A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions

dc.contributor.author Aslan, Omer
dc.contributor.author Aktug, Semih Serkant
dc.contributor.author Ozkan-Okay, Merve
dc.contributor.author Yilmaz, Abdullah Asim
dc.contributor.author Akin, Erdal
dc.contributor.other Mechanical Engineering
dc.contributor.other 06. School Of Engineering
dc.contributor.other 01. Atılım University
dc.date.accessioned 2024-07-05T15:25:05Z
dc.date.available 2024-07-05T15:25:05Z
dc.date.issued 2023
dc.description YILMAZ, Abdullah Asım/0000-0002-3014-609X; Ozkan, Merve/0000-0002-1071-2541; ASLAN, Omer/0000-0003-0737-1966 en_US
dc.description.abstract Internet usage has grown exponentially, with individuals and companies performing multiple daily transactions in cyberspace rather than in the real world. The coronavirus (COVID-19) pandemic has accelerated this process. As a result of the widespread usage of the digital environment, traditional crimes have also shifted to the digital space. Emerging technologies such as cloud computing, the Internet of Things (IoT), social media, wireless communication, and cryptocurrencies are raising security concerns in cyberspace. Recently, cyber criminals have started to use cyber attacks as a service to automate attacks and leverage their impact. Attackers exploit vulnerabilities that exist in hardware, software, and communication layers. Various types of cyber attacks include distributed denial of service (DDoS), phishing, man-in-the-middle, password, remote, privilege escalation, and malware. Due to new-generation attacks and evasion techniques, traditional protection systems such as firewalls, intrusion detection systems, antivirus software, access control lists, etc., are no longer effective in detecting these sophisticated attacks. Therefore, there is an urgent need to find innovative and more feasible solutions to prevent cyber attacks. The paper first extensively explains the main reasons for cyber attacks. Then, it reviews the most recent attacks, attack patterns, and detection techniques. Thirdly, the article discusses contemporary technical and nontechnical solutions for recognizing attacks in advance. Using trending technologies such as machine learning, deep learning, cloud platforms, big data, and blockchain can be a promising solution for current and future cyber attacks. These technological solutions may assist in detecting malware, intrusion detection, spam identification, DNS attack classification, fraud detection, recognizing hidden channels, and distinguishing advanced persistent threats. However, some promising solutions, especially machine learning and deep learning, are not resistant to evasion techniques, which must be considered when proposing solutions against intelligent cyber attacks. en_US
dc.identifier.doi 10.3390/electronics12061333
dc.identifier.issn 2079-9292
dc.identifier.scopus 2-s2.0-85151702439
dc.identifier.uri https://doi.org/10.3390/electronics12061333
dc.identifier.uri https://hdl.handle.net/20.500.14411/2505
dc.language.iso en en_US
dc.publisher Mdpi en_US
dc.rights info:eu-repo/semantics/openAccess en_US
dc.subject cyber security en_US
dc.subject cyber attacks en_US
dc.subject cyber threats en_US
dc.subject network security en_US
dc.title A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions en_US
dc.type Review en_US
dspace.entity.type Publication
gdc.author.id YILMAZ, Abdullah Asım/0000-0002-3014-609X
gdc.author.id Ozkan, Merve/0000-0002-1071-2541
gdc.author.id ASLAN, Omer/0000-0003-0737-1966
gdc.author.institutional Aslan, Özgür
gdc.author.scopusid 57201115541
gdc.author.scopusid 57854292000
gdc.author.scopusid 57210744769
gdc.author.scopusid 57210803267
gdc.author.scopusid 57193883254
gdc.author.wosid YILMAZ, Abdullah Asım/AAI-1622-2020
gdc.coar.access open access
gdc.coar.type text::review
gdc.description.department Atılım University en_US
gdc.description.departmenttemp [Aslan, Omer] Bandirma Onyedi Eylul Univ, Dept Software Engn, TR-10200 Balikesir, Turkiye; [Aktug, Semih Serkant] Siirt Univ, Dept Econ, TR-56100 Siirt, Turkiye; [Ozkan-Okay, Merve] Ankara Univ, Dept Comp Engn, TR-06830 Ankara, Turkiye; [Yilmaz, Abdullah Asim] Atilim Univ, Dept Comp Engn, TR-06830 Ankara, Turkiye; [Akin, Erdal] Bitlis Eren Univ, Dept Comp Engn, TR-13000 Bitlis, Turkiye en_US
gdc.description.issue 6 en_US
gdc.description.publicationcategory Diğer en_US
gdc.description.volume 12 en_US
gdc.description.wosquality Q2
gdc.identifier.openalex W4324093415
gdc.identifier.wos WOS:000955072300001
gdc.openalex.fwci 35.143
gdc.openalex.normalizedpercentile 0.99
gdc.openalex.toppercent TOP 10%
gdc.opencitations.count 202
gdc.plumx.crossrefcites 11
gdc.plumx.facebookshareslikecount 8
gdc.plumx.mendeley 1448
gdc.plumx.scopuscites 402
gdc.scopus.citedcount 402
gdc.wos.citedcount 178
relation.isAuthorOfPublication 8e955d4b-b0a3-463e-ae19-1ac6791507a5
relation.isAuthorOfPublication.latestForDiscovery 8e955d4b-b0a3-463e-ae19-1ac6791507a5
relation.isOrgUnitOfPublication d2cd5950-09a4-4d1d-976e-01f8f7ee4808
relation.isOrgUnitOfPublication 4abda634-67fd-417f-bee6-59c29fc99997
relation.isOrgUnitOfPublication 50be38c5-40c4-4d5f-b8e6-463e9514c6dd
relation.isOrgUnitOfPublication.latestForDiscovery d2cd5950-09a4-4d1d-976e-01f8f7ee4808

Files

Collections