A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions

No Thumbnail Available

Date

2023

Journal Title

Journal ISSN

Volume Title

Publisher

Mdpi

Open Access Color

GOLD

Green Open Access

No

OpenAIRE Downloads

OpenAIRE Views

Publicly Funded

No
Impulse
Top 0.01%
Influence
Top 1%
Popularity
Top 0.1%

Research Projects

Journal Issue

Abstract

Internet usage has grown exponentially, with individuals and companies performing multiple daily transactions in cyberspace rather than in the real world. The coronavirus (COVID-19) pandemic has accelerated this process. As a result of the widespread usage of the digital environment, traditional crimes have also shifted to the digital space. Emerging technologies such as cloud computing, the Internet of Things (IoT), social media, wireless communication, and cryptocurrencies are raising security concerns in cyberspace. Recently, cyber criminals have started to use cyber attacks as a service to automate attacks and leverage their impact. Attackers exploit vulnerabilities that exist in hardware, software, and communication layers. Various types of cyber attacks include distributed denial of service (DDoS), phishing, man-in-the-middle, password, remote, privilege escalation, and malware. Due to new-generation attacks and evasion techniques, traditional protection systems such as firewalls, intrusion detection systems, antivirus software, access control lists, etc., are no longer effective in detecting these sophisticated attacks. Therefore, there is an urgent need to find innovative and more feasible solutions to prevent cyber attacks. The paper first extensively explains the main reasons for cyber attacks. Then, it reviews the most recent attacks, attack patterns, and detection techniques. Thirdly, the article discusses contemporary technical and nontechnical solutions for recognizing attacks in advance. Using trending technologies such as machine learning, deep learning, cloud platforms, big data, and blockchain can be a promising solution for current and future cyber attacks. These technological solutions may assist in detecting malware, intrusion detection, spam identification, DNS attack classification, fraud detection, recognizing hidden channels, and distinguishing advanced persistent threats. However, some promising solutions, especially machine learning and deep learning, are not resistant to evasion techniques, which must be considered when proposing solutions against intelligent cyber attacks.

Description

YILMAZ, Abdullah Asım/0000-0002-3014-609X; Ozkan, Merve/0000-0002-1071-2541; ASLAN, Omer/0000-0003-0737-1966

Keywords

cyber security, cyber attacks, cyber threats, network security

Turkish CoHE Thesis Center URL

Fields of Science

Citation

WoS Q

Q2

Scopus Q

Q2
OpenCitations Logo
OpenCitations Citation Count
202

Source

Electronics

Volume

12

Issue

6

Start Page

1333

End Page

Collections

PlumX Metrics
Citations

CrossRef : 11

Scopus : 486

Captures

Mendeley Readers : 1600

SCOPUS™ Citations

489

checked on Feb 03, 2026

Web of Science™ Citations

223

checked on Feb 03, 2026

Page Views

4

checked on Feb 03, 2026

Google Scholar Logo
Google Scholar™
OpenAlex Logo
OpenAlex FWCI
231.20450554

Sustainable Development Goals

5

GENDER EQUALITY
GENDER EQUALITY Logo