Cyber Attacks Mitigation: Detecting Malicious Activities in Network Traffic – A Review of Literature

Main Article Content

Sangeetha Prabhu
Subramanya Bhat

Abstract

Cyber-attacks are becoming more common and over the last decade, many attacks have made top news, targeting manufacturing firms and governmental organisations. Such attacks have triggered substantial financial damage and they've been trying to obstruct key public sector operations. Furthermore, as the Internet of Things (IoT) has arisen, the number of Internetconnected devices is increasingly growing and being an easy target of cyber-attacks. To counter cyber-attacks, information security researchers rely extensively on intrusion detection systems (IDSs) that can identify suspicious activities by comparing patterns of documented attacks or detecting anomaly-based activities. This survey aims to tackle Trust, Protection, identification and activity on wide scale networks and Internet of Things. The proposed research aims at developing a practically deployable cyber security solution to one or more of the cyber-attacks. Multi-Stage Attacks (MSAs), APT, DoS attacks, wireless injection attacks, botnets or other malicious activities will be investigated. In this literature survey, we are highlighting the work Performed throughout the area of cyber security by various researchers, various types of cyber-attacks and its stages, various approaches to prevent cyber-attacks, different challenges faced by a preventer, and some gaps in the research. This literature review is carried out by using the secondary data obtained from peer-reviewed journals and other sources on the web. This review aims to explain Detecting Malicious Activities in Network Traffic.

Article Details

How to Cite
Sangeetha Prabhu, & Subramanya Bhat. (2020). Cyber Attacks Mitigation: Detecting Malicious Activities in Network Traffic – A Review of Literature. International Journal of Case Studies in Business, IT and Education (IJCSBE), 4(2), 40–64. Retrieved from https://supublication.com/index.php/ijcsbe/article/view/1008
Section
Articles