International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 3 | Views: 273 | Weekly Hits: ⮙1 | Monthly Hits: ⮙3

Review Papers | Computer Science | India | Volume 12 Issue 2, February 2023 | Popularity: 5.6 / 10


     

A Cumulation of the Cyber Security Vulnerabilities in Latest Technologies

Karan Chawla


Abstract: Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It's also known as information technology security or electronic information security. Different kinds of cyber attacks include Malware, Ransomware, Distributed denial of service (DDoS) attacks, Spam and Phishing, Corporate Account Takeover (CATO), Automated Teller Machine (ATM) Cash Out. Cybersecurity is a must in the digital age. Millions of people's personal information may be exposed as a result of a single security breach. These violations have a negative financial impact on the businesses as well as a loss of client confidence. Therefore, it is crucial to have cyber security to shield both persons and businesses from spammers and online crooks. This paper reviews information about the latest methodologies used to defend against potential cyber attacks in the latest technologies, critiques the current methods and provides references for future works. The review paper is a cumulation of Artificial Intelligence based detection models for cybersecurity threat analysis for modern day systems. A systematic search was performed on various electronic databases (SCOPUS, Science Direct, IEEE Xplore, Web of Science, ACM, and MDPI). This Review paper discusses artificial intelligence based detection methods for cyber threat analysis for modern day systems which include, cloud computing, connected and automated vehicles (CAVs) which include CAN (Controller Area Network) Buses, Internet of Things (IOT), Fintech (Financial Technology), Vehicle to Infrastructure Applications. The drawbacks of the three technologies under review have been underlined in the conclusion and are further explained using particular statistics. Some of the problems mentioned include the lack of adequate testing done by the manufacturers when the software is deployed in the context of smart cities. There is little to no overlap in the methodologies utilized for any of the aforementioned technologies, such as gradient boost in CAVs, and each has its own literature. There aren't enough datasets and, consequently, detection algorithms because the majority of research only addresses theoretical difficulties. Finding methods to apply a methodology from system 1 to system 2 or vice versa is one strategy to improve efficiency or wiser development.


Keywords: Cyber security, cyber attacks, detection models, Connected and Automated Vehicles, IOT, Smart City, detection algorithms, cyber security protections


Edition: Volume 12 Issue 2, February 2023


Pages: 797 - 801


DOI: https://www.doi.org/10.21275/MR23213150625



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Karan Chawla, "A Cumulation of the Cyber Security Vulnerabilities in Latest Technologies", International Journal of Science and Research (IJSR), Volume 12 Issue 2, February 2023, pp. 797-801, URL: https://www.ijsr.net/getabstract.php?paperid=MR23213150625, DOI: https://www.doi.org/10.21275/MR23213150625



Downloads: 408 | Views: 989 | Weekly Hits: ⮙1 | Monthly Hits: ⮙3

Computer Science, India, Volume 9 Issue 4, April 2020

Pages: 645 - 648

Crop Yield Prediction Using Machine Learning

Mayank Champaneri, Darpan Chachpara, Chaitanya Chandvidkar, Mansing Rathod


Downloads: 234 | Views: 417 | Weekly Hits: ⮙1 | Monthly Hits: ⮙3

Computer Science, India, Volume 9 Issue 3, March 2020

Pages: 1606 - 1612

Analysis of the Technique for Disaster Recovery in Cloud Computing Environment

B. Bamleshwar Rao, Dr. Akhilesh A. Waoo


Downloads: 229 | Views: 369 | Weekly Hits: ⮙1 | Monthly Hits: ⮙3

Computer Science, Bangladesh, Volume 9 Issue 3, March 2020

Pages: 1368 - 1375

Design and Development of an E-Commerce System in a Rapid Organized Way

Ahmed Yunus, Md Masum


Downloads: 202 | Views: 587 | Weekly Hits: ⮙1 | Monthly Hits: ⮙3

Computer Science, United States of America, Volume 9 Issue 9, September 2020

Pages: 1095 - 1100

Maintaining Social Distancing using Artificial Intelligence

Krish Chaudhary


Downloads: 200 | Views: 384 | Weekly Hits: ⮙1 | Monthly Hits: ⮙3

Computer Science, Iraq, Volume 9 Issue 3, March 2020

Pages: 286 - 291

DNA-Chaos S-Box Generation for Modified Lightweight AES Algorithm for Data Packet Protection in MANET

Muntaha A. Hatem, Haider K. Hoomod


Top