Analysis Report on Attacks and Defence Modeling Approach to Cyber Security

Authors

  • Dr. Bechoo Lal  Assistant Professor, Department of Information Technology, Western College, University of Mumbai, Maharashtra, India
  • Dr. Chandrahauns R Chavan  Professor and Former Director, JBIMS, University of Mumbai, Mumbai, Maharashtra, India

DOI:

https://doi.org//10.32628/IJSRST196215

Keywords:

NIST, IS, CIS, MIA, CYBER ATTACK, DEFENSE

Abstract

The researcher stated that critical analysis on attacks and defense modeling approach to cyber security which is one of the significant research issues in the computing environment. The researcher focused on some of the factors such as control the side of damage, perform forensic analysis, executive standard counter measures, perform threat detection and hunting, and gather threat intelligence. These all are the defense parameters which are stated to modeling approach in cyber security. During the research the researcher evaluated the security parameters including password strength, fraud detection system, firewall and others security parameters which are significant with respect to cyber attach and environment. The researcher shown statistical report on industries impacted by cyber-attacks worldwide as of September 2017. The researcher stated that passwords are basic cyber-security tool that people encounter nearly every day to prevent valuable data and highly sensitive information from unauthorized persons. The researcher represented an attack and defense modeling approach with the help of cyber security attributes such as information security, network security, operational security, end-user protection and application security. The researcher also stated that a case study of the 2016 Korean cyber command compromise: the victim of a prospering cyber-attack that allowed access to internal networks. Per usual with massive scale attacks against South Korean entities, the hack was straight off attributed to DPRK. Case study-2: cyber warfare conflict analysis and case studies, to analysis historical cyber warfare incidents from the past to the current and capture relevant information in a very information acquisition section.

References

  1. Chee-Woo 10 et. al (2010),' Cyber security for vital Infrastructures: Attack and Defense Modeling', revealed in: IEEE Transactions on Systems, Man, and information science - half A: Systems and Humans (Volume: 40, Issue: 4, July 2010), Page(s): 853 - 865.
  2. Atul Bamrara et. al (2013),' Cyber Attacks and Defense methods in India: Associate in Nursing Empirical Assessment of Banking Sector', International Journal of Cyber sociology Vol.7 Issue.1 January - Gregorian calendar month 2013.
  3. Eric Goetz et.,al(2002),' Cyber Attack Techniques And Defense Mechanisms', fact-finding analysis for Infrastructure Assurance (IRIA) cluster - Institute for Security Technology Studies, June-2002.
  4. Alexander Kott et.al (2018),' Approaches to Modelling the Impact of Cyber Attacks on a Mission' USA work, USA, 2018.
  5. Beyza Unal and Patricia Lewis (2018),' Cyber security of Nuclear Weapons Systems Threats, Vulnerabilities and Consequences', International department, January 2018.
  6. Hamad AL-Mahanadi (2016),' Cyber-Attack Modeling Associate in Nursingalysis Techniques: An Overview', 2016 fourth International Conference on Future net of Things and Cloud Workshops, 978-1-5090-3946-3/16, 2016 IEEE Interior Department ten.1109/W-FiCloud.2016.29.
  7. Duic et.,al(2017),' International cyber security challenges', MIPRO 2017/ISS, University of Applied Sciences Vern, Zagreb, Croatia,2017.
  8. King of Great Britain Baylon (2014),' Challenges at the Intersection of Cyber Security and area Security Country and International establishment Perspectives', International Security, December 2014.
  9. Baron Clive of Plassey James (2016),' Cyber security Threats Challenges Opportunities', ACS, November-2016.
  10. Bryan Watkins (2014),' the Impact of Cyber Attacks on the non-public Sector', Association for world affairs, August-2014.
  11. Timothy M. McKenzie (2018),' Is Cyber Deterrence Possible?' Air University Press Air Force analysis Institute Maxwell Air Force Base, Alabama, 2018.
  12. Afraa Attiah et.al (2018),' A Game metaphysical Approach to Model Cyber Attack and Defense Strategies', school of Engineering and engineering, University of Central FL, Florida, USA.
  13. Archangel Robinson et. al (2015),' Cyber Warfare: problems and Challenges', Article in Computers & Security, March 2015.
  14. Eric M. pedagogue et.,al(2005),' Intelligence-Driven electronic network Defense sophisticated by Analysis of mortal Campaigns and Intrusion Kill Chain', U.K. National Infrastructure Security Co-ordination Centre (UK-NISCC) and therefore the U.S., July -2005.
  15. Kenneth Geers (2011),' Strategic Cyber Security: Evaluating Nation-State Cyber Attack Mitigation methods with Dematel', capital University of Technology school of data Technology Department of information science, treatise was accepted for the defense of the degree of Doctor of Philosophy in information science on might six, 2011.
  16. Stuart Fowler (2018),' Developing cyber-security policies that penetrate Australian defense acquisitions', Australian military Journal, 2018.
  17. Joshua I. James(2016),' A Case Study of the 2016 Korean Cyber Command Compromise', Legal information science and rhetorical Science Institute, Hallym University, Chuncheon, Republic of Korea.
  18. Mohan B. Gazula(2017),' Cyber Warfare Conflict Analysis and Case Studies', Cyber security knowledge base Systems Laboratory (CISL),Sloan faculty of Management, area E62-422 Massachusetts Institute of Technology, Cambridge, MA 02142.
  19. Kotenko and V. Skormin (2010), 'Attack and Defense Modeling with BDMP', MMM-ACNS 2010, LNCS 6258, pp. 86-101, 2010. C Springer-Verlag Berlin Heidelberg 2010.
  20. Aleksandar KLAIC (2018),' a way for the event of Cyber Security Strategies', workplace of the National SC, Croatia.

Downloads

Published

2019-03-30

Issue

Section

Research Articles

How to Cite

[1]
Dr. Bechoo Lal, Dr. Chandrahauns R Chavan, " Analysis Report on Attacks and Defence Modeling Approach to Cyber Security , International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 6, Issue 2, pp.52-60, March-April-2019. Available at doi : https://doi.org/10.32628/IJSRST196215