A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions

dc.authoridYILMAZ, Abdullah Asım/0000-0002-3014-609X
dc.authoridOzkan, Merve/0000-0002-1071-2541
dc.authoridASLAN, Omer/0000-0003-0737-1966
dc.authorscopusid57201115541
dc.authorscopusid57854292000
dc.authorscopusid57210744769
dc.authorscopusid57210803267
dc.authorscopusid57193883254
dc.authorwosidYILMAZ, Abdullah Asım/AAI-1622-2020
dc.contributor.authorAslan, Özgür
dc.contributor.authorAktug, Semih Serkant
dc.contributor.authorOzkan-Okay, Merve
dc.contributor.authorYilmaz, Abdullah Asim
dc.contributor.authorAkin, Erdal
dc.contributor.otherMechanical Engineering
dc.date.accessioned2024-07-05T15:25:05Z
dc.date.available2024-07-05T15:25:05Z
dc.date.issued2023
dc.departmentAtılım Universityen_US
dc.department-temp[Aslan, Omer] Bandirma Onyedi Eylul Univ, Dept Software Engn, TR-10200 Balikesir, Turkiye; [Aktug, Semih Serkant] Siirt Univ, Dept Econ, TR-56100 Siirt, Turkiye; [Ozkan-Okay, Merve] Ankara Univ, Dept Comp Engn, TR-06830 Ankara, Turkiye; [Yilmaz, Abdullah Asim] Atilim Univ, Dept Comp Engn, TR-06830 Ankara, Turkiye; [Akin, Erdal] Bitlis Eren Univ, Dept Comp Engn, TR-13000 Bitlis, Turkiyeen_US
dc.descriptionYILMAZ, Abdullah Asım/0000-0002-3014-609X; Ozkan, Merve/0000-0002-1071-2541; ASLAN, Omer/0000-0003-0737-1966en_US
dc.description.abstractInternet usage has grown exponentially, with individuals and companies performing multiple daily transactions in cyberspace rather than in the real world. The coronavirus (COVID-19) pandemic has accelerated this process. As a result of the widespread usage of the digital environment, traditional crimes have also shifted to the digital space. Emerging technologies such as cloud computing, the Internet of Things (IoT), social media, wireless communication, and cryptocurrencies are raising security concerns in cyberspace. Recently, cyber criminals have started to use cyber attacks as a service to automate attacks and leverage their impact. Attackers exploit vulnerabilities that exist in hardware, software, and communication layers. Various types of cyber attacks include distributed denial of service (DDoS), phishing, man-in-the-middle, password, remote, privilege escalation, and malware. Due to new-generation attacks and evasion techniques, traditional protection systems such as firewalls, intrusion detection systems, antivirus software, access control lists, etc., are no longer effective in detecting these sophisticated attacks. Therefore, there is an urgent need to find innovative and more feasible solutions to prevent cyber attacks. The paper first extensively explains the main reasons for cyber attacks. Then, it reviews the most recent attacks, attack patterns, and detection techniques. Thirdly, the article discusses contemporary technical and nontechnical solutions for recognizing attacks in advance. Using trending technologies such as machine learning, deep learning, cloud platforms, big data, and blockchain can be a promising solution for current and future cyber attacks. These technological solutions may assist in detecting malware, intrusion detection, spam identification, DNS attack classification, fraud detection, recognizing hidden channels, and distinguishing advanced persistent threats. However, some promising solutions, especially machine learning and deep learning, are not resistant to evasion techniques, which must be considered when proposing solutions against intelligent cyber attacks.en_US
dc.identifier.citation28
dc.identifier.doi10.3390/electronics12061333
dc.identifier.issn2079-9292
dc.identifier.issue6en_US
dc.identifier.scopus2-s2.0-85151702439
dc.identifier.urihttps://doi.org/10.3390/electronics12061333
dc.identifier.urihttps://hdl.handle.net/20.500.14411/2505
dc.identifier.volume12en_US
dc.identifier.wosWOS:000955072300001
dc.identifier.wosqualityQ2
dc.institutionauthorAslan Ö.
dc.language.isoenen_US
dc.publisherMdpien_US
dc.relation.publicationcategoryDiğeren_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.subjectcyber securityen_US
dc.subjectcyber attacksen_US
dc.subjectcyber threatsen_US
dc.subjectnetwork securityen_US
dc.titleA Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutionsen_US
dc.typeReviewen_US
dspace.entity.typePublication
relation.isAuthorOfPublication8e955d4b-b0a3-463e-ae19-1ac6791507a5
relation.isAuthorOfPublication.latestForDiscovery8e955d4b-b0a3-463e-ae19-1ac6791507a5
relation.isOrgUnitOfPublicationd2cd5950-09a4-4d1d-976e-01f8f7ee4808
relation.isOrgUnitOfPublication.latestForDiscoveryd2cd5950-09a4-4d1d-976e-01f8f7ee4808

Files

Collections