A Review : Cyber Crime

Authors

  • Dinker Kumar  M Tech Scholar, Department of Computer Science & Engineering, Millennium Institute of Technology & Science Bhopal, India
  • Vinod Mahor  Assistant Professor, Dept. of Computer Science & Engineering, Millennium Institute of Technology & Science Bhopal, India

Keywords:

Cyber-crimes, cyber-attacks, IoT, IoT Ap- plications, Smart Cities

Abstract

Devices connected to the Internet of Things (IoT) are evolving to become increasingly universal. In the current climate, it is impossible to deny the success of the Internet of Things (IoT). Concurrently, assaults and threats against IoT devices and facilities are also rising on a daily basis. It is imperative that efforts be made to safeguard cyberspace seriously since cyberattacks are increasingly becoming ingrained in the Internet of Things (IoT) and damaging users' lives as well as society. The infrastructure of governments and enterprises throughout the world is at risk from cybercrimes, which may also cause consumers harm in a variety of different ways. With the losses caused by global cybercrime expected to cost up to 6 trillion dollars yearly on the worldwide economy by cybercrime, it is clear that this problem has to be addressed immediately. It is estimated that Australia suffers annual damages up to 328 million dollars as a result of cyberattacks. There are a number of measures tried to slow down these assaults, but sadly they are unable to accomplish results to the desired degree. As a result, making the Internet of Things (IoT) safe is an absolute necessity in the modern world, and the structure of IoT should be thoroughly investigated. There are several potential causes for cyberattacks, including: 1. nations with inadequate cyber security; 2.2. Cybercriminals launch their attacks using cutting-edge technology. 3. Services and other business plans can be used to engage in criminal activity in cyberspace. When it comes to the battle against cybercrime, Managed Service Providers (MSP) have a unique set of challenges. They are responsible for ensuring not just the safety of that particular customer, but also the safety of all of their servers, devices, and other systems. Therefore, they are required to utilize antivirus and anti-malware products that are efficient, quick, and simple to operate.

References

  1. Yang Lu and Li Da Xu, (2019) Internet of Things (IoT) Cybersecurity Research: A Review of Current Research Topics, IEEE Internet of Things Journal ,Volume: 6 , Issue: 2 , pp- 2103 – 2115.
  2. Hilt, S.; Kropotov, V.; Merces, F.; Rosario, M. and Sancho, D. (2017) The Internet of Things in the Cybercrime underground, Trend Micro Research,pp-1-46
  3. Venckauskas, A.; Dr. Damasevicius,R.; Dr. Jusas, V.; Dr. Toldinas, J.; Rudzika, D.and Dregvaite, G. (2015), A Review Of Cyber-Crime In Internet Of Things: Tech- nologies, Investigation Methods And Digital Forensics, International Journal Of En- gineering Sciences Research Technology, Venckauskas, 4(10):Pp-460-477
  4. Abomhara, M. and Koien, G. M. (2015) Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks, Journal of Cyber Security, Vol. 4, 65–88.
  5. Iqbal and B. M. Beigh,( 2017),Cybercrime in India: Trends and Chal- lenges, International Journal of Innovations Advancement in Computer Science, Volume 6, Issue 12,pp-187-196.
  6. Sarmah, A.; Sarmah, R. and Baruah, A. J. (2017),A brief study on Cyber Crime and Cyber Law’s of India, International Research Journal of Engineering and Tech- nology, Volume: 04 Issue: 06, pp-1633- 1641
  7. Anisha (2017)Awareness And Strategy To Prevent Cybercrimes: An Indian Perspective, Indian Journal Of Applied Research, Volume - 7 — Issue – 4, Pp-114- 116.
  8. Husamuddin, ; Qayyum, M.  (2017),  Internet of Things :A Study on Security and Privacy Threats, : The 2nd International Conference on Anti-Cyber Crimes (ICACC) organized by IEEE.
  9. Marion, N. E. (2010) The Council of Europe’s Cyber Crime Treaty: An exercise in Symbolic Legislation. International Journal of Cyber Criminology, Vol. 4 Issue 12, pp-699–712.
  10. Moitra, S. (2005). Developing Policies for Cyber crime, European Journal of Crime, Criminal Law and Criminal Justice, 13(3), 435-46.
  11. Oriwoh, E.; Sant, P. and Epiphaniou, G. (2013) Guidelines for Internet of Things deployment approaches – The Thing Commandments, The 4th International Con- ference on Emerging Ubiquitous Systems and Pervasive Networks, pp-122- 131
  12. Maung, T. M.; Thwin, M. M. S. (2017), Proposed Effective Solution for Cybercrime Investigation in Myanmar, The International Journal Of Engineering And Science, Volume – 6, Issue-1, PP 01-07
  13. Anthi, E., Williams, L., Slowi nska, M., Theodorakopoulos, G., Bur- nap, P. (2019). A Supervised Intrusion Detection System for Smart Home IoT devices. IEEE Inter- net of Things Journal.
  14. Radanliev, D. C. De Roure, J. R. C. Nurse, P. Burnap, E. Anthi, U. Ani, L. Maddox, O. Santos, and R. M. Montalvo, “Cyber risk from IoT technologies in the supply chain – discussion on supply chains decision support system for the digital economy,” Oxford, 2019.
  15. Carruthers, “Internet of Things and Beyond: Cyber-Physical Systems- IEEE Internet of Things,” IEEE Internet of Things, Newsletter, 2014, 2016.
  16. Lipman Paul, “New Reaper IoT Botnet Leaves 378 Million IoT Devices Potentially Vulnerable to Hacking,” 2017.
  17. Savage, “IoT Devices Are Hacking Your Data amp; Stealing Your Privacy - Infographic,” 2017.
  18. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, “Internet of things (IoT): A vision, architectural elements, and future directions,” Future Generation Computer Systems, vol. 29, no. 7, pp. 1645–1660, 2013.
  19. Schiefer, M. (2015, May). Smart Home Definition and Security Threats. In IT Secu- rityincident Management ITForensics(IMF), 2015 Ninth International Conference on (pp. 114-118). IEEE.
  20. Tong, J., Sun, W., Wang, L. (2013, May). An information flow security model for home area network of smart grid. In Cyber Technology in Automation, Control and Intelligent Systems (CYBER), 2013 IEEE 3rd Annual International Conference on (pp. 456-461). IEEE.
  21. Padyab, A. M., Paivarinta, T., Harnesk, D. (2014, January). Genre- Based Assess- ment of Information and Knowledge Security Risks. In System Sciences (HICSS), 2014 47th Hawaii International Conference on (pp. 3442-3451). IEEE.
  22. McCune, J. M., Perrig, A., Reiter, M. K. (2005, May). Seeing-is- believing: Using camera phones for human-verifiable authentication. In Security and privacy, 2005 IEEE symposium on (pp. 110-124). IEEE.
  23. Madakam, S., Ramaswamy, R., Tripathi, S. (2015). Internet of Things (IoT): A Literature Review. Journal of Computer and Communications, 3(05), 164.
  24. Wood and J. A. Stankovic, “Denial of Service in Sensor Networks”, IEEE Computer, vol. 35, no. 10, pp. 54–62, 2002.
  25. G. Holmberg, “BACnet Wide Area Network Security Threat Assessment”, Tech- nical report, National Institute of Standards and Technology, 2003.
  26. Ch, R., Gadekallu, T. R., Abidi, M. H., Al-Ahmari, A. (2020). Computational System to Classify Cyber Crime Offenses Using Machine Learning. Sustainability, 12(10), 4087.
  27. Maddikunta, P. K. R., Srivastava, G., Gadekallu, T. R., Deepa, N., Boopathy, (2020). Predictive model for battery life in IoT networks. IET Intelligent Transport Systems.
  28. RM, S. P., Maddikunta, P. K. R., Parimala, M., Koppu, S., Reddy, T., Chowdhary, C. L., Alazab, M. (2020). An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture. Computer Communica- tions.
  29. Deepa, N., Prabadevi, B., Maddikunta, P. K., Gadekallu, T. R., Baker, T., Khan, M. A., Tariq, U. (2020). An AI based intelligent system for healthcare analysis using Ridge Adaline Stochastic Gradient Descent Classifier. Journal of Supercomputing.
  30. Maddikunta, P. K. R., Gadekallu, T. R., Kaluri, R., Srivastava, G., Parizi, R. M., Khan, M. S. (2020). Green communication in IoT networks using a hybrid optimization algorithm. Computer Communications.
  31. RM, S. P., Bhattacharya, S., Maddikunta, P. K. R., Somayaji, S. R. K., Laksh- manna, K., Kaluri, R., ... Gadekallu, T. R. (2020). Load balancing of energy cloud using wind driven and firefly algorithms in internet of everything. Journal of Parallel and Distributed Computing.
  32. Iwendi, C., Jalil, Z., Javed, A. R., Reddy, T., Kaluri, R., Srivastava, G., Jo, O. (2020). KeySplitWatermark: Zero Watermarking Algorithm for Software Protection Against Cyber-Attacks. IEEE Access, 8, 72650-72660.
  33. Numan, M., Subhan, F., Khan, W. Z., Hakak, S., Haider, S., Reddy, G. T., ... Alazab, M. (2020). A systematic review on clone node detection in static wireless sensor networks. IEEE Access, 8, 65450-65461.
  34. Patel, H., Singh Rajput, D., Thippa Reddy, G., Iwendi, C., Kashif Bashir, A., Jo, O. (2020). A review on classification of imbalanced data for wireless sensor networks. International Journal of Distributed Sensor Networks, 16(4), 1550147720916404.
  35. Reddy, T., RM, S. P., Parimala, M., Chowdhary, C. L., Hakak, S., Khan, W. Z. (2020). A deep neural networks based model for uninterrupted marine environment monitoring. Computer Communications.
  36. Iwendi, C., Maddikunta, P. K. R., Gadekallu, T. R., Lakshmanna, K., Bashir, A. K., Piran, M. J. (2020). A metaheuristic optimization approach for energy efficiency in the IoT networks. Software: Practice and Experience.
  37. Bhattacharya, S., Kaluri, R., Singh, S., Alazab, M., Tariq, U. (2020). A Novel PCA- Firefly based XGBoost classification model for Intrusion Detection in Net- works using GPU. Electronics, 9(2), 219.
  38. Azab, A., Layton, R., Alazab, M., Oliver, J. (2014, November). Mining malware to detect variants. In 2014 Fifth Cybercrime and Trustworthy Computing Conference (pp. 44-53). IEEE.
  39. Alazab, M., Layton, R., Broadhurst, R., Bouhours, B. (2013, November). Malicious spam emails developments and authorship attribution. In 2013 Fourth Cybercrime and Trustworthy Computing Workshop (pp. 58-68). IEEE.
  40. Bali, R. S., Kumar, N. (2016). Secure clustering for efficient data dissemination in vehicular cyber–physical systems. Future Generation Computer Systems, 56, 476- 492.
  41. Chaudhary, R., Kumar, N., Zeadally, S. (2017). Network service chaining in fog and cloud computing for the 5G environment: Data management and security challenges. IEEE Communications Magazine, 55(11), 114-122.
  42. Singh, A., Maheshwari, M., Kumar, N. (2011, April). Security and trust manage- ment in MANET. In International Conference on Advances in Information Technol- ogy and Mobile Communication (pp. 384-387). Springer, Berlin, Heidelberg.
  43. Vora, J., Italiya, P., Tanwar, S., Tyagi, S., Kumar, N., Obaidat, M. S., Hsiao, K. F. (2018, July). Ensuring privacy and security in E-health records. In 2018 Interna- tional conference on computer, information and telecommunication systems (CITS) (pp. 1-5). IEEE.
  44. Hathaliya, J. J., Tanwar, S., Tyagi, S., Kumar, N. (2019). Securing electronics healthcare records in healthcare 4.0: a biometric-based approach. Computers Elec- trical Engineering, 76, 398-410.
  45. Krishnasamy, L., Dhanaraj, R. K., Ganesh Gopal, D., Reddy Gadekallu, T., Aboudaif, M. K., Abouel Nasr, E. (2020). A Heuristic Angular Clustering Frame- work for Secured Statistical Data Aggregation in Sensor Networks. Sensors, 20(17), 4937.
  46. Mohan Vijay (2018). AN UPDATED NEW SECURITY ARCHITECTURE FOR IOT NETWORK BASED ON SOFTWARE-DEFINED NETWORKING (SDN). IRJCS:: International Research Journal of Computer Science, Volume V, 77-81.
  47. Krishna Kagita, M. (2019). Security and Privacy Issues for Business Intelligence in a loT. In Proceedings of 12th International Conference on Global Security, Safety and Sustainability, ICGS3 2019 [8688023]
  48. Krishna Kagita, M. and M. Varalakshmi, 2020. A detailed study of security and privacy of Internet of Things (IoT). International Journal of Computer Science and Network, 9 (3): 109–113.
  49. Navod Neranjan Thilakarathne, Mohan Krishna Kagita, Dr. Thippa Reddy Gadekallu. (2020). The Role of the Internet of Things in Health Care: A Systematic and Comprehensive Study. International Journal of Engineering and Management Research, 10(4), 145-159.
  50. Alazab, M., Venkatraman, S., Watters, P., Alazab, M. (2013). Information se- curity governance: the art of detecting hidden malware. In IT security governance innovations: theory and research (pp. 293-315). IGI Global.
  51. Farivar, F., Haghighi, M. S., Jolfaei, A., Alazab, M. (2019). Artificial Intelligence for Detection, Estimation, and Compensation of Malicious Attacks in Nonlinear Cyber-Physical Systems and Industrial IoT. IEEE transactions on industrial infor- matics, 16(4), 2716-2725.
  52. Azab, A., Alazab, M., Aiash, M. (2016, August). Machine learning based botnet identification traffic. In 2016 IEEE Trustcom/BigDataSE/ISPA (pp. 1788-1794). IEEE.
  53. Alazab, M., Huda, S., Abawajy, J., Islam, R., Yearwood, J., Venkatraman, S., Broadhurst, R. (2014). A hybrid wrapper-filter approach for malware detection. Journal of networks, 9(11), 2878-2891.
  54. Garg, S., Singh, A., Batra, S., Kumar, N., Yang, L. T. (2018). UAV-empowered edge computing environment for cyber-threat detection in smart vehicles. IEEE Network, 32(3), 42-51.

Downloads

Published

2023-04-30

Issue

Section

Research Articles

How to Cite

[1]
Dinker Kumar, Vinod Mahor, " A Review : Cyber Crime, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 9, Issue 2, pp.693-705, March-April-2023.