A Review on the Mechanism Mitigating and Eliminating Internet Crimes using Modern Technologies: Mitigating Internet crimes using modern technologies

A Review on the Mechanism Mitigating and Eliminating Internet Crimes using Modern Technologies

Mitigating Internet crimes using modern technologies

Authors

  • Sahar Wahab khadim Ministry of Education, Karkh Second Directorate of Education, Iraq
  • oday Ali Hassen Wasit Education Directorate
  • Hussein k. Ibrahim Waist University, College of Computer Science and Information Technology

DOI:

https://doi.org/10.31185/wjcm.48

Keywords:

Cyber Crimes, AL, Telecommunication Infrastructure, HTTPS.

Abstract

There is no doubting that contemporary technology creates new hazards, and these threats are many and significant, directly harming people's lives and threatening their stability. Because of the increased use of computers and Internet-connected cellphones in recent years, the problem of cybercrime has expanded substantially. Unquestionably, this kind of crime is now a reality that jeopardizes people's reputations and lives, therefore we must be aware of it to prevent being a victim. The exponential growth in internet connectedness is closely tied to a rise in cyberattack incidences, frequently with significant consequences. Malware is the weapon of choice for carrying out malicious intent in cyberspace, whether by exploiting pre-existing flaws or exploiting the unique properties of new technology. There is an urgent need in the cybersecurity area to develop more inventive and effective virus defense techniques. To do this, we first give an overview of the most often exploited vulnerabilities in the current hardware, software, and network layers. This follows criticism of the most recent mitigation efforts and the reasons why they may or may not be helpful. Following that, We'll talk about new attack methods for cutting-edge technologies including social networking, cloud computing, mobile technology, as well as critical infrastructure. We conclude by sharing our speculative findings on potential future research avenues.

References

Karri, R., Rajendran, J., Rosenfeld, K., & Tehranipoor, M. . Trustworthy hard-ware,”dentifying and classifying hardware Trojans:, Comput-er, vol. 43. no. 10, pp. 39-46, 2001.

Potlapally, N., “ Hardware security in practice: Challenges and opportunities”, In 2011 IEEE International Symposium on Hardware-Oriented Security and Trust , pp. 93-98. IEEE , 2011.

Sadeghi, A. R. , “Trusted computing—special aspects and challenges”. In International Conference on Current Trends in Theory and Prac-tice of Computer Science (pp. 98-117), Springer, Berlin, Heidelberg , 2008.

Mouratidis, H., & Kang, M. , “Secure by Design: Developing Secure Software Systems from the Ground Up”, International Journal of Se-cure Software Engineering (IJSSE), 2(3), 23-41 , 2011.

Hoare, T., Misra, J., Leavens, G. T., & Shankar, N, “ The verified software initiative: A manifesto” , In Theories of Programming: The Life and Works of Tony Hoare (pp. 81-92) , 2021 .

Leino, K. R. M. , “ Dafny: An automatic program verifier for functional correctness”, In International conference on logic for programming artificial intelligence and reason-ing (pp. 348-370) , Springer, Berlin, Heidelberg , 2010 .

Gennaro, R., Katz, J., Krawczyk, H., & Rabin, T. , “ Secure network coding over the integers” , In International Workshop on Public Key Cryptography (pp. 142-160) , Springer, Berlin, Heidelberg , 2010 .

Boneh, D., & Freeman, D. M. , “ Homomorphic signatures for polynomial functions”, In annual international conference on the theory and applications of cryptographic techniques (pp. 149-168) , Springer, Berlin, Heidelberg , 2011 .

Fujita, M., Matsunaga, Y., & Kakuda, T., “On variable ordering of binary decision dia-grams for the application of multi-level logic synthe-sis”, In Proceedings of the Europe-an Conference on Design Automation. (pp. 50-54) , IEEE , 1991 .

Nielsen, C. B., Larsen, P. G., Fitzgerald, J., Woodcock, J., & Peleska, J., “ Systems of systems engineering: basic concepts, model-based techniques, and research directions” , ACM Computing Surveys (CSUR), 48(2), 1-41 , 2015 .

Hatcliff, J., Leavens, G. T., Leino, K. R. M., Müller, P., & Parkinson, M. , “ Behavioral interface specification languages”, ACM Compu-ting Surveys (CSUR), 44(3), 1-58 , 2012 .

X. Cheng, C. Chen, W. Zhang, and Y. Yang, “5G-Enabled cooperative intelligent ve-hicular (5GenCIV) framework: when Benz meets Mar-coni” , IEEE Intelligent Systems, vol. 32, no. 3, pp. 53–59, 2017, View at: Publisher Site | Google Scholar

Igure, V. M., & Williams, R. D. , “ Taxonomies of attacks and vulnerabilities in com-puter systems” , IEEE Communications Surveys & Tu-torials, 10(1), 6-19 , 2008 .

Igure, V. M., & Williams, R. D. ,“ Taxonomies of attacks and vulnerabilities in com-puter systems” , IEEE Communications Surveys & Tu-torials, 10(1), 6-19 , 2008 .

Fujita, M., Matsunaga, Y., & Kakuda, T. ,“On variable ordering of binary decision dia-grams for the application of multi-level logic synthe-sis” , In Proceedings of the Euro-pean Conference on Design Automatio , (pp. 50-54) , IEEE , 1991 .

Luiijf, E. , “Next Generation Information-Based Infrastructures: New Dependencies and Threats” , In Critical Information Infrastructure Protection and Resilience in the ICT Sector (pp. 304-317) , IGI Global , 2013 .

Haley, C., Laney, R., Moffett, J., & Nuseibeh, B. , “ Security requirements engineering: A framework for representation and analysis”, IEEE Transactions on Software Engi-neering, 34(1), 133-153 , 2008 .

X. Cheng, C. Chen, W. Zhang, and Y. Yang, “5G-Enabled cooperative intelligent ve-hicular (5GenCIV) framework: when Benz meets Mar-coni” , IEEE Intelligent Systems, vol. 32, no. 3, pp. 53–59, 2017 , View at: Publisher Site | Google Scholar

Lamport, L. , “Time, clocks, and the ordering of events in a distributed system”, In Concurrency: the Works of Leslie Lamport (pp. 179-196) , 2019 .

Howard, M., LeBlanc, D., & Viega, J , “ 24 deadly sins of software security: Program-ming flaws and how to fix them”, McGraw-Hill Ed-ucation , 2010 .

Whitman, M. E., & Mattord, H. J., “ Principles of information security”, Cengage learning , 2021 .

Sheldon, F. T., & Vishik, C. , “ Moving toward trustworthy systems: R&D Essentials”, Computer, 43(9),pp. 31-40 , 2010 .

Al-Khouri, A. M., “eGovernment strategies the case of the United Arab Emirates (UAE)”, European Journal of ePractice, 17(September),126-150, 2012.

Tsipenyuk, K., Chess, B., & McGraw, G. , “Seven pernicious kingdoms: A taxonomy of software security errors” , IEEE Security & Pri-vacy, 3(6), 81-84 , 2005 .

Gegick, M., Rotella, P., & Xie, T., “ Identifying security bug reports via text mining: An industrial case study”, In 2010 7th IEEE Working Conference on Mining Software , 2010 .

Almulhem, A., & Traore, I. , “ Experience with engineering a network forensics sys-tem” , 2005 .

Ancillotti, E., Bruno, R., & Conti, M. , “ The role of communication systems in smart grids: Architectures, technical solutions and research challenges” , Computer Commu-nications, 36(17-18), 1665-1697,2013.

Deepa, G., & Thilagam, P. S. , “ Securing web applications from injection and logic vulnerabilities: Approaches and challenges”, Infor-mation and Software Technology, 74, 160-180, 2016 .

Mairh, A., Barik, D., Verma, K., & Jena, D., “ Honeypot in network security: a sur-vey”, In Proceedings of the 2011 international confer-ence on communication, compu-ting & security (pp. 600-605) , 2011 .

Nikkel, B. J. , “ A portable network forensic evidence collector”, digital investigation, 3(3), 127-135 , 2006 .

Fischer, F., Mansmann, F., Keim, D. A., Pietzko, S., & Waldvogel, M., “ Large-scale network monitoring for visual analysis of attacks” , In International Workshop on Vis-ualization for Computer Security (pp. 111-118) ,Springer, Berlin, Heidelberg , 2008 .

Lu, H. K., & Ali, A. , “Communication security between a computer and a hardware token”, In Third International Conference on Systems (icons 2008) (pp. 220-225) , IEEE , 2008 .

Lu, H. K., Ali, A. M., Durand, S., & Castillo, L., “A new secure communication framework for smart cards”, In 2009 6th IEEE Consumer Communications and Net-working Conference (pp. 1-5) , IEEE , 2009 .

Aloul, F., Zahidi, S., & El-Hajj, W. , “Two factor authentication using mobile phones”, In 2009 IEEE/ACS international conference on computer systems and applications (pp. 641-644) , IEEE , 2009 .

Xiao, Y., Jia, Y., Liu, C., Cheng, X., Yu, J., & Lv, W. , “ Edge computing security: State of the art and challenges”, Proceedings of the IEEE, 107(8), 1608-1631 , 2019 .

Dmitrienko, A., Liebchen, C., Rossow, C., & Sadeghi, A. R. , “On the (in) security of mobile two-factor authentication”, In International Conference on Financial Cryptog-raphy and Data Security (pp. 365-383) , Springer, Berlin, Heidelberg , 2014 .

Xiao, Y., Jia, Y., Liu, C., Cheng, X., Yu, J., & Lv, W. , “Edge computing security: State of the art and challenges”, Proceedings of the IEEE, 107(8), 1608-1631, 2019 .

Ometov, A., Bezzateev, S., Mäkitalo, N., Andreev, S., Mikkonen, T., & Koucheryavy, Y. , “ Multi-factor authentication: A survey” , Cryp-tography, 2(1), 1 , 2018 .

Bringer, J., & Chabanne, H. , “ An authentication protocol with encrypted biometric da-ta”, In International Conference on Cryptology in Af-rica (pp. 109-124) , Springer, Berlin, Heidelberg, 2008 .

Hunker, J., & Probst, C. W., “ Insiders and Insider Threats-An Overview of Definitions and Mitigation Techniques”, J. Wirel. Mob. Net-works Ubiquitous Comput, Dependa-ble Appl , 2(1), 4-27 , 2011 .

Guarda, P., & Zannone, N. , “ Towards the development of privacy-aware systems”, Information and Software Technology, 51(2), 337-350 , 2009 .

Walters, J. P., Liang, Z., Shi, W., & Chaudhary, V. , “ Wireless sensor network security: A survey”, In Security in distributed, grid, mobile, and pervasive computing (pp. 367-409) , Auerbach Publications , 2007 .

Walters, J. P., Liang, Z., Shi, W., & Chaudhary, V. , “ Wireless sensor network security: A survey”, Security in distributed, grid, and per-vasive computing, 208-222 , 2006 .

Zhou, Y., Fang, Y., & Zhang, Y. , “ Securing wireless sensor networks: a survey”, IEEE Communications Surveys & Tutorials, 10(3), 6-28 , 2008 .

Abraham, S., & Chengalur-Smith, I. , “An overview of social engineering malware: Trends, tactics, and implications”, Technology in Socie-ty, 32(3), 183-196 , 2010 .

Mouton, F., Leenen, L., & Venter, H. S. , “ Social engineering attack examples, tem-plates and scenarios” , Computers & Security, 59, 186-209, 2016 .

Mouton, F., Leenen, L., & Venter, H. S. , “ Social engineering attack examples, tem-plates and scenarios”, Computers & Security, 59, 186-209.2016 .

Ozsoy, M., Donovick, C., Gorelik, I., Abu-Ghazaleh, N., & Ponomarev, D. , “ Mal-ware-aware processors: A framework for efficient online malware detection”, In 2015 IEEE 21st International Symposium on High Performance Computer Architecture (HPCA) (pp. 651-661). IEEE , 2015 .

H, k. Ibrahim O, A. Hassen, "Preventive Approach against HULK Attacks in Network Environment", International Journal of Computing and Business Research (IJCBR), VOL, 7, NO, 3, PP.1-11, 2020.

Sharma, Y., Javadi, B., Si, W., & Sun, D. , “ Reliability and energy efficiency in cloud computing systems: Survey and taxonomy” , Journal of Network and Computer Appli-cations, 74, 66-85, 2016 .

Vance, A., Anderson, B. B., Kirwan, C. B., & Eargle, D. , “ Using measures of risk per-ception to predict information security behavior: In-sights from electroencephalography (EEG)” , Journal of the Association for Information Systems, 15(10), 2 , 2014 .

Junger, M., Montoya, L., & Overink, F. J. , “ Priming and warnings are not effective to prevent social engineering attacks” , Computers in human behavior, 66, 75-87 , 2017 .

Aldawood, H., & Skinner, G., “ Reviewing cyber security social engineering training and awareness programs—Pitfalls and ongoing is-sues”, Future Internet, 11(3), 73 , 2019 .

Mouton, F., Leenen, L., Malan, M. M., & Venter, H. S. , “Towards an ontological model defining the social engineering domain” ,In IFIP International Conference on Human Choice and Computers (pp. 266-279), Springer, Berlin, Heidelberg , 2014 .

Gross, R., & Acquisti, A. , “ Information revelation and privacy in online social net-works”, In Proceedings of the 2005 ACM workshop on Privacy in the electronic socie-ty (pp. 71-80) , 2005 .

Ellison, N. B., Steinfield, C., & Lampe, C. , “ The benefits of Facebook “friends:” So-cial capital and college students’ use of online social network sites”, Journal of com-puter‐mediated communication, 12(4), 1143-1168 , 2007 .

Van Dijck, J. , “ The culture of connectivity: A critical history of social media ”, Ox-ford University Press , 2013 .

Boyd, D. M., & Ellison, N. B. , “ Social network sites: Definition, history, and scholar-ship” , Journal of computer‐mediated Communica-tion, 13(1), 210-230 , 2007 .

Luo, W., Liu, J., Liu, J., & Fan, C., “ An analysis of security in social networks”, In 2009 Eighth IEEE International Conference on De-pendable, Autonomic and Secure Computing (pp. 648-651), IEEE , 2009 .

Rathore, S., Sharma, P. K., Loia, V., Jeong, Y. S., & Park, J. H. , “Social network secu-rity: Issues, challenges, threats, and solutions, In-formation sciences, 421, 43-69, 2017 .

Abu-Nimeh, S., Chen, T., & Alzubi, O. , “ Malicious and spam posts in online social networks” , Computer, 44(9), 23-28 , 2011 .

Ajami, R., Ramadan, N., Mohamed, N., & Al-Jaroodi, J., “ Security challenges and ap-proaches in online social networks: A sur-vey”, IJCSNS, 11(8), 1 , 2011 .

Li, J. S., Chen, L. C., Monaco, J. V., Singh, P., & Tappert, C. C. , “ A comparison of classifiers and features for authorship authentication of social networking messages” , Concurrency and Computation: Practice and Experience, 29(14), e3918, 2017 .

Thomas, K., & Nicol, D. M. , “ The Koobface botnet and the rise of social malware”, In 2010 5th International Conference on Malicious and Unwanted Software (pp. 63-70) , IEEE, 2010 .

Luo, W., Liu, J., Liu, J., & Fan, C., “ An analysis of security in social networks”, In 2009 Eighth IEEE International Conference on De-pendable, Autonomic and Secure Computing (pp. 648-651) , IEEE,2009 .

Rupprecht, D., Kohls, K., Holz, T., & Pöpper, C. , “Breaking LTE on layer two”, In 2019 IEEE Symposium on Security and Privacy (SP) (pp. 1121-1136), IEEE, 2019 .

Dabrowski, A., Petzl, G., & Weippl, E. R. , “The messenger shoots back: Network op-erator based IMSI catcher detection” , In International Symposium on Research in At-tacks, Intrusions, and Defenses (pp. 279-302), Springer, Cham , 2016 .

Dabrowski, A., Petzl, G., & Weippl, E. R. , “ The messenger shoots back: Network op-erator based IMSI catcher detection”, In International Symposium on Research in At-tacks, Intrusions, and Defenses (pp. 279-302), Springer, Cham , 2016 .

Jurecek, M., Bucek, J., & Lórencz, R. , “ Side-Channel Attack on the A5/1 Stream Ci-pher” , In 2019 22nd Euromicro Conference on Digital System Design (DSD) (pp. 633-638), IEEE,2019 .

Mulliner, C. R. , “ Security of smart phones” , (Doctoral dissertation, University of California, Santa Barbara) , 2006 .

Töyssy, S., & Helenius, M., “About malicious software in smartphones”, Journal in Computer Virology, 2(2), 109-119,2006 .

Ancillotti, E., Bruno, R., & Conti, M. , “The role of communication systems in smart grids: Architectures, technical solutions and research challenges” , Computer Commu-nications, 36(17-18), 1665-1697,2013 .

Ancillotti, E., Bruno, R., & Conti, M. , “ The role of the RPL routing protocol for smart grid communications”, IEEE Communications Magazine, 51(1), 75-83,2013 .

Paul, S., Pan, J., & Jain, R., “ Architectures for the future networks and the next genera-tion Internet: A survey”, Computer Communica-tions, 34(1), 2-42 , 2011 .

Pan, J., Paul, S., & Jain, R. , “ A survey of the research on future internet architec-tures”, IEEE Communications Magazine, 49(7), 26-36 , 2011 .

O, A. hassen, “Big Data Based Machine Learning and Predictive Analytics using Apache Mahout and Storm”, International Refereed Jour-nal of Reviews and Research, Volume 5 Issue 5 Sep. 2017.

N, A, Abu, and Z. Zainal Abidin , “Human Identification System: A Review”‏ , Interna-tional Journal of Computing and Business Research (IJCBR), Vol. 9. Issue 3, pp. 1-26, September 2019.

Al-Saedi, K.H.K., Implementation Patterns of AquaSim for Simulation of Underwater Acoustic Wireless Sensor Networks. Wasit Journal of Computer and Mathematics Science, 2021: p. 84-92.

Verma, H., Internet of Robotics Things (IoRT) Based Integration of Robotic Applications for Advanced Research. Wasit Journal of Computer and Mathematics Science, 2021: p. 9-16.

Kh-Madhloom, J., Dynamic Cryptography Integrated Secured Decentralized Applications with Blockchain Programming. Wasit Journal of Computer and Mathematics Sciences, 2022. 1(2): p. 21-33.

Al-ogaili, H. and A.M. Shadhar, the Finger Vein Recognition Using Deep Learning Technique. Wasit Journal of Computer and Mathematics Sciences, 2022. 1(2): p. 1-11.

Zubain, N.A. and A. Al-Hachami, Certain Types of Function Via Alpha-Open Sets. Wasit Journal of Pure sciences, 2022. 1(2): p. 96-101.

Taresh, M.R. and A. Al-Hachami, On normal space: OR, Og. Wasit Journal of Pure sciences, 2022. 1(2): p. 61-70.

Roa'a M. Al_airaji., et al., Face Patterns Analysis and Recognition System Based on Quantum Neural Network QNN. International Journal of Interactive Mobile Technologies, 2022. 16(8).

Salim Haider, H.T.Hazim., Secure Chaos of 5G Wireless Communication System Based on IOT Applications. International Journal of Online and Biomedical Engineering(iJOE), 2022. 18(12): p. 89-102.

Alaidi, A.H.M., et al., Dark Web Illegal Activities Crawling and Classifying Using Data Mining Techniques. International Journal of Interactive Mobile Technologies, 2022. 16(10).

H. Alrikabi, H.T.H., Enhanced Data Security of Communication System using Combined Encryption and Steganography. International Journal of Interactive Mobile Technologies, 2021. 15(16): p. 144-157.

Khorsheed, Murad B., et al. , “The Application of Fractal Transform and Entropy for Improving Fault Tolerance and Load Balancing in Grid Computing Environments” , Entropy 22.12 (2020): 1410.

Downloads

Published

2022-10-01

How to Cite

khadim, S., Ali Hassen, oday, & Ibrahim, H. (2022). A Review on the Mechanism Mitigating and Eliminating Internet Crimes using Modern Technologies: Mitigating Internet crimes using modern technologies. Wasit Journal of Computer and Mathematics Sciences, 1(3), 76–108. https://doi.org/10.31185/wjcm.48

Issue

Section

Computer
Loading...