A COMPREHENSIVE SURVEY OF CYBER SECURITY SPECIFIC TO CYBER DEFENCE AND DIGITAL FORENSICS

Authors

  • R.Sharmila Professor, Department of Computer Applications, Karpagam Academy of Higher Education, Coimbatore, Tamil Nadu, India Author
  • N.Kannan Professor, School of Management Studies, Sathyabama Institute of Science and Technology, Chennai, Tamilnadu, India Author

Keywords:

Cyber Security, Cyber Crimes, Security Information And Event Management, FORENSICS And Cyber Security Prediction

Abstract

The major goal of this research is to decipher the language used in discussions on cyber security. Cyber security has been discussed, but only as an afterthought. With an ever-increasing number of crimes, threats, and security-related issues, such as terrorism, taking place in cyber space, it is therefore crucial that India examine this issue from a national security perspective. It is also crucial to know that today's key industries, whether public or private, rely heavily on information and communication technologies. If this infrastructure were to be attacked in cyberspace, the country would likely collapse. As a result, it's more important than ever to assess our nation's level of preparedness in the face of a potential cyber threat to national security. This study gives a review of the many approaches to prediction and forecasting in the field of cyber security. Methods using discrete models, including attack graphs, Bayesian networks, and Markov models, are contrasted and compared with those using incessant models, like time series and grey models, in this overview. We also talk about machine learning and data mining techniques, which have received a lot of care recently and seem to hold promise for cyber security's dynamic and unpredictable landscape. The study also analyzes difficulties in evaluating the methodologies and their actual applicability. The purpose of this study is to compare and contrast several UEBA technologies and discuss how well they can detect network assaults in real time. This study comparations and contrasts the fifteen most popular UEBA systems, focusing on practical applications and capabilities. Recommendations will be made on the basis of the available evidence.

References

Wang L, Alexander CA. Big data in distributed analytics, cybersecurity, cyber warfare and digital forensics. Digital Technologies. 2015;1(1):22-7.

Eom JH, Kim NU, Kim SH, Chung TM. Cyber military strategy for cyberspace superiority in cyber warfare. InProceedings title: 2012 international conference on cyber security, cyber warfare and digital forensic (cybersec) 2012 Jun 26 (pp. 295-299). IEEE.

Okereafor K, Djehaiche R. New approaches to the application of digital forensics in cybersecurity: a proposal. International Journal of Simulation: Systems, Scienece and Technology (IJSSST). 2020 Mar 1;21(2):36-1.

Jangampet, Vinay Dutt, et al. "The Privacy Paradox: Balancing Cybersecurity Measures with Individual Liberties in the Digital Era." International Journal of Advanced Research in Science and Technology, vol. 10, no. 7, July 2020, pp. 255-258.

Limnell J. The exploitation of cyber domain as part of warfare: Russo-Ukrainian war. International Journal of Cyber-Security and Digital Forensics. 2015 Oct 1;4(4):521-33.

Pilli ES, Joshi RC, Niyogi R. A generic framework for network forensics. International Journal of Computer Applications. 2010 Feb;1(11):1-6.

Zainudin NM, Hasbullah NA, Wook M, Ramli S, Razali NA. Digital forensic readiness for cyber security practitioners: an integrated model. Journal of Positive School Psychology. 2022 May 1;6(3):8423-33.

Burton J. NATO’s cyber defence: strategic challenges and institutional adaptation. Defence Studies. 2015 Oct 2;15(4):297-319.

Burton J. NATO’s cyber defence: strategic challenges and institutional adaptation. Defence Studies. 2015 Oct 2;15(4):297-319.

Grobler, Cornelia P., and C. P. Louwrens. "Digital forensic readiness as a component of information security best practice." In New Approaches for Security, Privacy and Trust in Complex Environments: Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14–16 May 2007, Sandton, South Africa 22, pp. 13-24. Springer US, 2007.

Leinhos L. Cyber Defence in Germany. Connections. 2020 Jan 1;19(1):9-19.

Vinay Dutt Jangampet, The Rise of The Machines: AI-Driven SIEM User Experience for Enhanced Decision-Making, International Journal of Computer Engineering and Technology 12(3), 2021, pp. 74-83.

Andress J, Winterfeld S. Cyber warfare: techniques, tactics and tools for security practitioners. Elsevier; 2013 Oct 1.

Galinec D, Možnik D, Guberina B. Cybersecurity and cyber defence: national level strategic approach. Automatika: časopis za automatiku, mjerenje, elektroniku, računarstvo i komunikacije. 2017;58(3):273-86.

Dewar RS. The “triptych of cyber security”: A classifi cation of active cyber defence. In2014 6th International Conference On Cyber Conflict (CyCon 2014) 2014 Jun 3 (pp. 7-21). IEEE.

Nelson B, Phillips A, Steuart C. Guide to computer forensics and investigations. Cengage Learning; 2014 Nov 7.

Yasinsac A, Erbacher RF, Marks DG, Pollitt MM, Sommer PM. Computer forensics education. IEEE Security & Privacy. 2003 Aug 11;1(4):15-23.

Rogers MK, Seigfried K. The future of computer forensics: a needs analysis survey. Computers & Security. 2004 Feb 1;23(1):12-6.

Solomon MG, Rudolph K, Tittel E, Broom N, Barrett D. Computer forensics jumpstart. John Wiley & Sons; 2011 Feb 16.

Javed AR, Ahmed W, Alazab M, Jalil Z, Kifayat K, Gadekallu TR. A comprehensive survey on computer forensics: State-of-the-art, tools, techniques, challenges, and future directions. IEEE Access. 2022 Jan 12;10:11065-89.

Cisco Systems, Remotely triggered black hole filtering - desti- nation based and source based, https://www.cisco.com/c/dam/en_us/about/security/intelligence/blackhole.pdf (2005).

G. Bassett, D. Hylender, P. Langlois, A. Pinto, S. Widup, 2020 Data Breach Investigations Report, Tech. rep., Verizon (2020).

J. O. Kephart, D. M. Chess, The vision of autonomic computing, Computer 36 (1) (2003) 41–50.

D. Staheli, T. Yu, R. J. Crouser, S. Damodaran, K. Nam, D. O’Gwynn, S. McKenna, L. Harrison, Visualization evaluation for cyber security: Trends and future directions, in: Proceedings of the Eleventh Workshop on Visualization for Cyber Security, VizSec ’14, Association for Computing Machinery, New York, NY, USA, 2014, p. 49–56

Mukhopadhyay, A., Chatterjee, S., Bagchi, K. K., Kirs, P. J., & Shukla, G. K. (2019). Cyber Risk Assessment and Mitigation (CRAM) Framework Using Logit and Probit Models for Cyber Insurance. Information Systems Frontiers, 21(5), 997–1018. https://doi.org/10.1007/s10796- 017-9808-5.

Henriques de Gusmão, A. P., Mendonça Silva, M., Poleto, T., Camara e Silva, L., & Cabral Seixas Costa, A. P. (2018). Cybersecurity risk alysis model using fault tree analysis and fuzzy decision theory. International Journal of Information Management, 43. https://doi.org/10.1016/j.ijinfomgt.2018.08.008.

Iqbal, Juneed; Beigh, B. M. (2017). Cybercrime in India : Trends and Challenges. International Journal of Innovations & Advancement in Computer Science, 6(12), 187–196.

Jangampet, Vinay Dutt, Srinivas Reddy Pulyala, and Avinash Gupta Desetty Desetty. "Utilizing SIEM to Enhance Vulnerability Management and Response." International Journal of Innovative and Emerging Research in Management and Technology, vol. 10, no. 11, November 2021, pp. 635-642.

Romanosky, S. (2016). Examining the costs and causes of cyber incidents. Journal of Cybersecurity, 2(2). https://doi.org/10.1093/cybsec/tyw001.

Alzubaidi, A. (2021). Measuring the level of cyber-security awareness for cybercrime in Saudi Arabia. Heliyon, 7(1), e06016. https://doi.org/10.1016/j.heliyon.2021.e06016.

Slusky, L., & Goodrich, J. A. (2016). Human Factors of Cybersecurity Awareness. EdMedia 2016 - Vancover BC Canada, June 28-30, 430–438.

Bandyopadhyay, T., & Mookerjee, V. (2019). A model to analyze the challenge of using cyber insurance. Information Systems Frontiers, 21(2). https://doi.org/10.1007/s10796-017-9737-3.

Camillo, M. (2017). Cyber risk and the changing role of insurance. Journal of Cyber Policy, 2(1), 53–63. https://doi.org/10.1080/23738871.2017.1296878.

Franke, U. (2017). The cyber insurance market in Sweden. Computers and Security, 68, 130–144. https://doi.org/10.1016/j.cose.2017.04.010.

Downloads

Published

2023-07-09