DOI QR코드

DOI QR Code

Fifteen Deadly Cybersecurity Threats Aimed Covid-19

  • Alaboudi, Abdulellah A. (computer science, Shaqra University)
  • Received : 2021.12.05
  • Published : 2021.12.30

Abstract

Cybersecurity has been vital for decades and will remain vital with upcoming ages with new technological developments. Every new day brings advancement in technology, which leads to new horizons, and at the same time, it brings new security challenges. Numerous researchers around the globe are continuously striving hard to provide better solutions for the daily basis of new arising security issues. However, the challenges are always there. These challenges become new norms during the current Covid pandemic, where most industries, small industrial enterprises, education, finance, public sectors, etc. were under several attacks and threats globally. The hacker has more opportunities during the pandemic period by shifting most of the operations live. This research enlightened the several cybersecurity attacks and threats during this pandemic time globally. It provided the best possible recommendations to avoid them using the cyber awareness and with appropriately linked training. This research can provide a guideline to the above stated sector by identifying the related attacks.

Keywords

References

  1. Dublin (Business Wire), Impact of COVID-19 on the Video Conferencing Market, 2020, https://www.businesswire.com/news/home/20200416005739/en/Impact-of-COVID-19-on-the-VideoConferencing-Market-2020---ResearchAndMarkets.com, Accessed on November 2021.
  2. Guy Campos, Videoconferencing app usage 'hits 21 times pre-Covid levels', https://www.avinteractive.com/news/collaboration/usage-mobile-video-conferencing-apps-including-zoomgrew-150-first-half-2021-05-08-2021/, Accessed on November 2021.
  3. Sensor tower blog, Usage of Mobile Video Conferencing Apps Including Zoom Grew 150% in the First Half of 2021, https://sensortower.com/blog/video-conferencingapps-mau-growth , Accessed on November 2021.
  4. Karl KA, Peluchette JV, Aghakhani N. Virtual Work Meetings During the COVID-19 Pandemic: The Good, Bad, and Ugly. Small Group Research. May 2021. doi:10.1177/10464964211015286
  5. Khan, N. A., Brohi, S. N., & Jhanjhi, N. Z. (2020). UAV's applications, architecture, security issues and attack scenarios: a survey. In Intelligent computing and innovation on data science (pp. 753-760). Springer, Singapore.
  6. N. A. Khan, S. N. Brohi and N. Zaman, "Ten deadly cyber security threats amid COVID-19 pandemic", 2020.
  7. Singh, J., & Singh, J. (2021). A survey on machine learning-based malware detection in executable files. Journal of Systems Architecture, 112, 101861. https://doi.org/10.1016/j.sysarc.2020.101861
  8. Amer, E., Zelinka, I., & El-Sappagh, S. (2021). A Multi-Perspective malware detection approach through behavioral fusion of API call sequence. Computers & Security, 110, 102449. https://doi.org/10.1016/j.cose.2021.102449
  9. S. J. Hussain, U. Ahmed, H. Liaquat, S. Mir, N. Jhanjhi and M. Humayun, "IMIAD: Intelligent Malware Identification for Android Platform," 2019 International Conference on Computer and Information Sciences (ICCIS), 2019, pp. 1-6, doi: 10.1109/ICCISci.2019.8716471.
  10. Nawaz, A. (2021). Feature Engineering based on Hybrid Features for Malware Detection over Android Framework. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 12(10), 2856-2864.
  11. K. Hussain, S. J. Hussain, N. Jhanjhi and M. Humayun, "SYN Flood Attack Detection based on Bayes Estimator (SFADBE) For MANET," 2019 International Conference on Computer and Information Sciences (ICCIS), 2019, pp. 1-4, doi: 10.1109/ICCISci.2019.8716416.
  12. Ben Lutkevich, Types of Malware, Tech Target, https://searchsecurity.techtarget.com/definition/malware, Access on November 2021.
  13. Basit, A., Zafar, M., Liu, X., Javed, A. R., Jalil, Z., & Kifayat, K. (2021). A comprehensive survey of AIenabled phishing attacks detection techniques. Telecommunication Systems, 76(1), 139-154. https://doi.org/10.1007/s11235-020-00733-2
  14. Ubing, A. A., Jasmi, S. K. B., Abdullah, A., Jhanjhi, N., & Supramaniam, M. (2019). Phishing website detection: An improved accuracy through feature selection and ensemble learning. International Journal of Advanced Computer Science and Applications, 10(1), 252-257.
  15. Elijah, A. V., Abdullah, A., Jhanjhi, N., Supramaniam, M., & Abdullateef, B. (2019). 'Ensemble and deep-learning methods for two-class and multi-attack anomaly intrusion detection: An empirical study. Int. J. Adv. Comput. Sci. Appl, 10(9), 520-528.
  16. Abbasi, A., Dobolyi, D., Vance, A., & Zahedi, F. M. (2021). The phishing funnel model: A design artifact to predict user susceptibility to phishing websites. Information Systems Research, 32(2), 410-436. https://doi.org/10.1287/isre.2020.0973
  17. Fatima-tuz-Zahra, N. Jhanjhi, S. N. Brohi and N. A. Malik, "Proposing a Rank and Wormhole Attack Detection Framework using Machine Learning," 2019 13th International Conference on Mathematics, Actuarial Science, Computer Science and Statistics (MACS), 2019, pp. 1-9, doi: 10.1109/MACS48846.2019.9024821.
  18. Salem, O., Alsubhi, K., Shaafi, A., Gheryani, M., Mehaoua, A., & Boutaba, R. (2021). Man in the Middle Attack Mitigation in Internet of Medical Things. IEEE Transactions on Industrial Informatics.
  19. Noor Qureshi, How to make sure no man-in-the-middle attack can harm you, https://thehacktoday.com/how-to-make-sure-no-man-in-the-middle-attack-can-harmyou/, Accessed on November 2021.
  20. The new network, 2017: The year of widespread SDN adoption and DDoS attack mitigation, https://www.networkworld.com/article/3156344/2017-widespread-sdn-adoption-and-ddos-attackmitigation.html, Accessed on November 2021.
  21. Vivek Ganti, et.al, DDoS attack trends for 2021 Q2, https://blog.cloudflare.com/ddos-attack-trends-for2021-q2/, Accessed on November 2021
  22. Mishra, A., Gupta, N., & Gupta, B. B. (2021). Defense mechanisms against DDoS attack based on entropy in SDN-cloud using POX controller. Telecommunication systems, 77(1), 47-62. https://doi.org/10.1007/s11235-020-00747-w
  23. Gopi, R., Sathiyamoorthi, V., Selvakumar, S. et al. Enhanced method of ANN based model for detection of DDoS attacks on multimedia internet of things. Multimed Tools Appl (2021). https://doi.org/10.1007/s11042-021-10640-6
  24. Kok, S. H., Abdullah, A., Jhanjhi, N. Z., & Supramaniam, M. (2019). A review of intrusion detection system using machine learning approach. International Journal of Engineering Research and Technology, 12(1), 8-15.
  25. Z. A. Almusaylim, N. Zaman and L. T. Jung, "Proposing A Data Privacy Aware Protocol for Roadside Accident Video Reporting Service Using 5G In Vehicular Cloud Networks Environment," 2018 4th International Conference on Computer and Information Sciences (ICCOINS), 2018, pp. 1-5, doi: 10.1109/ICCOINS.2018.8510588.
  26. Lim, M., Abdullah, A., Jhanjhi, N. Z., & Supramaniam, M. (2019). Hidden link prediction in criminal networks using the deep reinforcement learning technique. Computers, 8(1), 8. https://doi.org/10.3390/computers8010008
  27. B. Hamid, N. Jhanjhi, M. Humayun, A. Khan and A. Alsayat, "Cyber Security Issues and Challenges for Smart Cities: A survey," 2019 13th International Conference on Mathematics, Actuarial Science, Computer Science and Statistics (MACS), 2019, pp. 1-7, doi: 10.1109/MACS48846.2019.9024768.
  28. Lim, M., Abdullah, A., & Jhanjhi, N. Z. (2019). Performance optimization of criminal network hidden link prediction model with deep reinforcement learning. Journal of King Saud University-Computer and Information Sciences.
  29. N. Zaman and F. A. Almusalli, "Review: Smartphones power consumption & energy saving techniques," 2017 International Conference on Innovations in Electrical Engineering and Computational Technologies (ICIEECT), 2017, pp. 1-7, doi: 10.1109/ICIEECT.2017.7916593.
  30. D. A. Shafiq, N. Z. Jhanjhi, A. Abdullah and M. A. Alzain, "A Load Balancing Algorithm for the Data Centres to Optimize Cloud Computing Applications," in IEEE Access, vol. 9, pp. 41731-41744, 2021, doi: 10.1109/ACCESS.2021.3065308.
  31. Seungjin, L., Abdullah, A., & Jhanjhi, N. Z. (2020). A review on honeypot-based botnet detection models for smart factory. International Journal of Advanced Computer Science and Applications, 11(6), 418-435.
  32. A Almusaylim, Z., Jhanjhi, N. Z., & Alhumam, A. (2020). Detection and mitigation of RPL rank and version number attacks in the internet of things: SRPL-RP. Sensors, 20(21), 5997. https://doi.org/10.3390/s20215997
  33. Kraticakal, SQL Injection Attack: A Major Application Security Threat, https://www.kratikal.com/blog/sql-injection-attack-a-major-application-security-threat/, Accessd on November 2021.
  34. Jhanjhi, N. Z., Almusalli, F. A., Brohi, S. N., & Abdullah, A. (2018, October). Middleware Power Saving Scheme for Mobile Applications. In 2018 Fourth International Conference on Advances in Computing, Communication & Automation (ICACCA) (pp. 1-6). IEEE.
  35. S. M. Muzammal, R. K. Murugesan, N. Z. Jhanjhi and L. T. Jung, "SMTrust: Proposing Trust-Based Secure Routing Protocol for RPL Attacks for IoT Applications," 2020 International Conference on Computational Intelligence (ICCI), 2020, pp. 305-310, doi: 10.1109/ICCI51257.2020.9247818.
  36. M. Humayun, N. Jhanjhi, M. Alruwaili, S. S. Amalathas, V. Balasubramanian and B. Selvaraj, "Privacy Protection and Energy Optimization for 5GAided Industrial Internet of Things," in IEEE Access, vol. 8, pp. 183665-183677, 2020, doi: 10.1109/ACCESS.2020.3028764.
  37. N. Zaman, A. B. Abdullah and L. T. Jung, "Optimization of energy usage in Wireless Sensor Network using Position Responsive Routing Protocol (PRRP)," 2011 IEEE Symposium on Computers & Informatics, 2011, pp. 51-55, doi: 10.1109/ISCI.2011.5958882.
  38. Soosahabi, R. (2021). SPARROW: A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond. arXiv preprint arXiv:2108.12161.
  39. Norah Saud Al-Musib, Faeiz Mohammad Al-Serhani, Mamoona Humayun, N.Z. Jhanjhi, Business email compromise (BEC) attacks, Materials Today: Proceedings, 2021, ISSN 2214-7853, https://doi.org/10.1016/j.matpr.2021.03.647.(https://www.sciencedirect.com/science/article/pii/S2214785321027425)
  40. S. K. Mishra et al., "Energy-Aware Task Allocation for Multi-Cloud Networks," in IEEE Access, vol. 8, pp. 178825-178834, 2020, doi: 10.1109/ACCESS.2020.3026875.
  41. A Almusaylim, Z., Jhanjhi, N. Z., & Alhumam, A. (2020). Detection and mitigation of RPL rank and version number attacks in the internet of things: SRPLRP. Sensors, 20(21), 5997. https://doi.org/10.3390/s20215997
  42. Teoh, A. A., Ghani, N. B. A., Ahmad, M., Jhanjhi, N., Alzain, M. A., & Masud, M. (2022). Organizational Data Breach: Building Conscious Care Behavior in Incident Response. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 40(2), 505-515. https://doi.org/10.32604/csse.2022.018468
  43. Almulhim, M., Islam, N., & Zaman, N. (2019). A lightweight and secure authentication scheme for IoT based e-health applications. International Journal of Computer Science and Network Security, 19(1), 107-120.
  44. A. P. Singh et al., "A Novel Patient-Centric Architectural Framework for Blockchain-Enabled Healthcare Applications," in IEEE Transactions on Industrial Informatics, vol. 17, no. 8, pp. 5779-5789, Aug. 2021, doi: 10.1109/TII.2020.3037889.
  45. Khan, N. A., Jhanjhi, N. Z., Brohi, S. N., & Nayyar, A. (2020). Emerging use of UAV's: secure communication protocol issues and challenges. In Drones in Smart-Cities (pp. 37-55). Elsevier.
  46. Kok, S. H., Abdullah, A., Jhanjhi, N. Z., & Supramaniam, M. (2019). Prevention of crypto-ransomware using a pre-encryption detection algorithm. Computers, 8(4), 79. https://doi.org/10.3390/computers8040079
  47. S. Ali et al., "Towards Pattern-Based Change Verification Framework for Cloud-Enabled Healthcare Component-Based," in IEEE Access, vol. 8, pp. 148007-148020, 2020, doi: 10.1109/ACCESS.2020.3014671.
  48. Zaman, N., & Ahmad, M. (2017). Towards the evaluation of authentication protocols for mobile command and control unit in healthcare. Journal of Medical Imaging and Health Informatics, 7(3), 739-742. https://doi.org/10.1166/jmihi.2017.2070
  49. Ren, A. L. Y., Liang, C. T., Hyug, I. J., Broh, S. N., & Jhanjhi, N. Z. (2020). A Three-Level Ransomware Detection and Prevention Mechanism. EAI Endorsed Transactions on Energy Web, 7(27).
  50. Jabeen, T., Jabeen, I., Ashraf, H., Jhanjhi, N., Mamoona, H., Mehedi, M., & Sultan, A. (2022). A Monte Carlo Based COVID-19 Detection Framework for Smart Healthcare. Computers, Materials, & Continua, 2365-2380.
  51. Egele, M., Kirda, E., & Kruegel, C. (2009, April). Mitigating drive-by download attacks: Challenges and open problems. In International Workshop on Open Problems in Network Security (pp. 52-62). Springer, Berlin, Heidelberg.
  52. Sharma, P., Johari, R., & Sarma, S. S. (2012). Integrated approach to prevent SQL injection attack and reflected cross site scripting attack. International Journal of System Assurance Engineering and Management, 3(4), 343-351. https://doi.org/10.1007/s13198-012-0125-6
  53. A. Ullah, M. Azeem, H. Ashraf, A. A. Alaboudi, M. Humayun and N. Jhanjhi, "Secure Healthcare Data Aggregation and Transmission in IoT-A Survey," in IEEE Access, vol. 9, pp. 16849-16865, 2021, doi: 10.1109/ACCESS.2021.3052850.
  54. Zaman, N., & Abdullah, A. B. (2012). Energy optimization through position responsiverouting protocol (prrp) in wireless sensor network. International Journal of Information and Electronics Engineering, 2(5), 748.
  55. Jayakumar, P., Brohi, S. N., & Zaman, N. (2020). Top 7 lessons learned from COVID-19 pandemic.
  56. One Login, Six type of passwords attaks and how to stop them, https://www.onelogin.com/learn/6-types-password-attacks, Accessed on November 2021
  57. S. M. Muzammal, R. K. Murugesan and N. Z. Jhanjhi, "A Comprehensive Review on Secure Routing in Internet of Things: Mitigation Methods and Trust-Based Approaches," in IEEE Internet of Things Journal, vol. 8, no. 6, pp. 4186-4210, 15 March15, 2021, doi: 10.1109/JIOT.2020.3031162.
  58. C. Diwaker et al., "A New Model for Predicting Component-Based Software Reliability Using Soft Computing," in IEEE Access, vol. 7, pp. 147191-147203, 2019, doi: 10.1109/ACCESS.2019.2946862.
  59. Alferidah, D. K., & Jhanjhi, N. Z. (2020, October). Cybersecurity Impact over Bigdata and IoT Growth. In 2020 International Conference on Computational Intelligence (ICCI) (pp. 103-108). IEEE
  60. A. Ullah et al., "A Survey on Continuous Object Tracking and Boundary Detection Schemes in IoT Assisted Wireless Sensor Networks," in IEEE Access, vol. 9, pp. 126324-126336, 2021, doi: 10.1109/ACCESS.2021.3110203.
  61. Humayun, M., Jhanjhi, N. Z., & Alamri, M. Z. (2020). Smart secure and energy efficient scheme for e-health applications using IoT: a review. International Journal of Computer Science and Network Security, 20(4), 55-74. https://doi.org/10.22937/IJCSNS.2020.20.04.8
  62. M. Lim, A. Abdullah, N. Jhanjhi and M. Khurram Khan, "Situation-Aware Deep Reinforcement Learning Link Prediction Model for Evolving Criminal Networks," in IEEE Access, vol. 8, pp. 16550-16559, 2020, doi: 10.1109/ACCESS.2019.2961805.
  63. Humayun, M., & Jhanjhi, N. Z. (2019). Exploring the relationship between GSD, knowledge management, trust and collaboration. Journal of Engineering Science and Technology (JESTEC), 14(2), 820-843.
  64. M. Satheesh Kumar, S. Vimal, N.Z. Jhanjhi, Shanmuga Sundar Dhanabalan, Hesham A. Alhumyani, Blockchain based peer to peer communication in autonomous drone operation, Energy Reports, 2021, ISSN 2352-4847, https://doi.org/10.1016/j.egyr.2021.08.073.
  65. Maggi, F., Volpatto, A., Gasparini, S., Boracchi, G., & Zanero, S. (2011, December). A fast eavesdropping attack against touchscreens. In 2011 7th International Conference on Information Assurance and Security (IAS) (pp. 320-325). IEEE.
  66. Penta Security, Top 5 AI-powered Cyber Threats & How to Prevent Them, https://www.pentasecurity.com/blog/top-5-aipowered-cyber-threats-how-to-prevent-them/, Access on November 2021
  67. Hussain, S. J., Irfan, M., Jhanjhi, N. Z., Hussain, K., & Humayun, M. (2021). Performance enhancement in wireless body area networks with secure communication. Wireless Personal Communications, 116(1), 1-22. https://doi.org/10.1007/s11277-020-07702-7
  68. V. Singhal et al., "Artificial Intelligence Enabled Road Vehicle-Train Collision Risk Assessment Framework for Unmanned Railway Level Crossings," in IEEE Access, vol. 8, pp. 113790-113806, 2020, doi: 10.1109/ACCESS.2020.3002416.
  69. Brohi, S. N., Jhanjhi, N. Z., Brohi, N. N., & Brohi, M. N. (2020). Key applications of state-of-the-art technologies to mitigate and eliminate COVID-19.
  70. N. Zaman, K. Ragab, A.B. Abdullah, Wireless Sensor Networks and Energy Efficiency: Protocols Routing and Management, IGI, Globa, Hershey, PA, USA (2012)
  71. Mamoona Humayun, NZ Jhanjhi, Ahmed Alsayat, Vasaki Ponnusamy, Internet of things and ransomware: Evolution, mitigation and prevention, Egyptian Informatics Journal, Volume 22, Issue 1, 2021, Pages 105-117, ISSN 1110-8665, https://doi.org/10.1016/j.eij.2020.05.003.
  72. Almusaylim, Z.A., Zaman, N. A review on smart home present state and challenges: linked to context-awareness internet of things (IoT). Wireless Netw 25, 3193-3204 (2019). https://doi.org/10.1007/s11276-018-1712-5
  73. M. J. Iqbal et al., "Smart Home Automation Using Intelligent Electricity Dispatch," in IEEE Access, vol. 9, pp. 118077-118086, 2021, doi: 10.1109/ACCESS.2021.3106541.
  74. Meidan, Y., Bohadana, M., Mathov, Y., Mirsky, Y., Shabtai, A., Breitenbacher, D., & Elovici, Y. (2018). N-baiot-network-based detection of iot botnet attacks using deep autoencoders. IEEE Pervasive Computing, 17(3), 12-22. https://doi.org/10.1109/mprv.2018.03367731
  75. Galeano-Brajones, J., Carmona-Murillo, J., Valenzuela-Valdes, J. F., & Luna-Valero, F. (2020). Detection and mitigation of dos and ddos attacks in iot-based stateful sdn: An experimental approach. Sensors, 20(3), 816. https://doi.org/10.3390/s20030816
  76. Pan, Y., White, J., Schmidt, D., Elhabashy, A., Sturm, L., Camelio, J., & Williams, C. (2017). Taxonomies for reasoning about cyber-physical attacks in IoT-based manufacturing systems.
  77. Kimani, K., Oduol, V., & Langat, K. (2019). Cyber security challenges for IoT-based smart grid networks. International Journal of Critical Infrastructure Protection, 25, 36-49. https://doi.org/10.1016/j.ijcip.2019.01.001
  78. Atlam H.F., Wills G.B. (2020) IoT Security, Privacy, Safety and Ethics. In: Farsi M., Daneshkhah A., Hosseinian-Far A., Jahankhani H. (eds) Digital Twin Technologies and Smart Cities. Internet of Things (Technology, Communications and Computing). Springer, Cham. https://doi.org/10.1007/978-3-030-18732-3_8