A Review on the Mechanism Mitigating and Eliminating Internet Crimes using Modern Technologies

Mitigating Internet crimes using modern technologies

Authors

  • Sahar Wahab khadim Ministry of Education, Karkh Second Directorate of Education, Iraq
  • oday Ali Hassen Ministry of Education, Wasit Education Directorate, Iraq
  • Hussein k. Ibrahim Waist University, College of Computer Science and Information Technology. Iraq

DOI:

https://doi.org/10.31185/wjcm.48

Keywords:

Cyber Crimes, AL, Telecommunication Infrastructure, HTTPS.

Abstract

There is no doubting that contemporary technology creates new hazards, and these threats are many and significant, directly harming people's lives and threatening their stability. Because of the increased use of computers and Internet-connected cellphones in recent years, the problem of cybercrime has expanded substantially. Unquestionably, this kind of crime is now a reality that jeopardizes people's reputations and lives, therefore we must be aware of it to prevent being a victim. The exponential growth in internet connectedness is closely tied to a rise in cyberattack incidences, frequently with significant consequences. Malware is the weapon of choice for carrying out malicious intent in cyberspace, whether by exploiting pre-existing flaws or exploiting the unique properties of new technology. There is an urgent need in the cybersecurity area to develop more inventive and effective virus defense techniques. To do this, we first give an overview of the most often exploited vulnerabilities in the current hardware, software, and network layers. This follows criticism of the most recent mitigation efforts and the reasons why they may or may not be helpful. Following that, We'll talk about new attack methods for cutting-edge technologies including social networking, cloud computing, mobile technology, as well as critical infrastructure. We conclude by sharing our speculative findings on potential future research avenues.

References

R. Karri, J. Rajendran, K. Rosenfeld, and M. Tehranipoor, “Trustworthy hardware,”dentifying and classifying hardware Trojans,” Comput-er, vol. 43, no. 10, pp. 39–46, 2001.

N. Potlapally, “Hardware security in practice: Challenges and opportunities,” 2011 IEEE International Symposium on Hardware-Oriented Security and Trust, pp. 93–98, 2011.

A. R. Sadeghi, “Trusted computing-special aspects and challenges,” in International Conference on Current Trends in Theory and Prac-tice of Computer Science, pp. 98–117, Springer, 2008.

H. Mouratidis and M. Kang, “Secure by Design: Developing Secure Software Systems from the Ground Up”,” International Journal of Se-cure Software Engineering (IJSSE), vol. 2, no. 3, pp. 23–41, 2011.

T. Hoare, J. Misra, G. T. Leavens, and Shankar, “The verified software initiative: A manifesto,” Theories of Programming: The Life and Works of Tony Hoare, pp. 2021–2021.

K. R. M. Leino and Dafny, “An automatic program verifier for functional correctness,” in International conference on logic for programming artificial intelligence and reasoning, pp. 348–370, Springer, 2010.

R. Gennaro, J. Katz, H. Krawczyk, and T. Rabin, “Secure network coding over the integers,” in International Workshop on Public Key

Cryptography, pp. 142–160, Springer, 2010.

D. Boneh and D. M. Freeman, “Homomorphic signatures for polynomial functions,” in annual international conference on the theory and applications of cryptographic techniques, pp. 149–168, Springer, 2011.

M. Fujita, Y. Matsunaga, and T. Kakuda, “On variable ordering of binary decision diagrams for the application of multi-level logic synthe-sis,” Proceedings of the European Conference on Design Automation, pp. 50–54, 1991.

C. B. Nielsen, P. G. Larsen, J. Fitzgerald, J. Woodcock, and J. Peleska, “Systems of systems engineering: basic concepts, model-based techniques, and research directions”,” ACM Computing Surveys (CSUR), vol. 48, no. 2, pp. 1–41, 2015.

J. Hatcliff, G. T. Leavens, K. R. M. Leino, P. Müller, and M. Parkinson, “Behavioral interface specification languages,” ACM Compu-ting Surveys (CSUR), vol. 44, no. 3, pp. 1–58, 2012.

X. Cheng, C. Chen, W. Zhang, and Y. Yang, “5G-Enabled cooperative intelligent vehicular (5GenCIV) framework: when Benz meets Mar-coni”,” IEEE Intelligent Systems, vol. 32, no. 3, pp. 53–59, 2017.

V. M. Igure and R. D. Williams, “Taxonomies of attacks and vulnerabilities in computer systems,” IEEE Communications Surveys & Tu-torials, vol. 10, no. 1, pp. 6–19, 2008.

V. M. Igure and R. D. Williams, “Taxonomies of attacks and vulnerabilities in computer systems,” IEEE Communications Surveys & Tu-torials, vol. 10, no. 1, pp. 6–19, 2008.

M. Fujita, Y. Matsunaga, and T. Kakuda, “On variable ordering of binary decision diagrams for the application of multi-level logic synthe-sis,” Proceedings of the European Conference on Design Automatio, pp. 50–54, 1991.

E. Luiijf Next Generation Information-Based Infrastructures: New Dependencies and Threats” , In Critical Information Infrastructure Protection and Resilience in the ICT Sector, pp. 304–317, 2013.

C. Haley, R. Laney, J. Moffett, and B. Nuseibeh, “Security requirements engineering: A framework for representation and analysis,” IEEE Transactions on Software Engineering, vol. 34, no. 1, pp. 133–153, 2008.

X. Cheng, C. Chen, W. Zhang, and Y. Yang, “5G-Enabled cooperative intelligent vehicular (5GenCIV) framework: when Benz meets Mar-coni”,” IEEE Intelligent Systems, vol. 32, no. 3, pp. 53–59, 2017.

L. Lamport, “Time, clocks, and the ordering of events in a distributed system,” Concurrency: the Works of Leslie Lamport, pp. 179–196, 2019.

M. Howard, D. Leblanc, and Viega, “24 deadly sins of software security: Programming flaws and how to fix them”, McGraw-Hill Ed-ucation,” 2010.

M. E. Whitman and H. J. Mattord, “Principles of information security”, Cengage learning,” 2021.

F. T. Sheldon and C. Vishik, “Moving toward trustworthy systems,” R&D Essentials”, vol. 43, no. 9, pp. 31–40, 2010.

A. M. Al-Khouri, ““eGovernment strategies the case of the United Arab Emirates (UAE)”,” European Journal of ePractice, vol. 17, pp. 126–150, 2012.

K. Tsipenyuk, B. Chess, and G. Mcgraw, “Seven pernicious kingdoms: A taxonomy of software security errors,” IEEE Security & Pri-vacy, vol. 3, no. 6, pp. 81–84, 2005.

M. Gegick, P. Rotella, and T. Xie, “Identifying security bug reports via text mining: An industrial case study,” 2010 7th IEEE Working Conference on Mining Software, 2010.

A. Almulhem and I. Traore, “Experience with engineering a network forensics system,” 2005.

E. Ancillotti, R. Bruno, and M. Conti, “The role of communication systems in smart grids: Architectures, technical solutions and research challenges”,” Computer Communications, vol. 36, pp. 1665–1697, 2013.

G. Deepa and P. S. Thilagam Securing web applications from injection and logic vulnerabilities: Approaches and challenges”, Infor-mation and Software Technology, vol. 74, pp. 160–180, 2016.

A. Mairh, D. Barik, K. Verma, and D. Jena, “Honeypot in network security: a survey,” Proceedings of the 2011 international confer-ence on communication, computing & security, pp. 600–605, 2011.

B. J. Nikkel A portable network forensic evidence collector”, digital investigation, vol. 3, pp. 127–135, 2006.

F. Fischer, F. Mansmann, D. A. Keim, S. Pietzko, and M. Waldvogel, “Large-scale network monitoring for visual analysis of attacks,” in International Workshop on Visualization for Computer Security, pp. 111–118, Springer, 2008.

H. K. Lu and A. Ali, “Communication security between a computer and a hardware token,” Third International Conference on Systems, pp. 220– 225, 2008.

H. K. Lu, A. M. Ali, S. Durand, and L. Castillo, “A new secure communication framework for smart cards,” 6th IEEE Consumer Communications and Networking Conference, pp. 1–5, 2009.

F. Aloul, S. Zahidi, and W. El-Hajj, “Two factor authentication using mobile phones,” 2009 IEEE/ACS international conference on computer systems and applications, pp. 641–644, 2009.

Y. Xiao, Y. Jia, C. Liu, X. Cheng, J. Yu, and W. Lv, “Edge computing security: State of the art and challenges,” Proceedings of the IEEE, vol. 107, no. 8, pp. 1608–1631, 2019.

A. Dmitrienko, C. Liebchen, C. Rossow, and A. R. Sadeghi, “On the (in) security of mobile two-factor authentication,” in International Conference on Financial Cryptography and Data Security, pp. 365–383, Springer, 2014.

Y. Xiao, Y. Jia, C. Liu, X. Cheng, J. Yu, and W. Lv, “Edge computing security: State of the art and challenges,” Proceedings of the IEEE, vol. 107, no. 8, pp. 1608–1631, 2019.

A. Ometov, S. Bezzateev, N. Mäkitalo, S. Andreev, T. Mikkonen, and Y. Koucheryavy, “Multi-factor authentication: A survey,” Cryp-tography, vol. 2, pp. 1–1, 2018.

J. Bringer and H. Chabanne, “An authentication protocol with encrypted biometric data,” in International Conference on Cryptology in Af-rica, pp. 109–124, Springer, 2008.

J. Hunker and C. W. Probst, “Insiders and Insider Threats-An Overview of Definitions and Mitigation Techniques,” J. Wirel. Mob. Net-works Ubiquitous Comput, Dependable Appl, vol. 2, no. 1, pp. 4–27, 2011.

P. Guarda and N. Zannone, “Towards the development of privacy-aware systems,” Information and Software Technology, vol. 51, pp. 337–350, 2009.

J. P. Walters, Z. Liang, W. Shi, and V. Chaudhary, “Wireless sensor network security: A survey,” Security in distributed, grid, mobile, and pervasive computing, pp. 367–409, 2007.

J. P. Walters, Z. Liang, W. Shi, and V. Chaudhary, “Wireless sensor network security: A survey”, Security in distributed, grid, and per-vasive computing,” 2006. 208-222.

Y. Zhou, Y. Fang, and Y. Zhang, “Securing wireless sensor networks: a survey,” IEEE Communications Surveys & Tutorials, vol. 10, no. 3, pp. 6–28, 2008.

S. Abraham and I. Chengalur-Smith, “An overview of social engineering malware: Trends, tactics, and implications”,” Technology in Socie-ty, vol. 32, no. 3, pp. 183–196, 2010.

F. Mouton, L. Leenen, and H. S. Venter, “Social engineering attack examples, templates and scenarios,” Computers & Security, vol. 59, pp. 186– 209, 2016.

F. Mouton, L. Leenen, and H. S. Venter, “Social engineering attack examples, templates and scenarios,” Computers & Security, vol. 59, pp. 186– 209, 2016.

M. Ozsoy, C. Donovick, I. Gorelik, N. Abu-Ghazaleh, and D. Ponomarev, “Malware-aware processors: A framework for efficient online malware detection,” 2015 IEEE 21st International Symposium on High Performance Computer Architecture (HPCA), pp. 651–661, 2015.

H, K. Ibrahim, O, and A. Hassen, “Preventive Approach against HULK Attacks in Network Environment,” International Journal of Computing and Business Research (IJCBR), vol. 7, no. 3, pp. 1–11, 2020.

Y. Sharma, B. Javadi, W. Si, and D. Sun, “Reliability and energy efficiency in cloud computing systems: Survey and taxonomy”,” Journal of Network and Computer Applications, vol. 74, pp. 66–85, 2016.

A. Vance, B. B. Anderson, C. B. Kirwan, and D. Eargle, “Using measures of risk perception to predict information security behavior: In-sights from electroencephalography (EEG)”,” Journal of the Association for Information Systems, vol. 15, no. 10, 2014.

M. Junger, L. Montoya, and F. J. Overink, “Priming and warnings are not effective to prevent social engineering attacks”,” Computers in human behavior, vol. 66, pp. 75–87, 2017.

H. Aldawood and G. Skinner, “Reviewing cyber security social engineering training and awareness programs-Pitfalls and ongoing is-sues”,” Future Internet, vol. 11, no. 3, pp. 73–73, 2019.

F. Mouton, L. Leenen, M. M. Malan, and H. S. Venter, “Towards an ontological model defining the social engineering domain,” in IFIP International Conference on Human Choice and Computers, pp. 266–279, Springer, 2014.

R. Gross and A. Acquisti, “Information revelation and privacy in online social networks,” Proceedings of the 2005 ACM workshop on Privacy in the electronic society, pp. 71–80, 2005.

N. B. Ellison, C. Steinfield, and C. Lampe, “The benefits of Facebook “friends:” Social capital and college students’ use of online social network sites”,” Journal of computer-mediated communication, vol. 12, no. 4, pp. 1143–1168, 2007.

J. V. Dijck, “The culture of connectivity: A critical history of social media,” 2013. Oxford University Press.

D. M. Boyd and N. B. Ellison, “Social network sites: Definition, history, and scholarship”,” Journal of computer-mediated Communica-tion, vol. 13, no. 1, pp. 210–230, 2007.

W. Luo, J. Liu, J. Liu, and C. Fan, “An analysis of security in social networks,” Eighth IEEE International Conference on De-pendable, pp. 648– 651, 2009.

S. Rathore, P. K. Sharma, V. Loia, Y. S. Jeong, and J. H. Park Social network security: Issues, challenges, threats, and solutions, In-formation sciences, vol. 421, pp. 43–69, 2017.

S. Abu-Nimeh, T. Chen, and O. Alzubi, “Malicious and spam posts in online social networks,” Computer, vol. 44, no. 9, pp. 23–28, 2011.

R. Ajami, N. Ramadan, N. Mohamed, and J. Jaroodi, “Security challenges and approaches in online social networks: A sur-vey”,” IJCSNS, vol. 11, no. 8, pp. 1–1, 2011.

J. S. Li, L. C. Chen, J. V. Monaco, P. Singh, and C. C. Tappert, “A comparison of classifiers and features for authorship authentication of social networking messages,” Concurrency and Computation: Practice and Experience, vol. 29, no. 14, pp. 3918–3918, 2017.

K. Thomas and D. M. Nicol, “The Koobface botnet and the rise of social malware,” 2010 5th International Conference on Malicious and Unwanted Software, pp. 63–70, 2010.

W. Luo, J. Liu, J. Liu, and C. Fan, “An analysis of security in social networks,” Eighth IEEE International Conference on De-pendable, pp. 648– 651, 2009.

D. Rupprecht, K. Kohls, T. Holz, and C. Pöpper, “Breaking LTE on layer two,” 2019 IEEE Symposium on Security and Privacy (SP), pp. 1121– 1136, 2019.

A. Dabrowski, G. Petzl, and E. R. Weippl, “The messenger shoots back: Network operator based IMSI catcher detection,” in International Symposium on Research in Attacks, Intrusions, and Defenses, pp. 279–302, Springer, 2016.

A. Dabrowski, G. Petzl, and E. R. Weippl, “The messenger shoots back: Network operator based IMSI catcher detection,” in International Symposium on Research in Attacks, Intrusions, and Defenses, pp. 279–302, Springer, 2016.

M. Jurecek, J. Bucek, and R. Lórencz, “Side-Channel Attack on the A5/1 Stream Cipher, 633-638,” 2019. IEEE.

C. R. Mulliner, Security of smart phones” , (Doctoral dissertation. 2006.

S. Töyssy and M. Helenius, “About malicious software in smartphones”,” Journal in Computer Virology, vol. 2, no. 2, pp. 109–119, 2006.

E. Ancillotti, R. Bruno, and M. Conti, “The role of communication systems in smart grids: Architectures, technical solutions and research challenges”,” Computer Communications, vol. 36, pp. 1665–1697, 2013.

E. Ancillotti, R. Bruno, and M. Conti, “The role of the RPL routing protocol for smart grid communications,” IEEE Communications Magazine, vol. 51, no. 1, pp. 75–83, 2013.

S. Paul, J. Pan, and R. Jain, “Architectures for the future networks and the next generation Internet: A survey”,” Computer Communica-tions, vol. 34, no. 1, pp. 2–42, 2011.

J. Pan, S. Paul, and R. Jain, “A survey of the research on future internet architectures,” IEEE Communications Magazine, vol. 49, no. 7, pp. 26–36, 2011.

O and A. Hassen, “Big Data Based Machine Learning and Predictive Analytics using Apache Mahout and Storm”,” International Refereed Jour-nal of Reviews and Research, vol. 5, 2017.

N, A. Abu, and Z. Abidin, “Human Identification System: A Review”,” International Journal of Computing and Business Research (IJCBR), vol. 9, pp. 1–26, 2019.

M. B. Khorsheed, “The Application of Fractal Transform and Entropy for Improving Fault Tolerance and Load Balancing in Grid Computing Environments,” Entropy, vol. 22, pp. 1410–1410, 2020.

Downloads

Published

2022-09-30

Issue

Section

Computer

How to Cite

[1]
S. khadim, oday Ali Hassen, and H. Ibrahim, “A Review on the Mechanism Mitigating and Eliminating Internet Crimes using Modern Technologies: Mitigating Internet crimes using modern technologies”, WJCMS, vol. 1, no. 3, pp. 50–68, Sep. 2022, doi: 10.31185/wjcm.48.