Belal A. Al-fuhaidi, Wedad Al-Sorori, Naseebah Maqtary, A. Al-Hashedi, Sadik A. M. Al-Taweel
{"title":"网络攻击检测与预防方案的文献综述","authors":"Belal A. Al-fuhaidi, Wedad Al-Sorori, Naseebah Maqtary, A. Al-Hashedi, Sadik A. M. Al-Taweel","doi":"10.1109/ITSS-IoE53029.2021.9615288","DOIUrl":null,"url":null,"abstract":"Due to the tremendous development in the field of information and communication technology (ICT) and its continuous connection with the Internet, the data of customers and companies has become under the threat of electronic attacks, so it has become necessary to clarify solutions to ensure the security and safety of data around the world. In the modern era, it has become imperative for countries and large companies to adopt cybersecurity systems in their systems, to ensure the confidentiality and security of data from cyber-attacks. This paper provides an overall review of previous studies on cyber-attacks to discover this concept, its forms as well as the applied mitigation strategies against this attack. The literature review is conducted through a systematic approach from data collection through content analysis and finally, findings reporting.","PeriodicalId":230566,"journal":{"name":"2021 International Conference on Intelligent Technology, System and Service for Internet of Everything (ITSS-IoE)","volume":"4 4","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Literature Review on Cyber Attacks Detection and Prevention Schemes\",\"authors\":\"Belal A. Al-fuhaidi, Wedad Al-Sorori, Naseebah Maqtary, A. Al-Hashedi, Sadik A. M. Al-Taweel\",\"doi\":\"10.1109/ITSS-IoE53029.2021.9615288\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Due to the tremendous development in the field of information and communication technology (ICT) and its continuous connection with the Internet, the data of customers and companies has become under the threat of electronic attacks, so it has become necessary to clarify solutions to ensure the security and safety of data around the world. In the modern era, it has become imperative for countries and large companies to adopt cybersecurity systems in their systems, to ensure the confidentiality and security of data from cyber-attacks. This paper provides an overall review of previous studies on cyber-attacks to discover this concept, its forms as well as the applied mitigation strategies against this attack. The literature review is conducted through a systematic approach from data collection through content analysis and finally, findings reporting.\",\"PeriodicalId\":230566,\"journal\":{\"name\":\"2021 International Conference on Intelligent Technology, System and Service for Internet of Everything (ITSS-IoE)\",\"volume\":\"4 4\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 International Conference on Intelligent Technology, System and Service for Internet of Everything (ITSS-IoE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ITSS-IoE53029.2021.9615288\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Intelligent Technology, System and Service for Internet of Everything (ITSS-IoE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITSS-IoE53029.2021.9615288","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Literature Review on Cyber Attacks Detection and Prevention Schemes
Due to the tremendous development in the field of information and communication technology (ICT) and its continuous connection with the Internet, the data of customers and companies has become under the threat of electronic attacks, so it has become necessary to clarify solutions to ensure the security and safety of data around the world. In the modern era, it has become imperative for countries and large companies to adopt cybersecurity systems in their systems, to ensure the confidentiality and security of data from cyber-attacks. This paper provides an overall review of previous studies on cyber-attacks to discover this concept, its forms as well as the applied mitigation strategies against this attack. The literature review is conducted through a systematic approach from data collection through content analysis and finally, findings reporting.