Skip to main content
Top

2019 | OriginalPaper | Chapter

Some Specific Examples of Attacks on Information Systems and Smart Cities Applications

Authors : Muzafer Saračević, Aybeyan Selimi, Šemsudin Plojović

Published in: Cybersecurity and Secure Information Systems

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this chapter, are enlisted some specific examples of attacks in information systems and smart cities applications. The chapter consists of five parts. In the first and second part, the basic introductory considerations and some of our previous research in the field of security of information systems and security management in the cyberspace are listed. In the third part, are given specific examples of XSS and CSRF attacks. In addition, is given a specific implementation of the executive script, which has a task for the collection of confidential information in smart environments. In the fourth part, is listed the procedure for attacking hash digest data as well as the procedure for hiding information using the Python programming language and the Kali Linux environment. Finally, lists the final considerations and gives suggestions for further research in the field of cybersecurity attacks on smart cities.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Shema M (2010) Hacking web apps, 1st edn. Wiley publication, ISBN-13: 978-1597499514, ISBN-10: 159749951X Shema M (2010) Hacking web apps, 1st edn. Wiley publication, ISBN-13: 978-1597499514, ISBN-10: 159749951X
2.
go back to reference Cannings R, Dwivedi H, Lackey Z (2007) Hacking Exposed Web 2.0, 1st edn. ISBN-13: 978-0071494618, ISBN-10: 0071494618 17 Dec 2007 Cannings R, Dwivedi H, Lackey Z (2007) Hacking Exposed Web 2.0, 1st edn. ISBN-13: 978-0071494618, ISBN-10: 0071494618 17 Dec 2007
3.
go back to reference Scambraz J, Liu V, Sima C (2010) Hacking Exposed web application 3, ISBN: 9780071740647, Division: Professional, Pub Date Scambraz J, Liu V, Sima C (2010) Hacking Exposed web application 3, ISBN: 9780071740647, Division: Professional, Pub Date
4.
go back to reference Clark J (2012) SQL Injection Attack, and Defense. Wiley publication, ISBN: 978-1-118-36218-1, 552 p, Dec 2012 Clark J (2012) SQL Injection Attack, and Defense. Wiley publication, ISBN: 978-1-118-36218-1, 552 p, Dec 2012
5.
go back to reference Stuttard D, Pinto M (2012) The web application hacker’s handbook, 2nd edn. ISBN-13: 978-1118026472, ISBN-10: 1118026470 Stuttard D, Pinto M (2012) The web application hacker’s handbook, 2nd edn. ISBN-13: 978-1118026472, ISBN-10: 1118026470
6.
go back to reference Barnett R (2012) Web application defender’s cookbook: battling hackers and protecting users, 1st edn. ISBN-13: 978-1118362181 Barnett R (2012) Web application defender’s cookbook: battling hackers and protecting users, 1st edn. ISBN-13: 978-1118362181
7.
go back to reference Saracevic M, Hadzic M (2017) Security management in cyberspace and protection mechanisms of web applications, Legal issues, ISSN: 2334-8100, No. 9 Saracevic M, Hadzic M (2017) Security management in cyberspace and protection mechanisms of web applications, Legal issues, ISSN: 2334-8100, No. 9
8.
go back to reference Saracevic M, Selimi A, Plojovic S (2018) Security in the web environment and concrete examples of attacks on the internet, ICEB’ 18–4. International congress on economics and business, Budapest/Hungary, ISBN: 978-975-8628-67-4 Saracevic M, Selimi A, Plojovic S (2018) Security in the web environment and concrete examples of attacks on the internet, ICEB’ 18–4. International congress on economics and business, Budapest/Hungary, ISBN: 978-975-8628-67-4
9.
go back to reference Rasori M, Perazzo P, Dini G (2018) ABE-Cities: an attribute-based encryption system for smart cities. In: IEEE international conference on smart computing (SMARTCOMP), pp 65–72 Rasori M, Perazzo P, Dini G (2018) ABE-Cities: an attribute-based encryption system for smart cities. In: IEEE international conference on smart computing (SMARTCOMP), pp 65–72
10.
go back to reference Saracevic M, Adamovic S, Bisevac E (2018) Applications of catalan numbers and lattice path combinatorial problem in cryptography. Acta Polytech Hung: J Appl Sci 15(7):91–110 Saracevic M, Adamovic S, Bisevac E (2018) Applications of catalan numbers and lattice path combinatorial problem in cryptography. Acta Polytech Hung: J Appl Sci 15(7):91–110
11.
go back to reference Saracevic M, Aybeyan S, Selimovic F (2018) Generation of cryptographic keys with algorithm of polygon triangulation and Catalan numbers, Computer Science—AGH, Vol. 19, No. 3, pp. 243–256, AGH University of Science and Technology, Poland Saracevic M, Aybeyan S, Selimovic F (2018) Generation of cryptographic keys with algorithm of polygon triangulation and Catalan numbers, Computer Science—AGH, Vol. 19, No. 3, pp. 243–256, AGH University of Science and Technology, Poland
12.
go back to reference Saracevic M, Hadzic M, Koricanin E (2017) Generating catalan-keys based on dynamic programming and their application in steganography. Int J Ind Eng Manag 8(4):219–227 Saracevic M, Hadzic M, Koricanin E (2017) Generating catalan-keys based on dynamic programming and their application in steganography. Int J Ind Eng Manag 8(4):219–227
13.
go back to reference Al Dairi A, Tawalbeh L (2017) Cyber security attacks on smart cities and associated mobile technologies. Procedia Comput Sci 109:1086–1091CrossRef Al Dairi A, Tawalbeh L (2017) Cyber security attacks on smart cities and associated mobile technologies. Procedia Comput Sci 109:1086–1091CrossRef
14.
go back to reference Braun T, Fung B, Iqbal F, Shah B (2018) Security and privacy challenges in Smart cities. Sustain Cities Soc 39:499–507CrossRef Braun T, Fung B, Iqbal F, Shah B (2018) Security and privacy challenges in Smart cities. Sustain Cities Soc 39:499–507CrossRef
15.
go back to reference Cui L, Xie G, Qu Y, Gao L, Yang Y (2018) Security and privacy in smart cities: challenges and opportunities. IEEE Access 6:46134–46145CrossRef Cui L, Xie G, Qu Y, Gao L, Yang Y (2018) Security and privacy in smart cities: challenges and opportunities. IEEE Access 6:46134–46145CrossRef
17.
go back to reference Sharma G, Kalra SJ (2017) A secure remote user authentication scheme for smart cities e-governance applications. Reliable Intell Environ 3(3):177–188, 2017, Springer Sharma G, Kalra SJ (2017) A secure remote user authentication scheme for smart cities e-governance applications. Reliable Intell Environ 3(3):177–188, 2017, Springer
18.
go back to reference Butt TA, Afzaal M (2017) Security and privacy in smart cities: issues and current solutions, 1st AUEIRC Conference 2017, Springer Butt TA, Afzaal M (2017) Security and privacy in smart cities: issues and current solutions, 1st AUEIRC Conference 2017, Springer
Metadata
Title
Some Specific Examples of Attacks on Information Systems and Smart Cities Applications
Authors
Muzafer Saračević
Aybeyan Selimi
Šemsudin Plojović
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-16837-7_10

Premium Partner