Abstract
Cybersecurity is currently a topic of utmost significance in tech sectors. The ever-evolving landscape of this field makes it particularly difficult to navigate. This paper aims to help the reader understand the complexity of network attacks and also show how we may never ‘solve’ the problem of cyber attacks. Our paper may be accessible to the layman, but a basic understanding of networking fundamentals would be desirable. Computer security, cybersecurity, or information technology security may all be used interchangeably throughout the paper. An ‘attack’ will refer to a breach in security to an online system that may cause (but is not limited to) the following: unauthorized information disclosure, theft of technology, or disruption of services.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Hu, Y.C., Perrig, A., Johnson, D.B.: Wormhole attacks in wireless networks. IEEE J. Sel. Areas Commun. 24(2), 370–380 (2006)
Ahmad, T., Truscan, D., Vain, J., Porres, I.: Early detection of network attacks using deep learning. In: 2022 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW), pp. 30–39. IEEE, April 2022
Guembe, B., Azeta, A., Misra, S., Osamor, V.C., Fernandez-Sanz, L., Pospelova, V.: The emerging threat of AI-driven cyber attacks: a Review. Appl. Artif. Intell. 36(1), 2037254 (2022)
Borkar, G.M., Patil, L.H., Dalgade, D., Hutke, A.: A novel clustering approach and adaptive SVM classifier for intrusion detection in WSN: a data mining concept. Sustain. Comput. Inform. Syst. 23, 120–135 (2019)
Tiruvakadu, D.S.K., Pallapa, V.: Confirmation of wormhole attack in MANETs using honeypot. Comput. Secur. 76, 32–49 (2018)
Chen, T., Guestrin, C.: Xgboost: a scalable tree boosting system. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 785–794 August 2016
Yan, R., Xiao, X., Hu, G., Peng, S., Jiang, Y.: New deep learning method to detect code injection attacks on hybrid applications. J. Syst. Softw. 137, 67–77 (2018)
Hanif, H., Nasir, M.H.N.M., Ab Razak, M.F., Firdaus, A., Anuar, N.B.: The rise of software vulnerability: taxonomy of software vulnerabilities detection and machine learning approaches. J. Netw. Comput. Appl. 179, 103009 (2021)
Al-Yaseen, W.L., Othman, Z.A., Nazri, M.Z.A.: Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system. Expert Syst. Appl. 67, 296–303 (2017)
Chen, T., Guestrin, C.: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (2016)
Maliha, M.: A supervised learning approach: detection of cyber attacks. In: 2021 IEEE International Conference on Telecommunications and Photonics (ICTP), pp. 1–5. IEEE, December 2021
Sivasankari, N., Kamalakkannan, S.: Detection and prevention of man-in-the-middle attack in IoT network using regression modeling. Adv. Eng. Softw. 169, 103126 (2022)
Morse, E.A., Raval, V., Wingender, J.R., Jr.: Market price effects of data security breaches. Inf. Secur. J. Glob. Perspect. 20(6), 263–273 (2011)
Kuppa, K., Dayal, A., Gupta, S., Dua, A., Chaudhary, P., Rathore, S.: ConvXSS: a deep learning-based smart ICT framework against code injection attacks for HTML5 web applications in sustainable smart city infrastructure. Sustain. Urban Areas 80, 103765 (2022)
Kuppa, K., Dayal, A., Gupta, S., Dua, A., Chaudhary, P., Rathore, S.: ConvXSS: a deep learning-based smart ICT framework against code injection attacks for HTML5 web applications in sustainable smart city infrastructure. Sustain. Cities Soc. 80, 103765 (2022)
Satheeshkumar, S., Sengottaiyan, N.: Defending against jellyfish attacks using cluster based routing protocol for secured data transmission in MANET. Clust. Comput. 22, 10849–10860 (2019)
Kumar, K., Arora, S.K.: Review of vehicular ad hoc network security. Int. J. Grid Distrib. Comput. 9(11), 17–34 (2016)
Levchenko, K., Paturi, R., Varghese, G.: On the difficulty of scalably detecting network attacks. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, pp. 12–20, October 2004
Baba, T., Matsuda, S.: Tracing network attacks to their sources. IEEE Internet Comput. 6(2), 20–26 (2002)
Shrivastava, N., Majumder, A., Rastogi, R.: Mining (social) network graphs to detect random link attacks. In: 2008 IEEE 24th International Conference on Data Engineering, pp. 486–495. IEEE, April 2008
Ahmad, T., Truscan, D., Vain, J., Porres, I.: Early detection of network attacks using deep learning. In: 2022 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW), pp. 30–39. IEEE, April 2022
Osanaiye, O., Alfa, A.S., Hancke, G.P.: A statistical approach to detect jamming attacks in wireless sensor networks. Sensors 18(6), 1691 (2018)
Suryaprabha, E., Saravana Kumar, N.M.: Enhancement of security using optimized DoS (denial-of-service) detection algorithm for wireless sensor network. Soft. Comput. 24(14), 10681–10691 (2020)
Satheeshkumar, S., Sengottaiyan, N.: Defending against jellyfish attacks using cluster based routing protocol for secured data transmission in MANET. Clust. Comput. 22, 10849–10860 (2019)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Addai, P., Freas, R., Tesfa, E.M., Sellers, M., Mohd, T.K. (2023). Prevention and Detection of Network Attacks: A Comprehensive Study. In: Liu, S., Zaraté, P., Kamissoko, D., Linden, I., Papathanasiou, J. (eds) Decision Support Systems XIII. Decision Support Systems in An Uncertain World: The Contribution of Digital Twins . ICDSST 2023. Lecture Notes in Business Information Processing, vol 474. Springer, Cham. https://doi.org/10.1007/978-3-031-32534-2_5
Download citation
DOI: https://doi.org/10.1007/978-3-031-32534-2_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-32533-5
Online ISBN: 978-3-031-32534-2
eBook Packages: Computer ScienceComputer Science (R0)