.: Forensic analysis of immersive virtual reality social applications: a primary account. In: 2018 IEEE Security and Privacy Workshops (SPW). IEEE, May 2018

    Google Scholar 

  33. Roesner, F., Kohno, T., Molnar, D.: Security and privacy for augmented reality systems. Commun. ACM 57(4), 88–96 (2014)

    Article  Google Scholar 

  34. McKie, R.: Virtual reality headsets could put childrens health at risk (2017)

    Google Scholar 

  35. Wong, J.C.: Sexual harassment in virtual reality feels all too real “it’s creepy beyond creepy”, October 2016. https://www.theguardian.com/technology/2016/oct/26/virtual-reality-sexual-harassment-online-groping-quivr

  36. Buchleitner, J.: When virtual reality feels real, so does the sexual harassment, 5 April. https://www.revealnews.org/article/when-virtual-reality-feels-real-so-does-the-sexual-harassment

  37. McPherson, R., Jana, S., Shmatikov, V.: No escape from reality. In: Proceedings of the 24th International Conference on World Wide Web - WWW 2015. ACM Press (2015)

    Google Scholar 

  38. Hackers Use Ultrasonic Waves To Disrupt VR Headsets - VRScout, July 2017. https://vrscout.com/news/hackers-ultrasonic-waves-disrupt-vr-headset

  39. Fineman, B., Lewis, N.: Securing your reality: addressing security and privacy in virtual and augmented reality applications, January 2019. https://er.educause.edu/articles/2018/5/securing-your-reality-addressing-security-and-privacy-in-virtual

  40. T. S. Responce. ISTR 24: Symantec’s Annual Threat Report Reveals More Ambitious and Destructive Attacks, September 2019

    Google Scholar 

  41. de Kerckhove, D., de Almeida, C.M.: What is a digital persona? Tech. Arts 11(3), 277–287 (2013)

    Article  Google Scholar 

  42. Cyber Security Review: Attack Uses Docker Containers To Hide, Persist, Plant Malware Cyber Security Review, February 2019. https://www.csiac.org/digest-article/attack-uses-docker-containers-to-hide-persist-plant-malware/

  43. Chelladhurai, J., Chelliah, P.R., Kumar, S.A.: Securing docker containers from denial of service (DoS) attacks. In: 2016 IEEE International Conference on Services Computing (SCC). IEEE, June 2016

    Google Scholar 

  44. Bettini, A.: Container security: the foundation of true cybersecurity, February 2019. https://www.itproportal.com/features/container-security-the-foundation-of-true-cybersecurity

  45. Fortinet, SD-WAN in the age of digital transformation achieving business agility without complicating network security, December 2018

    Google Scholar 

  46. Malley, E.O.: Driving the Convergence of Networking and Security, 3 May 2018. https://www.securityweek.com/driving-convergence-networking-and-security

  47. Garson, S.: Warning: security vulnerabilities found in SD-WAN appliances, November 2017. https://www.networkworld.com/article/3238725/warning-security-vulnerabilities-found-in-sd-wan-appliances.html

  48. T. B. 1901, Tripwire state of container security report, January 2019

    Google Scholar 

  49. Zurkus, K.: Cyber-criminals work around road blocks, June 2018. https://www.infosecurity-magazine.com/news/cybercriminals-work-around-road

  50. Kavanagh, C.: New Tech, new threats, and new governance challenges: an opportunity to craft smarter responses? Working Papper, Carnegie Endowment for International Peace, June 2019

    Google Scholar 

  51. Decentralized Application Security Project, DASP - TOP 10, November 2018. https://dasp.co

Download references

Acknowledgements

The research is supported by the KoMEIN Project (Conceptual Modelling and Simulation of Internet of Things Ecosystems) funded by the Bulgarian National Science Foundation, Competition for financial support of fundamental research (2016) under the thematic priority: Mathematical Sciences and Informatics, contract DN02/1/13.12.2016.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Willian Dimitrov .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Dimitrov, W. (2020). The Impact of the Advanced Technologies over the Cyber Attacks Surface. In: Silhavy, R. (eds) Artificial Intelligence and Bioinspired Computational Methods. CSOC 2020. Advances in Intelligent Systems and Computing, vol 1225. Springer, Cham. https://doi.org/10.1007/978-3-030-51971-1_42

Download citation

Publish with us

Policies and ethics