Skip to main content

Abstract

Cybersecurity is currently a topic of utmost significance in tech sectors. The ever-evolving landscape of this field makes it particularly difficult to navigate. This paper aims to help the reader understand the complexity of network attacks and also show how we may never ‘solve’ the problem of cyber attacks. Our paper may be accessible to the layman, but a basic understanding of networking fundamentals would be desirable. Computer security, cybersecurity, or information technology security may all be used interchangeably throughout the paper. An ‘attack’ will refer to a breach in security to an online system that may cause (but is not limited to) the following: unauthorized information disclosure, theft of technology, or disruption of services.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Hu, Y.C., Perrig, A., Johnson, D.B.: Wormhole attacks in wireless networks. IEEE J. Sel. Areas Commun. 24(2), 370–380 (2006)

    Article  Google Scholar 

  2. Ahmad, T., Truscan, D., Vain, J., Porres, I.: Early detection of network attacks using deep learning. In: 2022 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW), pp. 30–39. IEEE, April 2022

    Google Scholar 

  3. Guembe, B., Azeta, A., Misra, S., Osamor, V.C., Fernandez-Sanz, L., Pospelova, V.: The emerging threat of AI-driven cyber attacks: a Review. Appl. Artif. Intell. 36(1), 2037254 (2022)

    Article  Google Scholar 

  4. Borkar, G.M., Patil, L.H., Dalgade, D., Hutke, A.: A novel clustering approach and adaptive SVM classifier for intrusion detection in WSN: a data mining concept. Sustain. Comput. Inform. Syst. 23, 120–135 (2019)

    Google Scholar 

  5. Tiruvakadu, D.S.K., Pallapa, V.: Confirmation of wormhole attack in MANETs using honeypot. Comput. Secur. 76, 32–49 (2018)

    Google Scholar 

  6. Chen, T., Guestrin, C.: Xgboost: a scalable tree boosting system. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 785–794 August 2016

    Google Scholar 

  7. Yan, R., Xiao, X., Hu, G., Peng, S., Jiang, Y.: New deep learning method to detect code injection attacks on hybrid applications. J. Syst. Softw. 137, 67–77 (2018)

    Article  Google Scholar 

  8. Hanif, H., Nasir, M.H.N.M., Ab Razak, M.F., Firdaus, A., Anuar, N.B.: The rise of software vulnerability: taxonomy of software vulnerabilities detection and machine learning approaches. J. Netw. Comput. Appl. 179, 103009 (2021)

    Article  Google Scholar 

  9. Al-Yaseen, W.L., Othman, Z.A., Nazri, M.Z.A.: Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system. Expert Syst. Appl. 67, 296–303 (2017)

    Article  Google Scholar 

  10. Chen, T., Guestrin, C.: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (2016)

    Google Scholar 

  11. Maliha, M.: A supervised learning approach: detection of cyber attacks. In: 2021 IEEE International Conference on Telecommunications and Photonics (ICTP), pp. 1–5. IEEE, December 2021

    Google Scholar 

  12. Sivasankari, N., Kamalakkannan, S.: Detection and prevention of man-in-the-middle attack in IoT network using regression modeling. Adv. Eng. Softw. 169, 103126 (2022)

    Article  Google Scholar 

  13. Morse, E.A., Raval, V., Wingender, J.R., Jr.: Market price effects of data security breaches. Inf. Secur. J. Glob. Perspect. 20(6), 263–273 (2011)

    Article  Google Scholar 

  14. Kuppa, K., Dayal, A., Gupta, S., Dua, A., Chaudhary, P., Rathore, S.: ConvXSS: a deep learning-based smart ICT framework against code injection attacks for HTML5 web applications in sustainable smart city infrastructure. Sustain. Urban Areas 80, 103765 (2022)

    Google Scholar 

  15. Kuppa, K., Dayal, A., Gupta, S., Dua, A., Chaudhary, P., Rathore, S.: ConvXSS: a deep learning-based smart ICT framework against code injection attacks for HTML5 web applications in sustainable smart city infrastructure. Sustain. Cities Soc. 80, 103765 (2022)

    Google Scholar 

  16. Satheeshkumar, S., Sengottaiyan, N.: Defending against jellyfish attacks using cluster based routing protocol for secured data transmission in MANET. Clust. Comput. 22, 10849–10860 (2019)

    Article  Google Scholar 

  17. Kumar, K., Arora, S.K.: Review of vehicular ad hoc network security. Int. J. Grid Distrib. Comput. 9(11), 17–34 (2016)

    Article  Google Scholar 

  18. Levchenko, K., Paturi, R., Varghese, G.: On the difficulty of scalably detecting network attacks. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, pp. 12–20, October 2004

    Google Scholar 

  19. Baba, T., Matsuda, S.: Tracing network attacks to their sources. IEEE Internet Comput. 6(2), 20–26 (2002)

    Article  Google Scholar 

  20. Shrivastava, N., Majumder, A., Rastogi, R.: Mining (social) network graphs to detect random link attacks. In: 2008 IEEE 24th International Conference on Data Engineering, pp. 486–495. IEEE, April 2008

    Google Scholar 

  21. Ahmad, T., Truscan, D., Vain, J., Porres, I.: Early detection of network attacks using deep learning. In: 2022 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW), pp. 30–39. IEEE, April 2022

    Google Scholar 

  22. Osanaiye, O., Alfa, A.S., Hancke, G.P.: A statistical approach to detect jamming attacks in wireless sensor networks. Sensors 18(6), 1691 (2018)

    Article  Google Scholar 

  23. Suryaprabha, E., Saravana Kumar, N.M.: Enhancement of security using optimized DoS (denial-of-service) detection algorithm for wireless sensor network. Soft. Comput. 24(14), 10681–10691 (2020)

    Article  Google Scholar 

  24. Satheeshkumar, S., Sengottaiyan, N.: Defending against jellyfish attacks using cluster based routing protocol for secured data transmission in MANET. Clust. Comput. 22, 10849–10860 (2019)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tauheed Khan Mohd .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Addai, P., Freas, R., Tesfa, E.M., Sellers, M., Mohd, T.K. (2023). Prevention and Detection of Network Attacks: A Comprehensive Study. In: Liu, S., Zaraté, P., Kamissoko, D., Linden, I., Papathanasiou, J. (eds) Decision Support Systems XIII. Decision Support Systems in An Uncertain World: The Contribution of Digital Twins . ICDSST 2023. Lecture Notes in Business Information Processing, vol 474. Springer, Cham. https://doi.org/10.1007/978-3-031-32534-2_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-32534-2_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-32533-5

  • Online ISBN: 978-3-031-32534-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics