Browse > Article
http://dx.doi.org/10.22937/IJCSNS.2021.21.12.18

Fifteen Deadly Cybersecurity Threats Aimed Covid-19  

Alaboudi, Abdulellah A. (computer science, Shaqra University)
Publication Information
International Journal of Computer Science & Network Security / v.21, no.12, 2021 , pp. 123-130 More about this Journal
Abstract
Cybersecurity has been vital for decades and will remain vital with upcoming ages with new technological developments. Every new day brings advancement in technology, which leads to new horizons, and at the same time, it brings new security challenges. Numerous researchers around the globe are continuously striving hard to provide better solutions for the daily basis of new arising security issues. However, the challenges are always there. These challenges become new norms during the current Covid pandemic, where most industries, small industrial enterprises, education, finance, public sectors, etc. were under several attacks and threats globally. The hacker has more opportunities during the pandemic period by shifting most of the operations live. This research enlightened the several cybersecurity attacks and threats during this pandemic time globally. It provided the best possible recommendations to avoid them using the cyber awareness and with appropriately linked training. This research can provide a guideline to the above stated sector by identifying the related attacks.
Keywords
Cybersecurity; Attacks; Security Threats; Covid-19; Mitigation recommendations;
Citations & Related Records
연도 인용수 순위
  • Reference
1 N. Zaman, A. B. Abdullah and L. T. Jung, "Optimization of energy usage in Wireless Sensor Network using Position Responsive Routing Protocol (PRRP)," 2011 IEEE Symposium on Computers & Informatics, 2011, pp. 51-55, doi: 10.1109/ISCI.2011.5958882.   DOI
2 Jhanjhi, N. Z., Almusalli, F. A., Brohi, S. N., & Abdullah, A. (2018, October). Middleware Power Saving Scheme for Mobile Applications. In 2018 Fourth International Conference on Advances in Computing, Communication & Automation (ICACCA) (pp. 1-6). IEEE.
3 S. M. Muzammal, R. K. Murugesan, N. Z. Jhanjhi and L. T. Jung, "SMTrust: Proposing Trust-Based Secure Routing Protocol for RPL Attacks for IoT Applications," 2020 International Conference on Computational Intelligence (ICCI), 2020, pp. 305-310, doi: 10.1109/ICCI51257.2020.9247818.   DOI
4 M. Humayun, N. Jhanjhi, M. Alruwaili, S. S. Amalathas, V. Balasubramanian and B. Selvaraj, "Privacy Protection and Energy Optimization for 5GAided Industrial Internet of Things," in IEEE Access, vol. 8, pp. 183665-183677, 2020, doi: 10.1109/ACCESS.2020.3028764.   DOI
5 Soosahabi, R. (2021). SPARROW: A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond. arXiv preprint arXiv:2108.12161.
6 S. K. Mishra et al., "Energy-Aware Task Allocation for Multi-Cloud Networks," in IEEE Access, vol. 8, pp. 178825-178834, 2020, doi: 10.1109/ACCESS.2020.3026875.   DOI
7 A Almusaylim, Z., Jhanjhi, N. Z., & Alhumam, A. (2020). Detection and mitigation of RPL rank and version number attacks in the internet of things: SRPLRP. Sensors, 20(21), 5997.   DOI
8 A. P. Singh et al., "A Novel Patient-Centric Architectural Framework for Blockchain-Enabled Healthcare Applications," in IEEE Transactions on Industrial Informatics, vol. 17, no. 8, pp. 5779-5789, Aug. 2021, doi: 10.1109/TII.2020.3037889.   DOI
9 Gopi, R., Sathiyamoorthi, V., Selvakumar, S. et al. Enhanced method of ANN based model for detection of DDoS attacks on multimedia internet of things. Multimed Tools Appl (2021). https://doi.org/10.1007/s11042-021-10640-6   DOI
10 Sharma, P., Johari, R., & Sarma, S. S. (2012). Integrated approach to prevent SQL injection attack and reflected cross site scripting attack. International Journal of System Assurance Engineering and Management, 3(4), 343-351.   DOI
11 B. Hamid, N. Jhanjhi, M. Humayun, A. Khan and A. Alsayat, "Cyber Security Issues and Challenges for Smart Cities: A survey," 2019 13th International Conference on Mathematics, Actuarial Science, Computer Science and Statistics (MACS), 2019, pp. 1-7, doi: 10.1109/MACS48846.2019.9024768.   DOI
12 M. Lim, A. Abdullah, N. Jhanjhi and M. Khurram Khan, "Situation-Aware Deep Reinforcement Learning Link Prediction Model for Evolving Criminal Networks," in IEEE Access, vol. 8, pp. 16550-16559, 2020, doi: 10.1109/ACCESS.2019.2961805.   DOI
13 Dublin (Business Wire), Impact of COVID-19 on the Video Conferencing Market, 2020, https://www.businesswire.com/news/home/20200416005739/en/Impact-of-COVID-19-on-the-VideoConferencing-Market-2020---ResearchAndMarkets.com, Accessed on November 2021.
14 Abbasi, A., Dobolyi, D., Vance, A., & Zahedi, F. M. (2021). The phishing funnel model: A design artifact to predict user susceptibility to phishing websites. Information Systems Research, 32(2), 410-436.   DOI
15 Guy Campos, Videoconferencing app usage 'hits 21 times pre-Covid levels', https://www.avinteractive.com/news/collaboration/usage-mobile-video-conferencing-apps-including-zoomgrew-150-first-half-2021-05-08-2021/, Accessed on November 2021.
16 Almusaylim, Z.A., Zaman, N. A review on smart home present state and challenges: linked to context-awareness internet of things (IoT). Wireless Netw 25, 3193-3204 (2019). https://doi.org/10.1007/s11276-018-1712-5   DOI
17 Kimani, K., Oduol, V., & Langat, K. (2019). Cyber security challenges for IoT-based smart grid networks. International Journal of Critical Infrastructure Protection, 25, 36-49.   DOI
18 Zaman, N., & Abdullah, A. B. (2012). Energy optimization through position responsiverouting protocol (prrp) in wireless sensor network. International Journal of Information and Electronics Engineering, 2(5), 748.
19 Jayakumar, P., Brohi, S. N., & Zaman, N. (2020). Top 7 lessons learned from COVID-19 pandemic.
20 S. M. Muzammal, R. K. Murugesan and N. Z. Jhanjhi, "A Comprehensive Review on Secure Routing in Internet of Things: Mitigation Methods and Trust-Based Approaches," in IEEE Internet of Things Journal, vol. 8, no. 6, pp. 4186-4210, 15 March15, 2021, doi: 10.1109/JIOT.2020.3031162.   DOI
21 Vivek Ganti, et.al, DDoS attack trends for 2021 Q2, https://blog.cloudflare.com/ddos-attack-trends-for2021-q2/, Accessed on November 2021
22 Almulhim, M., Islam, N., & Zaman, N. (2019). A lightweight and secure authentication scheme for IoT based e-health applications. International Journal of Computer Science and Network Security, 19(1), 107-120.
23 Khan, N. A., Jhanjhi, N. Z., Brohi, S. N., & Nayyar, A. (2020). Emerging use of UAV's: secure communication protocol issues and challenges. In Drones in Smart-Cities (pp. 37-55). Elsevier.
24 Kok, S. H., Abdullah, A., Jhanjhi, N. Z., & Supramaniam, M. (2019). Prevention of crypto-ransomware using a pre-encryption detection algorithm. Computers, 8(4), 79.   DOI
25 A. Ullah, M. Azeem, H. Ashraf, A. A. Alaboudi, M. Humayun and N. Jhanjhi, "Secure Healthcare Data Aggregation and Transmission in IoT-A Survey," in IEEE Access, vol. 9, pp. 16849-16865, 2021, doi: 10.1109/ACCESS.2021.3052850.   DOI
26 Salem, O., Alsubhi, K., Shaafi, A., Gheryani, M., Mehaoua, A., & Boutaba, R. (2021). Man in the Middle Attack Mitigation in Internet of Medical Things. IEEE Transactions on Industrial Informatics.
27 Fatima-tuz-Zahra, N. Jhanjhi, S. N. Brohi and N. A. Malik, "Proposing a Rank and Wormhole Attack Detection Framework using Machine Learning," 2019 13th International Conference on Mathematics, Actuarial Science, Computer Science and Statistics (MACS), 2019, pp. 1-9, doi: 10.1109/MACS48846.2019.9024821.   DOI
28 Noor Qureshi, How to make sure no man-in-the-middle attack can harm you, https://thehacktoday.com/how-to-make-sure-no-man-in-the-middle-attack-can-harmyou/, Accessed on November 2021.
29 Z. A. Almusaylim, N. Zaman and L. T. Jung, "Proposing A Data Privacy Aware Protocol for Roadside Accident Video Reporting Service Using 5G In Vehicular Cloud Networks Environment," 2018 4th International Conference on Computer and Information Sciences (ICCOINS), 2018, pp. 1-5, doi: 10.1109/ICCOINS.2018.8510588.   DOI
30 Teoh, A. A., Ghani, N. B. A., Ahmad, M., Jhanjhi, N., Alzain, M. A., & Masud, M. (2022). Organizational Data Breach: Building Conscious Care Behavior in Incident Response. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 40(2), 505-515.   DOI
31 Lim, M., Abdullah, A., & Jhanjhi, N. Z. (2019). Performance optimization of criminal network hidden link prediction model with deep reinforcement learning. Journal of King Saud University-Computer and Information Sciences.
32 D. A. Shafiq, N. Z. Jhanjhi, A. Abdullah and M. A. Alzain, "A Load Balancing Algorithm for the Data Centres to Optimize Cloud Computing Applications," in IEEE Access, vol. 9, pp. 41731-41744, 2021, doi: 10.1109/ACCESS.2021.3065308.   DOI
33 A Almusaylim, Z., Jhanjhi, N. Z., & Alhumam, A. (2020). Detection and mitigation of RPL rank and version number attacks in the internet of things: SRPL-RP. Sensors, 20(21), 5997.   DOI
34 Kraticakal, SQL Injection Attack: A Major Application Security Threat, https://www.kratikal.com/blog/sql-injection-attack-a-major-application-security-threat/, Accessd on November 2021.
35 Alferidah, D. K., & Jhanjhi, N. Z. (2020, October). Cybersecurity Impact over Bigdata and IoT Growth. In 2020 International Conference on Computational Intelligence (ICCI) (pp. 103-108). IEEE
36 Lim, M., Abdullah, A., Jhanjhi, N. Z., & Supramaniam, M. (2019). Hidden link prediction in criminal networks using the deep reinforcement learning technique. Computers, 8(1), 8.   DOI
37 One Login, Six type of passwords attaks and how to stop them, https://www.onelogin.com/learn/6-types-password-attacks, Accessed on November 2021
38 C. Diwaker et al., "A New Model for Predicting Component-Based Software Reliability Using Soft Computing," in IEEE Access, vol. 7, pp. 147191-147203, 2019, doi: 10.1109/ACCESS.2019.2946862.   DOI
39 A. Ullah et al., "A Survey on Continuous Object Tracking and Boundary Detection Schemes in IoT Assisted Wireless Sensor Networks," in IEEE Access, vol. 9, pp. 126324-126336, 2021, doi: 10.1109/ACCESS.2021.3110203.   DOI
40 Sensor tower blog, Usage of Mobile Video Conferencing Apps Including Zoom Grew 150% in the First Half of 2021, https://sensortower.com/blog/video-conferencingapps-mau-growth , Accessed on November 2021.
41 Karl KA, Peluchette JV, Aghakhani N. Virtual Work Meetings During the COVID-19 Pandemic: The Good, Bad, and Ugly. Small Group Research. May 2021. doi:10.1177/10464964211015286   DOI
42 Khan, N. A., Brohi, S. N., & Jhanjhi, N. Z. (2020). UAV's applications, architecture, security issues and attack scenarios: a survey. In Intelligent computing and innovation on data science (pp. 753-760). Springer, Singapore.
43 Singh, J., & Singh, J. (2021). A survey on machine learning-based malware detection in executable files. Journal of Systems Architecture, 112, 101861.   DOI
44 K. Hussain, S. J. Hussain, N. Jhanjhi and M. Humayun, "SYN Flood Attack Detection based on Bayes Estimator (SFADBE) For MANET," 2019 International Conference on Computer and Information Sciences (ICCIS), 2019, pp. 1-4, doi: 10.1109/ICCISci.2019.8716416.   DOI
45 Ben Lutkevich, Types of Malware, Tech Target, https://searchsecurity.techtarget.com/definition/malware, Access on November 2021.
46 Basit, A., Zafar, M., Liu, X., Javed, A. R., Jalil, Z., & Kifayat, K. (2021). A comprehensive survey of AIenabled phishing attacks detection techniques. Telecommunication Systems, 76(1), 139-154.   DOI
47 Zaman, N., & Ahmad, M. (2017). Towards the evaluation of authentication protocols for mobile command and control unit in healthcare. Journal of Medical Imaging and Health Informatics, 7(3), 739-742.   DOI
48 Mishra, A., Gupta, N., & Gupta, B. B. (2021). Defense mechanisms against DDoS attack based on entropy in SDN-cloud using POX controller. Telecommunication systems, 77(1), 47-62.   DOI
49 N. Zaman and F. A. Almusalli, "Review: Smartphones power consumption & energy saving techniques," 2017 International Conference on Innovations in Electrical Engineering and Computational Technologies (ICIEECT), 2017, pp. 1-7, doi: 10.1109/ICIEECT.2017.7916593.   DOI
50 Norah Saud Al-Musib, Faeiz Mohammad Al-Serhani, Mamoona Humayun, N.Z. Jhanjhi, Business email compromise (BEC) attacks, Materials Today: Proceedings, 2021, ISSN 2214-7853, https://doi.org/10.1016/j.matpr.2021.03.647.(https://www.sciencedirect.com/science/article/pii/S2214785321027425)   DOI
51 M. J. Iqbal et al., "Smart Home Automation Using Intelligent Electricity Dispatch," in IEEE Access, vol. 9, pp. 118077-118086, 2021, doi: 10.1109/ACCESS.2021.3106541.   DOI
52 Atlam H.F., Wills G.B. (2020) IoT Security, Privacy, Safety and Ethics. In: Farsi M., Daneshkhah A., Hosseinian-Far A., Jahankhani H. (eds) Digital Twin Technologies and Smart Cities. Internet of Things (Technology, Communications and Computing). Springer, Cham. https://doi.org/10.1007/978-3-030-18732-3_8   DOI
53 Penta Security, Top 5 AI-powered Cyber Threats & How to Prevent Them, https://www.pentasecurity.com/blog/top-5-aipowered-cyber-threats-how-to-prevent-them/, Access on November 2021
54 Humayun, M., & Jhanjhi, N. Z. (2019). Exploring the relationship between GSD, knowledge management, trust and collaboration. Journal of Engineering Science and Technology (JESTEC), 14(2), 820-843.
55 M. Satheesh Kumar, S. Vimal, N.Z. Jhanjhi, Shanmuga Sundar Dhanabalan, Hesham A. Alhumyani, Blockchain based peer to peer communication in autonomous drone operation, Energy Reports, 2021, ISSN 2352-4847, https://doi.org/10.1016/j.egyr.2021.08.073.   DOI
56 Maggi, F., Volpatto, A., Gasparini, S., Boracchi, G., & Zanero, S. (2011, December). A fast eavesdropping attack against touchscreens. In 2011 7th International Conference on Information Assurance and Security (IAS) (pp. 320-325). IEEE.
57 V. Singhal et al., "Artificial Intelligence Enabled Road Vehicle-Train Collision Risk Assessment Framework for Unmanned Railway Level Crossings," in IEEE Access, vol. 8, pp. 113790-113806, 2020, doi: 10.1109/ACCESS.2020.3002416.   DOI
58 S. J. Hussain, U. Ahmed, H. Liaquat, S. Mir, N. Jhanjhi and M. Humayun, "IMIAD: Intelligent Malware Identification for Android Platform," 2019 International Conference on Computer and Information Sciences (ICCIS), 2019, pp. 1-6, doi: 10.1109/ICCISci.2019.8716471.   DOI
59 N. A. Khan, S. N. Brohi and N. Zaman, "Ten deadly cyber security threats amid COVID-19 pandemic", 2020.
60 Amer, E., Zelinka, I., & El-Sappagh, S. (2021). A Multi-Perspective malware detection approach through behavioral fusion of API call sequence. Computers & Security, 110, 102449.   DOI
61 Pan, Y., White, J., Schmidt, D., Elhabashy, A., Sturm, L., Camelio, J., & Williams, C. (2017). Taxonomies for reasoning about cyber-physical attacks in IoT-based manufacturing systems.
62 Humayun, M., Jhanjhi, N. Z., & Alamri, M. Z. (2020). Smart secure and energy efficient scheme for e-health applications using IoT: a review. International Journal of Computer Science and Network Security, 20(4), 55-74.   DOI
63 Ubing, A. A., Jasmi, S. K. B., Abdullah, A., Jhanjhi, N., & Supramaniam, M. (2019). Phishing website detection: An improved accuracy through feature selection and ensemble learning. International Journal of Advanced Computer Science and Applications, 10(1), 252-257.
64 Elijah, A. V., Abdullah, A., Jhanjhi, N., Supramaniam, M., & Abdullateef, B. (2019). 'Ensemble and deep-learning methods for two-class and multi-attack anomaly intrusion detection: An empirical study. Int. J. Adv. Comput. Sci. Appl, 10(9), 520-528.
65 The new network, 2017: The year of widespread SDN adoption and DDoS attack mitigation, https://www.networkworld.com/article/3156344/2017-widespread-sdn-adoption-and-ddos-attackmitigation.html, Accessed on November 2021.
66 Galeano-Brajones, J., Carmona-Murillo, J., Valenzuela-Valdes, J. F., & Luna-Valero, F. (2020). Detection and mitigation of dos and ddos attacks in iot-based stateful sdn: An experimental approach. Sensors, 20(3), 816.   DOI
67 S. Ali et al., "Towards Pattern-Based Change Verification Framework for Cloud-Enabled Healthcare Component-Based," in IEEE Access, vol. 8, pp. 148007-148020, 2020, doi: 10.1109/ACCESS.2020.3014671.   DOI
68 Nawaz, A. (2021). Feature Engineering based on Hybrid Features for Malware Detection over Android Framework. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 12(10), 2856-2864.
69 Seungjin, L., Abdullah, A., & Jhanjhi, N. Z. (2020). A review on honeypot-based botnet detection models for smart factory. International Journal of Advanced Computer Science and Applications, 11(6), 418-435.
70 N. Zaman, K. Ragab, A.B. Abdullah, Wireless Sensor Networks and Energy Efficiency: Protocols Routing and Management, IGI, Globa, Hershey, PA, USA (2012)
71 Ren, A. L. Y., Liang, C. T., Hyug, I. J., Broh, S. N., & Jhanjhi, N. Z. (2020). A Three-Level Ransomware Detection and Prevention Mechanism. EAI Endorsed Transactions on Energy Web, 7(27).
72 Jabeen, T., Jabeen, I., Ashraf, H., Jhanjhi, N., Mamoona, H., Mehedi, M., & Sultan, A. (2022). A Monte Carlo Based COVID-19 Detection Framework for Smart Healthcare. Computers, Materials, & Continua, 2365-2380.
73 Kok, S. H., Abdullah, A., Jhanjhi, N. Z., & Supramaniam, M. (2019). A review of intrusion detection system using machine learning approach. International Journal of Engineering Research and Technology, 12(1), 8-15.
74 Mamoona Humayun, NZ Jhanjhi, Ahmed Alsayat, Vasaki Ponnusamy, Internet of things and ransomware: Evolution, mitigation and prevention, Egyptian Informatics Journal, Volume 22, Issue 1, 2021, Pages 105-117, ISSN 1110-8665, https://doi.org/10.1016/j.eij.2020.05.003.   DOI
75 Meidan, Y., Bohadana, M., Mathov, Y., Mirsky, Y., Shabtai, A., Breitenbacher, D., & Elovici, Y. (2018). N-baiot-network-based detection of iot botnet attacks using deep autoencoders. IEEE Pervasive Computing, 17(3), 12-22.   DOI
76 Brohi, S. N., Jhanjhi, N. Z., Brohi, N. N., & Brohi, M. N. (2020). Key applications of state-of-the-art technologies to mitigate and eliminate COVID-19.
77 Egele, M., Kirda, E., & Kruegel, C. (2009, April). Mitigating drive-by download attacks: Challenges and open problems. In International Workshop on Open Problems in Network Security (pp. 52-62). Springer, Berlin, Heidelberg.
78 Hussain, S. J., Irfan, M., Jhanjhi, N. Z., Hussain, K., & Humayun, M. (2021). Performance enhancement in wireless body area networks with secure communication. Wireless Personal Communications, 116(1), 1-22.   DOI