Skip to main content
Top

2022 | OriginalPaper | Chapter

A Recent Survey on Cybercrime and Its Defensive Mechanism

Authors : Garima Bajaj, Saurabh Tailwal, Anupama Mishra

Published in: Cyber Security, Privacy and Networking

Publisher: Springer Nature Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Cybercrime  is one of the severe issues in today’s world that is increasing day by day due to unawareness of people about the harm it can cause. The main reason against the augmentation of cybercrime is the lack of education or knowledge about the impact it can lead to. Cybercrime can be done against individuals, society, or any organization whether it is private or government. The aim of the paper is to focus on what cybercrime is, its types, related work, and its defensive mechanism. Defensive mechanism against cybercrime includes the ways or measures that how can any individual or any organization protects them against cybercrime. This paper also includes the related work which includes some points about the work which has been done so far on cybercrime.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Furnell S (2002) Cybercrime: vandalizing the information society. Addison-Wesley, London, pp 3–540MATH Furnell S (2002) Cybercrime: vandalizing the information society. Addison-Wesley, London, pp 3–540MATH
2.
go back to reference Gunjan VK, Kumar A, Avdhanam S (2013) A survey of cyber crime in India. In: 2013 15th international conference on advanced computing technologies (ICACT), Sept 2013. IEEE, pp 1–6 Gunjan VK, Kumar A, Avdhanam S (2013) A survey of cyber crime in India. In: 2013 15th international conference on advanced computing technologies (ICACT), Sept 2013. IEEE, pp 1–6
3.
go back to reference Gordon S, Ford R (2006) On the definition and classification of cybercrime. J Comput Virol 2(1):13–20CrossRef Gordon S, Ford R (2006) On the definition and classification of cybercrime. J Comput Virol 2(1):13–20CrossRef
4.
go back to reference Pandove K, Jindal A, Kumar R (2010) Email spoofing. Int J Comput Appl 5(1):27–30 Pandove K, Jindal A, Kumar R (2010) Email spoofing. Int J Comput Appl 5(1):27–30
5.
go back to reference Pittaro ML (2007) Cyber stalking: an analysis of online harassment and intimidation. Int J Cyber Criminol 1(2):180–197 Pittaro ML (2007) Cyber stalking: an analysis of online harassment and intimidation. Int J Cyber Criminol 1(2):180–197
6.
go back to reference Erickson J (2008) Hacking: the art of exploitation. No Starch Press Erickson J (2008) Hacking: the art of exploitation. No Starch Press
7.
go back to reference Lewis JA (2002) Assessing the risks of cyber terrorism, cyber war and other cyber threats. Center for Strategic & International Studies, Washington, DC, p 12 Lewis JA (2002) Assessing the risks of cyber terrorism, cyber war and other cyber threats. Center for Strategic & International Studies, Washington, DC, p 12
8.
go back to reference Jagatic TN, Johnson NA, Jakobsson M, Menczer F (2007) Social phishing. Commun ACM 50(10):94–100CrossRef Jagatic TN, Johnson NA, Jakobsson M, Menczer F (2007) Social phishing. Commun ACM 50(10):94–100CrossRef
10.
go back to reference McMillen J (1996) Understanding gambling. In: Gambling cultures: studies in history and interpretation, pp 6–42 McMillen J (1996) Understanding gambling. In: Gambling cultures: studies in history and interpretation, pp 6–42
11.
go back to reference Fick J (2009) Prevention is better than prosecution: deepening the defence against cyber crime. J Digit Forensics Secur Law 4(4):3MathSciNet Fick J (2009) Prevention is better than prosecution: deepening the defence against cyber crime. J Digit Forensics Secur Law 4(4):3MathSciNet
12.
go back to reference Buil-Gil D, Miró-Llinares F, Moneva A, Kemp S, Díaz-Castaño N (2020) Cybercrime and shifts in opportunities during COVID-19: a preliminary analysis in the UK. Eur Soc 1–13 Buil-Gil D, Miró-Llinares F, Moneva A, Kemp S, Díaz-Castaño N (2020) Cybercrime and shifts in opportunities during COVID-19: a preliminary analysis in the UK. Eur Soc 1–13
13.
go back to reference Mishra A, Gupta N, Gupta BB (2020) Security threats and recent countermeasures in cloud computing. In: Modern principles, practices, and algorithms for cloud security. IGI Global, pp 145–161 Mishra A, Gupta N, Gupta BB (2020) Security threats and recent countermeasures in cloud computing. In: Modern principles, practices, and algorithms for cloud security. IGI Global, pp 145–161
14.
go back to reference Mishra A, Gupta N (2019) Analysis of cloud computing vulnerability against DDoS. In: 2019 international conference on innovative sustainable computational technologies (CISCT), Oct 2019. IEEE, pp 1–6 Mishra A, Gupta N (2019) Analysis of cloud computing vulnerability against DDoS. In: 2019 international conference on innovative sustainable computational technologies (CISCT), Oct 2019. IEEE, pp 1–6
15.
go back to reference Bhushan K, Gupta BB (2019) Distributed denial of service (DDoS) attack mitigation in software defined network (SDN)-based cloud computing environment. J Ambient Intell Humaniz Comput 10(5):1985–1997CrossRef Bhushan K, Gupta BB (2019) Distributed denial of service (DDoS) attack mitigation in software defined network (SDN)-based cloud computing environment. J Ambient Intell Humaniz Comput 10(5):1985–1997CrossRef
16.
go back to reference Alsmirat MA et al (2019) Impact of digital fingerprint image quality on the fingerprint recognition accuracy. Multimed Tools Appl 78(3):3649–3688 Alsmirat MA et al (2019) Impact of digital fingerprint image quality on the fingerprint recognition accuracy. Multimed Tools Appl 78(3):3649–3688
17.
go back to reference Dahiya A, Gupta BB (2020) Multi attribute auction based incentivized solution against DDoS attacks. Comput Secur 92:101763 Dahiya A, Gupta BB (2020) Multi attribute auction based incentivized solution against DDoS attacks. Comput Secur 92:101763
18.
go back to reference Al-Qerem A et al (2020) IoT transaction processing through cooperative concurrency control on fog cloud computing environment. Soft Comput 24(8):5695–5711 Al-Qerem A et al (2020) IoT transaction processing through cooperative concurrency control on fog cloud computing environment. Soft Comput 24(8):5695–5711
19.
go back to reference Gupta S, Gupta BB (2015) PHP-sensor: a prototype method to discover workflow violation and XSS vulnerabilities in PHP web applications. In: Proceedings of the 12th ACM international conference on computing frontiers, May 2015, pp 1–8 Gupta S, Gupta BB (2015) PHP-sensor: a prototype method to discover workflow violation and XSS vulnerabilities in PHP web applications. In: Proceedings of the 12th ACM international conference on computing frontiers, May 2015, pp 1–8
20.
go back to reference Dahiya A, Gupta BB (2020) A reputation score policy and Bayesian game theory based incentivised mechanism for DDoS attacks mitigation and cyber defense. Future Gener Comput Syst Dahiya A, Gupta BB (2020) A reputation score policy and Bayesian game theory based incentivised mechanism for DDoS attacks mitigation and cyber defense. Future Gener Comput Syst
Metadata
Title
A Recent Survey on Cybercrime and Its Defensive Mechanism
Authors
Garima Bajaj
Saurabh Tailwal
Anupama Mishra
Copyright Year
2022
Publisher
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-16-8664-1_29