Skip to main content
Top

Hint

Swipe to navigate through the chapters of this book

2019 | OriginalPaper | Chapter

Some Specific Examples of Attacks on Information Systems and Smart Cities Applications

Authors : Muzafer Saračević, Aybeyan Selimi, Šemsudin Plojović

Published in: Cybersecurity and Secure Information Systems

Publisher: Springer International Publishing

share
SHARE

Abstract

In this chapter, are enlisted some specific examples of attacks in information systems and smart cities applications. The chapter consists of five parts. In the first and second part, the basic introductory considerations and some of our previous research in the field of security of information systems and security management in the cyberspace are listed. In the third part, are given specific examples of XSS and CSRF attacks. In addition, is given a specific implementation of the executive script, which has a task for the collection of confidential information in smart environments. In the fourth part, is listed the procedure for attacking hash digest data as well as the procedure for hiding information using the Python programming language and the Kali Linux environment. Finally, lists the final considerations and gives suggestions for further research in the field of cybersecurity attacks on smart cities.

To get access to this content you need the following product:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 69.000 Bücher
  • über 500 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt 90 Tage mit der neuen Mini-Lizenz testen!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 50.000 Bücher
  • über 380 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe



 


Jetzt 90 Tage mit der neuen Mini-Lizenz testen!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 58.000 Bücher
  • über 300 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko





Jetzt 90 Tage mit der neuen Mini-Lizenz testen!

Literature
1.
go back to reference Shema M (2010) Hacking web apps, 1st edn. Wiley publication, ISBN-13: 978-1597499514, ISBN-10: 159749951X Shema M (2010) Hacking web apps, 1st edn. Wiley publication, ISBN-13: 978-1597499514, ISBN-10: 159749951X
2.
go back to reference Cannings R, Dwivedi H, Lackey Z (2007) Hacking Exposed Web 2.0, 1st edn. ISBN-13: 978-0071494618, ISBN-10: 0071494618 17 Dec 2007 Cannings R, Dwivedi H, Lackey Z (2007) Hacking Exposed Web 2.0, 1st edn. ISBN-13: 978-0071494618, ISBN-10: 0071494618 17 Dec 2007
3.
go back to reference Scambraz J, Liu V, Sima C (2010) Hacking Exposed web application 3, ISBN: 9780071740647, Division: Professional, Pub Date Scambraz J, Liu V, Sima C (2010) Hacking Exposed web application 3, ISBN: 9780071740647, Division: Professional, Pub Date
4.
go back to reference Clark J (2012) SQL Injection Attack, and Defense. Wiley publication, ISBN: 978-1-118-36218-1, 552 p, Dec 2012 Clark J (2012) SQL Injection Attack, and Defense. Wiley publication, ISBN: 978-1-118-36218-1, 552 p, Dec 2012
5.
go back to reference Stuttard D, Pinto M (2012) The web application hacker’s handbook, 2 nd edn. ISBN-13: 978-1118026472, ISBN-10: 1118026470 Stuttard D, Pinto M (2012) The web application hacker’s handbook, 2 nd edn. ISBN-13: 978-1118026472, ISBN-10: 1118026470
6.
go back to reference Barnett R (2012) Web application defender’s cookbook: battling hackers and protecting users, 1st edn. ISBN-13: 978-1118362181 Barnett R (2012) Web application defender’s cookbook: battling hackers and protecting users, 1st edn. ISBN-13: 978-1118362181
7.
go back to reference Saracevic M, Hadzic M (2017) Security management in cyberspace and protection mechanisms of web applications, Legal issues, ISSN: 2334-8100, No. 9 Saracevic M, Hadzic M (2017) Security management in cyberspace and protection mechanisms of web applications, Legal issues, ISSN: 2334-8100, No. 9
8.
go back to reference Saracevic M, Selimi A, Plojovic S (2018) Security in the web environment and concrete examples of attacks on the internet, ICEB’ 18–4. International congress on economics and business, Budapest/Hungary, ISBN: 978-975-8628-67-4 Saracevic M, Selimi A, Plojovic S (2018) Security in the web environment and concrete examples of attacks on the internet, ICEB’ 18–4. International congress on economics and business, Budapest/Hungary, ISBN: 978-975-8628-67-4
9.
go back to reference Rasori M, Perazzo P, Dini G (2018) ABE-Cities: an attribute-based encryption system for smart cities. In: IEEE international conference on smart computing (SMARTCOMP), pp 65–72 Rasori M, Perazzo P, Dini G (2018) ABE-Cities: an attribute-based encryption system for smart cities. In: IEEE international conference on smart computing (SMARTCOMP), pp 65–72
10.
go back to reference Saracevic M, Adamovic S, Bisevac E (2018) Applications of catalan numbers and lattice path combinatorial problem in cryptography. Acta Polytech Hung: J Appl Sci 15(7):91–110 Saracevic M, Adamovic S, Bisevac E (2018) Applications of catalan numbers and lattice path combinatorial problem in cryptography. Acta Polytech Hung: J Appl Sci 15(7):91–110
11.
go back to reference Saracevic M, Aybeyan S, Selimovic F (2018) Generation of cryptographic keys with algorithm of polygon triangulation and Catalan numbers, Computer Science—AGH, Vol. 19, No. 3, pp. 243–256, AGH University of Science and Technology, Poland Saracevic M, Aybeyan S, Selimovic F (2018) Generation of cryptographic keys with algorithm of polygon triangulation and Catalan numbers, Computer Science—AGH, Vol. 19, No. 3, pp. 243–256, AGH University of Science and Technology, Poland
12.
go back to reference Saracevic M, Hadzic M, Koricanin E (2017) Generating catalan-keys based on dynamic programming and their application in steganography. Int J Ind Eng Manag 8(4):219–227 Saracevic M, Hadzic M, Koricanin E (2017) Generating catalan-keys based on dynamic programming and their application in steganography. Int J Ind Eng Manag 8(4):219–227
13.
go back to reference Al Dairi A, Tawalbeh L (2017) Cyber security attacks on smart cities and associated mobile technologies. Procedia Comput Sci 109:1086–1091 CrossRef Al Dairi A, Tawalbeh L (2017) Cyber security attacks on smart cities and associated mobile technologies. Procedia Comput Sci 109:1086–1091 CrossRef
14.
go back to reference Braun T, Fung B, Iqbal F, Shah B (2018) Security and privacy challenges in Smart cities. Sustain Cities Soc 39:499–507 CrossRef Braun T, Fung B, Iqbal F, Shah B (2018) Security and privacy challenges in Smart cities. Sustain Cities Soc 39:499–507 CrossRef
15.
go back to reference Cui L, Xie G, Qu Y, Gao L, Yang Y (2018) Security and privacy in smart cities: challenges and opportunities. IEEE Access 6:46134–46145 CrossRef Cui L, Xie G, Qu Y, Gao L, Yang Y (2018) Security and privacy in smart cities: challenges and opportunities. IEEE Access 6:46134–46145 CrossRef
17.
go back to reference Sharma G, Kalra SJ (2017) A secure remote user authentication scheme for smart cities e-governance applications. Reliable Intell Environ 3(3):177–188, 2017, Springer Sharma G, Kalra SJ (2017) A secure remote user authentication scheme for smart cities e-governance applications. Reliable Intell Environ 3(3):177–188, 2017, Springer
18.
go back to reference Butt TA, Afzaal M (2017) Security and privacy in smart cities: issues and current solutions, 1st AUEIRC Conference 2017, Springer Butt TA, Afzaal M (2017) Security and privacy in smart cities: issues and current solutions, 1st AUEIRC Conference 2017, Springer
Metadata
Title
Some Specific Examples of Attacks on Information Systems and Smart Cities Applications
Authors
Muzafer Saračević
Aybeyan Selimi
Šemsudin Plojović
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-16837-7_10

Premium Partner