Emerging Threats in Cybersecurity : A Deep Analysis of Modern Attack
DOI:
https://doi.org/10.32628/CSEIT2410297Keywords:
Cybersecurity, Emerging Threats, Attack Vectors, Risk Mitigation, CountermeasuresAbstract
This paper delves into the evolving landscape of cybersecurity threats, focusing on the latest attack vectors and techniques employed by malicious actors. With the rapid advancement of technology and increasing connectivity, the cybersecurity landscape is continuously evolving, presenting new challenges and threats to organizations and individuals alike. The analysis covers various modern attack methods, including but not limited to, ransomware, phishing, advanced persistent threats (APTs), and supply chain attacks. Each of these attack vectors is examined in detail, highlighting their characteristics, impact, and potential mitigation strategies. Furthermore, the paper discusses the role of emerging technologies such as artificial intelligence (AI) and the Internet of Things (IoT) in shaping the cybersecurity threat landscape. While these technologies offer numerous benefits, they also introduce new vulnerabilities that can be exploited by cybercriminals.
Downloads
References
K. Rathor, K. Patil, M. S. Sai Tarun, S. Nikam, D. Patel and S. Ranjit, "A Novel and Efficient Method to Detect the Face Coverings to Ensurethe Safety using Comparison Analysis," 2022 International Conference on Edge Computing and Applications (ICECAA), Tamilnadu, India, 2022, pp. 1664-1667, doi: 10.1109/ICECAA55415.2022.9936392. DOI: https://doi.org/10.1109/ICECAA55415.2022.9936392
Kumar, K. Rathor, S. Vaddi, D. Patel, P. Vanjarapu and M. Maddi, "ECG Based Early Heart Attack Prediction Using Neural Networks," 2022 3rd International Conference on Electronics and Sustainable Communication Systems (ICESC), Coimbatore, India, 2022, pp. 1080-1083, doi: 10.1109/ICESC54411.2022.9885448. DOI: https://doi.org/10.1109/ICESC54411.2022.9885448
K. Rathor, S. Lenka, K. A. Pandya, B. S. Gokulakrishna, S. S. Ananthan and Z. T. Khan, "A Detailed View on industrial Safety and Health Analytics using Machine Learning Hybrid Ensemble Techniques," 2022 International Conference on Edge Computing and Applications (ICECAA), Tamilnadu, India, 2022, pp. 1166-1169, doi: 10.1109/ICECAA55415.2022.9936474. DOI: https://doi.org/10.1109/ICECAA55415.2022.9936474
Manjunath C R, Ketan Rathor, Nandini Kulkarni, Prashant Pandurang Patil, Manoj S. Patil, & Jasdeep Singh. (2022). Cloud Based DDOS Attack Detection Using Machine Learning Architectures: Understanding the Potential for Scientific Applications. International Journal of Intelligent Systems and Applications in Engineering, 10(2s), 268 –. Retrieved
Wu, Y. (2023). Integrating Generative AI in Education: How ChatGPT Brings Challenges for Future Learning and Teaching. Journal of Advanced Research in Education, 2(4), 6-10. DOI: https://doi.org/10.56397/JARE.2023.07.02
K. Rathor, A. Mandawat, K. A. Pandya, B. Teja, F. Khan and Z. T. Khan, "Management of Shipment Content using Novel Practices of Supply Chain Management and Big Data Analytics," 2022 International Conference on Augmented Intelligence and Sustainable Systems (ICAISS), Trichy, India, 2022 DOI: https://doi.org/10.1109/ICAISS55157.2022.10011003
S. Rama Krishna, K. Rathor, J. Ranga, A. Soni, S. D and A. K. N, "Artificial Intelligence Integrated with Big Data Analytics for Enhanced Marketing," 2023 International Conference on Inventive Computation Technologies (ICICT), Lalitpur, Nepal, 2023, pp. 1073-1077, doi: 10.1109/ICICT57646.2023.10134043. DOI: https://doi.org/10.1109/ICICT57646.2023.10134043
M. A. Gandhi, V. Karimli Maharram, G. Raja, S. P. Sellapaandi, K. Rathor and K. Singh, "A Novel Method for Exploring the Store Sales Forecasting using Fuzzy Pruning LS-SVM Approach," 2023 2nd International Conference on Edge Computing and Applications (ICECAA), Namakkal, India, 2023, pp. 537-543, doi: 10.1109/ICECAA58104.2023.10212292. DOI: https://doi.org/10.1109/ICECAA58104.2023.10212292
K. Rathor, J. Kaur, U. A. Nayak, S. Kaliappan, R. Maranan and V. Kalpana, "Technological Evaluation and Software Bug Training using Genetic Algorithm and Time Convolution Neural Network (GA-TCN)," 2023 Second International Conference on Augmented Intelligence and Sustainable Systems (ICAISS), Trichy, India, 2023, pp. 7-12, doi: 10.1109/ICAISS58487.2023.10250760. [10] K. Rathor, S. Vidya, M. Jeeva, M. Karthivel, S. N. Ghate and V. Malathy, "Intelligent System for ATM Fraud Detection System using C-LSTM Approach," 2023 4th International Conference on Electronics and Sustainable Communication Systems (ICESC), Coimbatore, India, 2023, pp. 1439-1444, doi: 10.1109/ICESC57686.2023.10193398. DOI: https://doi.org/10.1109/ICESC57686.2023.10193398
K. Rathor, S. Chandre, A. Thillaivanan, M. Naga Raju, V. Sikka and K. Singh, "Archimedes Optimization with Enhanced Deep Learning based Recommendation System for Drug Supply Chain Management," 2023 2nd International Conference on Smart Technologies and Systems for Next Generation Computing (ICSTSN), Villupuram, India, 2023, pp. 1-6, doi: 10.1109/ICSTSN57873.2023.10151666. DOI: https://doi.org/10.1109/ICSTSN57873.2023.10151666
Ketan Rathor, "Impact of using Artificial Intelligence-Based Chatgpt Technology for Achieving Sustainable Supply Chain Management Practices in Selected Industries ," International Journal of Computer Trends and Technology, vol. 71, no. 3, pp. 34-40, 2023. Crossref, https://doi.org/10.14445/22312803/IJCTT-V71I3P106 DOI: https://doi.org/10.14445/22312803/IJCTT-V71I3P106
"Table of Contents," 2023 2nd International Conference on Smart Technologies and Systems for Next Generation Computing (ICSTSN), Villupuram, India, 2023, pp. i-iii, doi: 10.1109/ICSTSN57873.2023.10151517. DOI: https://doi.org/10.1109/ICSTSN57873.2023.10151517
"Table of Contents," 2023 Second International Conference on Augmented Intelligence and Sustainable Systems (ICAISS), Trichy, India, 2023, pp. i-xix, doi: 10.1109/ICAISS58487.2023.10250541 DOI: https://doi.org/10.1109/ICAISS58487.2023.10250541
Downloads
Published
Issue
Section
License
Copyright (c) 2024 International Journal of Scientific Research in Computer Science, Engineering and Information Technology
This work is licensed under a Creative Commons Attribution 4.0 International License.