{"title":"网络安全攻击检测、预测和预防方法综述","authors":"Ayei E. Ibor, F. Oladeji, O. Okunoye","doi":"10.14257/IJSIA.2018.12.4.02","DOIUrl":null,"url":null,"abstract":"The expanding threat landscape has come with a plethora of consequences for most organizations and individuals. This is witnessed in the high volume of cyber-attacks prevalent in the cyberspace. Though several approaches have been proposed and deployed in recent times, most of them are only theoretical masterpieces while others remain computationally infeasible due to the computational requirements for implementing them. Where implementation is possible, the issue of computational complexity becomes a significant overhead in which case a large amount of computing resources such as CPU cycle, memory, network bandwidth and data structures are consumed culminating in tedious, time consuming, and error prone processes. Similarly, most of these techniques are basically reactive and as such can only be triggered when an incident is reported while most depend on the administrator to apply the necessary mitigation processes after an attack has occurred. To this effect, this paper presents a survey of cyber security approaches that have been proposed in the Literature. The paper also reviews the methodologies, strengths and weaknesses of these approaches, and finally identifies areas where further research could focus.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2018-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":"{\"title\":\"A Survey of Cyber Security Approaches for Attack Detection, Prediction, and Prevention\",\"authors\":\"Ayei E. Ibor, F. Oladeji, O. Okunoye\",\"doi\":\"10.14257/IJSIA.2018.12.4.02\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The expanding threat landscape has come with a plethora of consequences for most organizations and individuals. This is witnessed in the high volume of cyber-attacks prevalent in the cyberspace. Though several approaches have been proposed and deployed in recent times, most of them are only theoretical masterpieces while others remain computationally infeasible due to the computational requirements for implementing them. Where implementation is possible, the issue of computational complexity becomes a significant overhead in which case a large amount of computing resources such as CPU cycle, memory, network bandwidth and data structures are consumed culminating in tedious, time consuming, and error prone processes. Similarly, most of these techniques are basically reactive and as such can only be triggered when an incident is reported while most depend on the administrator to apply the necessary mitigation processes after an attack has occurred. To this effect, this paper presents a survey of cyber security approaches that have been proposed in the Literature. The paper also reviews the methodologies, strengths and weaknesses of these approaches, and finally identifies areas where further research could focus.\",\"PeriodicalId\":46187,\"journal\":{\"name\":\"International Journal of Security and Its Applications\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-07-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"12\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Security and Its Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.14257/IJSIA.2018.12.4.02\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Security and Its Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.14257/IJSIA.2018.12.4.02","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Survey of Cyber Security Approaches for Attack Detection, Prediction, and Prevention
The expanding threat landscape has come with a plethora of consequences for most organizations and individuals. This is witnessed in the high volume of cyber-attacks prevalent in the cyberspace. Though several approaches have been proposed and deployed in recent times, most of them are only theoretical masterpieces while others remain computationally infeasible due to the computational requirements for implementing them. Where implementation is possible, the issue of computational complexity becomes a significant overhead in which case a large amount of computing resources such as CPU cycle, memory, network bandwidth and data structures are consumed culminating in tedious, time consuming, and error prone processes. Similarly, most of these techniques are basically reactive and as such can only be triggered when an incident is reported while most depend on the administrator to apply the necessary mitigation processes after an attack has occurred. To this effect, this paper presents a survey of cyber security approaches that have been proposed in the Literature. The paper also reviews the methodologies, strengths and weaknesses of these approaches, and finally identifies areas where further research could focus.
期刊介绍:
IJSIA aims to facilitate and support research related to security technology and its applications. Our Journal provides a chance for academic and industry professionals to discuss recent progress in the area of security technology and its applications. Journal Topics: -Access Control -Ad Hoc & Sensor Network Security -Applied Cryptography -Authentication and Non-repudiation -Cryptographic Protocols -Denial of Service -E-Commerce Security -Identity and Trust Management -Information Hiding -Insider Threats and Countermeasures -Intrusion Detection & Prevention -Network & Wireless Security -Peer-to-Peer Security -Privacy and Anonymity -Secure installation, generation and operation -Security Analysis Methodologies -Security assurance -Security in Software Outsourcing -Security products or systems -Security technology -Systems and Data Security