Skip to main content

A Survey on Cyber Security Evolution and Threats: Biometric Authentication Solutions

  • Chapter
  • First Online:
Book cover Biometric Security and Privacy

Abstract

Cybersecurity threats are serious, costly and challenging because they are various, evolutive and easily spread. This chapter is dedicated to brief these issues, its evolution and the various solutions provided by the researchers; it also surveys the biometric solutions to one of the key issues of cybersecurity which is the intrusion, by providing robust authentication solutions basing on the unique physical and behavioural characteristics of the user.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. Cyber attack (2016) [Online], http://money.cnn.com/2015/04/14/technology/security/cyber-attack-hacks-security/

  2. Tor, [Online], https://www.torproject.org/. Accessed 26 July 2016

  3. A. Kwon, D. Lazar, S. Devadas, B. Ford, Riffle an efficient communication system with strong anonymity, in Proceedings on Privacy Enhancing Technologies, vol. 1, no. 20, 2016

    Google Scholar 

  4. G.I. Rathod, D.A. Nikam, Darknet: a class of networks to share anonymous digital content. Int. J. Innov. Res. Comput. Commun. Eng. 3(7), 8 (2015)

    Google Scholar 

  5. Top 500 websites, ALEXA [Online], http://www.alexa.com/topsites. Accessed 25 Mar 2016

  6. K. Geers, Strategic Cyber Security (CCD COE, Tallinn, 2011)

    Google Scholar 

  7. S. Lawson, Beyond Cyber-Doom: Cyberattack Scenarios and the Evidence of History (Mercatus Center at George Mason University, 2011), p. 38

    Google Scholar 

  8. R. Brown, Computer security threats: a brief history (2014) [Online], https://powermore.dell.com/technology/computer-security-threats-brief-history/. Accessed 01 Mar 2016

  9. M. Warner, Cybersecurity: a pre-history. Intell. Natl. Secur. 27(5), 19 (2012)

    Google Scholar 

  10. M.D. Cavelty, Cyber Security (Oxford University Press, Oxford, 2012)

    Google Scholar 

  11. C.P. Pfleeger, S.L. Pfleeger, J. Margulies, Security in Computing, 5th edn. (Prentice Hall, Upper Saddle River, NJ, 2015)

    Google Scholar 

  12. K.M. Lord, T. Sharp, America’s Cyber Future Security and Prosperity in the Information Age volume II, Washington, DC : Center of New American Security, 2011

    Google Scholar 

  13. Q. Gu, P. Liu, Denial of Service Attacks. Handbook of Computer Networks: Distributed Networks, Network Planning, Control, Management, and New Trends and Applications, 3, 454–468, 2007

    Google Scholar 

  14. D.L. Shinder, E. Tittel, Tittel, Cybercrime Scene of the Computer Forensics Handbook (Syngress, Rockland, USA, 2002)

    Google Scholar 

  15. S. Friedl’s, An Illustrated Guide to the Kaminsky DNS Vulnerability, Unixwiz.net Tech Tips [Online], http://unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html. Accessed 27 July 2016

  16. S. Fontaine, Attaque DOS (Deny of service), authsecu [Online], http://www.authsecu.com/dos-attaque-deny-of-service/dos-attaque-deny-of-service.php#Attaque_SynFlood. Accessed 19 Mar 2016

  17. Y. Wang, G. Attebury, B. Ramamurthy, A survey of security issues in wireless sensor networks. IEEE Commun. Surv. Tutorials 8(2), 23 (2006)

    Article  Google Scholar 

  18. “Man in the middle attack,” valency networks (2008) [Online], http://www.valencynetworks.com/articles/cyber-attacks-explained-man-in-the-middle-attack.html. Accessed 31 July 2016

  19. S. Şen, J.A. Clark, J.E. Tapiador, Security threats in mobile ad hoc networks, in Security of Self-Organizing Networks: MANET, WSN, WMN, VANET, Auerbach Publications, 2011

    Google Scholar 

  20. Y.-C. Hu, A. Perrig, D.B. Johnson, Wormhole attacks in wireless networks. IEEE J. Sel. Areas Commun. 24(2), 11 (2006)

    Google Scholar 

  21. M. Jakobsson, S. Wetzel, B. Yener, Stealth attacks on ad-hoc wireless networks, in Vehicular Technology Conference, IEEE 58th, p. 9, 2003

    Google Scholar 

  22. C. Laurendeau, M. Barbeau, Threats to Security in DSRC/WAVE (Springer, Heidelberg, 2006), pp. 266–279

    Google Scholar 

  23. S.M.K.R. Raazi, Z. Pervez, S. Lee, Key management schemes of wireless sensor networks a survey, in Security of Self-Organizing Networks MANET, WSN, WMN, VANET, Auerbach Publications, 2011

    Google Scholar 

  24. J. Chirillo, Hack Attacks Revealed, a Complete Reference with Custom Security Hacking Toolkit (John Wiley & Sons, New York, NY, 2001)

    Google Scholar 

  25. M.N. Mejri, J. Ben-Othman, M. Hamdi, Survey on VANET security challenges and possible cryptographic solutions. Veh. Commun. 1(2), 53–66 (2014)

    Google Scholar 

  26. J. Sen, A Survey on Wireless Sensor Network Security, 2010

    Google Scholar 

  27. Z.M. Fadlullah, T. Taleb, M. Schöller, Combating against security attacks against mobile ad hoc networks (MANETs), in Security of Self-Organizing Networks MANET, WSN, WMN, VANE, Auerbach Publications, 2011

    Google Scholar 

  28. S. Piper, Intrusion Prevention Systems for Dummies (Wiley Publishing, Inc., 2011)

    Google Scholar 

  29. S. Martin, M. Tokutomi, Password Cracking, researchers report, Arizona University, USA (2012)

    Google Scholar 

  30. C.P. Pfleeger, S.L.R. Pfleeger, Security in Computing, 4th edn. (Prentice Hall, 2006)

    Google Scholar 

  31. K.D. Mitnick, W.L. Simon, The Art of Deception Controlling the Human Element of Security (Wiley Publishing, Indiana, USA and simultaneously in Canada 2002)

    Google Scholar 

  32. P.A.H. Peterson, P. Reiher, Exploits: buffer overflows, pathname attacks, and SQL injections, mathcs [Online], http://mathcs.slu.edu/~chambers/spring11/security/assignments/lab05.html. Accessed 26 Mar 2016

  33. S. Noel, D. Wijesekera, C. Youman, Modern Intrusion Detection, Data Mining, and Degrees of Attack Guilt (Springer, 2002)

    Google Scholar 

  34. J.M. Kizza, A Guide to Computer Network Security (Springer, 2009)

    Google Scholar 

  35. R.L. Krutz, R.D. Vines, Cloud Security A Comprehensive Guide to Secure Cloud Computing (Wiley Publishing, 2010)

    Google Scholar 

  36. W. Apolinarski, Cohen and the First Computer Virus, Seminar “Malware” Prof. Dr. Joachim von zur Gathen, Daniel Loebenberger WS (2007–2008)

    Google Scholar 

  37. G. White, S. Black, Malware, Spyware, Adware, Viruses, Information Technology Services (Clark College), 2011

    Google Scholar 

  38. N. Weaver, V. Paxson, S. Staniford, R. Cunningham, A taxonomy of computer worms, in ACM Workshop on Rapid Malcode, 2003

    Google Scholar 

  39. M. Madou, E. Lee, J. West, B. Chess, Watch what you write: preventing cross-site scripting by observing program output, in OWASP AppSec Conference, 2008

    Google Scholar 

  40. M. Bishop, Introduction to Computer Viruses (Pearson Education India, 2006)

    Google Scholar 

  41. M. Egan, T. Mather, The Executive Guide to Information Security Threats, Challenges, and Solutions (Addison Wesley Professional, 2004)

    Google Scholar 

  42. C. Wysopal, C. Eng, T. Shields, Static Detection of Application Backdoors (Black Hat, USA, 2007)

    Google Scholar 

  43. E. Casey, Digital Evidence and Computer Crime 3rd edn. (Academic Press, 2011)

    Google Scholar 

  44. T. Roosta, S. Shieh, S. Sastry, Taxonomy of security attacks in sensor networks and countermeasures, in The First IEEE International Conference on System Integration and Reliability Improvements, 2006, p. 25

    Google Scholar 

  45. P. Seuwou, D. Patel, G. Ubakanma, Vehicular ad hoc network applications and security: a study into the economic and the legal implications. Int. J. Electron. Secur. Digit. Forensics 6(2), 115–129 (2014)

    Article  Google Scholar 

  46. T. Roosta, Taxonomy of security attacks in sensor networks and countermeasures, in The first IEEE International Conference on System Integration and Reliability Improvements, vol. 25, 2006

    Google Scholar 

  47. M. Mana, M. Feham, B.A. Bensaber, SEKEBAN (secure and efficient key exchange for wireless body area network). Int. J. Adv. Sci. Technol. 12, 15 (2009)

    Google Scholar 

  48. M.A. Ameen, J. Liu, K. Kwak, Security and privacy issues in wireless sensor networks for healthcare applications. J. Med. Syst. 36(1), 8 (2012)

    Article  Google Scholar 

  49. M. Abomhara, G.M. Koien, Security and privacy in the internet of things: current status and open issues, in Privacy and Security in Mobile Systems (PRISMS), International Conference on. IEEE, 2014

    Google Scholar 

  50. S.J. Stolfo, S.M. Bellovin, S. Hershkop, A.D. Keromytis, Insider Attack and Cyber Security Beyond the Hacker (Springer, 2008)

    Google Scholar 

  51. J. Wayman, A. Jain, D. Maltoni, D. Maio, An Introduction to Biometric Authentication Systems (Springer, London, 2005)

    Book  Google Scholar 

  52. I. Curry, An Introduction to Cryptography and Digital Signatures, Version 2.0 (Entrust 2001)

    Google Scholar 

  53. S. Singh, The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography (Anchor, 2011)

    Google Scholar 

  54. L. Benarous, M. Djoudi, A. Bouridane, Etudes Comparatives d’outils de stéganographie et d’outils de stéganalyse: Application aux images et aux vidéos (Amar Telidji University, Laghouat, Algeria, 2015)

    Google Scholar 

  55. Y. Miche, Developing fast machine learning techniques with applications to steganalysis problems, Thèse de doctorat., Institut National Polytechnique de Grenoble-INPG, 2010

    Google Scholar 

  56. T. Sereyvathana, Discriminative algorithms for large-scale image steganalysis and their limitation, Electronic Theses, Treatises and Dissertations, The Florida State University, Florida, 2012

    Google Scholar 

  57. Stegosploit, the hack news [Online], http://thehackernews.com/2015/06/Stegosploit-malware.html. Accessed 25 July 2016

  58. Hackers exfiltrating data with video steganography, tripwire [Online], http://www.tripwire.com/state-of-security/incident-detection/hackers-exfiltrating-data-with-video-steganography-via-cloud-video-services/. Accessed 25 July 2016

  59. S.K.J. Pooja, P. Balgurgi, Audio steganography used for secure data transmission, in Proceedings of International Conference on Advances in Computing, Springer, India, 2012

    Google Scholar 

  60. M. Shirali-Shahreza, Text Steganography by changing words spelling, in Advanced Communication Technology, 2008. ICACT 2008. 10th International Conference on, Volume: 3, Gangwon-do, 2008

    Google Scholar 

  61. M.L. Bensaad, Steganography and digital watermarking, Ph.D. Thesis, University of Laghouat (Amar Telidji), Laghouat, Algeria, 2014

    Google Scholar 

  62. R. Bergmair, Towards Linguistic Steganography: A Systematic Investigation of Approaches Systems, and Issues, Final year thesis, B. Sc.(Hons.) in Computer Studies, The University of Derby, UK, 2004

    Google Scholar 

  63. A. Harper, S. Harris, J. Ness, C. Eagle, G. Lenkey, T. Williams, Gray Hat Hacking the Ethical Hacker’s Handbook, 3rd edn. (McGraw-Hill, 2011)

    Google Scholar 

  64. M.A. Pavlyushchik, Method and system for antimalware scanning with variable scan settings. Patent U.S. 7725941 B1, 25 May 2010

    Google Scholar 

  65. J. Alexander, Intrusion Detection and Prevention Systems (IDS/IPS) Good Practice Guide Jason Alexander (NHS Connecting for Health, 2009)

    Google Scholar 

  66. S. Dinesh, Intrusion Prevention Systems: security’s silver bullet? Bus. Commun. Rev. 33(3), 36–41 (2003)

    Google Scholar 

  67. K. Scarfone, P. Mell, Guide to Intrusion Detection and Prevention Systems (IDPS), NIST special publication, 800, 94, 2007

    Google Scholar 

  68. C. Martin, Intrusion detection and prevention systems in the industrial automation and control systems environment, in Process Control Systems Industry Conference, Industrial Defender Inc. 2008.

    Google Scholar 

  69. I. Mukhopadhyay, M. Chakraborty, S. Chakrabarti, A comparative study of related technologies of intrusion detection & prevention systems. J. Inf. Secur. 2, 11 (2011)

    Google Scholar 

  70. Y. Farhaoui, Intrusion prevention system inspired immune systems. Indones. J. Electr. Eng. Comput. Sci. 2(1), 168–179 (2016)

    Google Scholar 

  71. Masquelier, Mottier, Pronzato, Les Firewalls, Institut d’électronique et d’informatique Gaspard-Monge (IGM), France, 2000

    Google Scholar 

  72. M.A. Ameen, J. Liu, K. Kwak, Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications (Springer, 2010), p. 9

    Google Scholar 

  73. Y. Yan, Y. Qian, H. Sharif, D. Tipper, A survey on cyber security for smart grid communications. IEEE Commun. Surv. Tutorials 14(4), 998–1010 (2012)

    Article  Google Scholar 

  74. S. Goldwasser, M. Bellare, Lecture Notes on Cryptography (MIT, 2008)

    Google Scholar 

  75. J. Hoopes, Virtualization for Security Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting, Syngress, Burlington, USA, 2008

    Google Scholar 

  76. M. Raya, J. P. Hubaux, The security of vehicular ad hoc networks. J. Comput. Secur. 15(1), 39–68 (2007)

    Google Scholar 

  77. A. Cecil, A summary of hacking organizations, conferences, publications, and effects on society. [online], http://www.cse.wustl.edu/~jain/cse571-07/ftp/hacking_orgs/. Accessed 25 July 2016

  78. Certified Ethical Hacker, Eccouncil [Online], https://www.eccouncil.org/Certification/certified-ethical-hacker. Accessed 09 June 2016

  79. L.A. Long, Profiling Hackers (The SANS Institut, 2012)

    Google Scholar 

  80. Eye Scaning 2012, [Online], http://www.messagetoeagle.com/images/eyescanning.jpg. Accessed 25 July 2016

  81. D. John, How iris recognition works. IEEE Trans. Circuits Syst. Video Technol. 14(1), 21–30 (2004)

    Article  Google Scholar 

  82. D. Bhattacharyya, R. Ranjan, F. Alisherov, M. Choi, Biometric authentication: a review. Int. J. u–e-Serv. Sci. Technol. 2(3), 13–28 (2009)

    Google Scholar 

  83. A. Abaza, A. Ross, C. Hebert, M.A.F. Harrison, M.S. Nixon, A survey on ear biometrics. ACM Comput. Surv. 45(2), 35 (2013)

    Article  Google Scholar 

  84. NEC biometrics technology uses sound to distinguish individually unique ear shape. NEC, 7 Mar 2016 [Online], http://www.nec.com/en/press/201603/global_20160307_01.html. Accessed 30 Apr 2016

  85. Face recognition, 2016 [Online], http://reconocimientofacial.site/wp-content/uploads/2016/01/reconocimiento-facial-orna-innovations.jpg Accessed 07 October 2016

  86. M. Savvides, J. Heo, S.W. Park, Face Recognition, in Handbook of Biometrics, ed. by A.K. Jain, P. Flynn, A.A. Ross (Springer Science & Business Media, New York, 2007), p. 43

    Google Scholar 

  87. human facial recognition, 2002, [Online]. http://www.nationalinfrared.com/images/Human_facial_imaging_recognition.jpg. Accessed 25 July 2016

  88. S. Vasikarla, H. Madasu, Online biometric authentication using facial thermograms, in Applied Imagery Pattern Recognition Workshop (AIPR), IEEE, 2012

    Google Scholar 

  89. Lip print 2013, [Online], http://www.jfds.org/articles/2013/5/2/images/JForensicDentSci_2013_5_2_110_ 119777_f7.jpg. Accessed 25 July 2016

  90. M. Chora, The Lip as a Biometric (Springer, 2009)

    Google Scholar 

  91. O.S. Adeoye, A survey of emerging biometric technologies. Int. J. Comput. Appl. 9(10), 0975–8887 (2010)

    Google Scholar 

  92. D. Maltoni, R. Cappelli, Handbook of biometrics, in Fingerprint Recognition, ed. by A.K. Jain, P. Flynn, A.A. Ross (Springer, New York, 2008), pp. 23–42

    Google Scholar 

  93. I.B. Barbosa, T. Theoharis, A.E. Abdallah, On the use of fingernail images as transient biometric identifiers Biometric recognition using fingernail images. Mach. Vis. Appl. 27(1), 65–76 (2016)

    Article  Google Scholar 

  94. SkullConduct, 2016, [Online], http://s.newsweek.com/sites/www.newsweek.com/files/styles/embed-lg/public/2016/04/25/biometrics-skull-skullconduct-password-security.jpg. Accessed 25 July 2016

  95. S. Schneegass, Y. Oualil, A. Bulling, SkullConduct: biometric user identification on eyewear computers using bone conduction through the skull, in Proceedings of the 34th ACM SIGCHI Conference on Human Factors in Computing Systems (CHI 2016), 2016

    Google Scholar 

  96. H.O. Alanazi, B.B Zaidan, A.A Zaidan, 3D Skull recognition using 3D matching technique. J. Comput. 2(1) (2010), p121–126

    Google Scholar 

  97. C.R. Hema, M.P. Paulraj, H. Kaur, Brain signatures: a modality for biometric authentication, in International Conference on Electronic Design, Penang, Malaysia, 2008

    Google Scholar 

  98. P. Inbavalli, G. Nandhini, Body odor as a biometric authentication. Int. J. Comput. Sci. Inform. Technol. 5(5), 6270–6274 (2014)

    Google Scholar 

  99. Intech, 2011, [Online], http://www.intechopen.com/source/html/17745/media/image2.png. Accessed 01 Aug 2016

  100. G. Lu, D. Zhang, W.K. Kong, M. Wong, A palmprint authentication system, in Handbook of Biometrics, ed. by A.K. Jain, P. Flynn, A.A. Ross (Springer, New York, 2008), p. 171–187

    Google Scholar 

  101. [Online], http://www.360biometrics.com/img/hand_features.gif. Accessed 25 July 2016

  102. S.T. David, P. Sidlauskas, in Hand Geometry Recognition. Handbook of Biometrics (Springer, 2008), p. 91–107

    Google Scholar 

  103. Palm Veins, 2012, [Online], https://crisisboom.files.wordpress.com/2012/01/how-palm-vein-works.gif. Accessed 25 July 2016

  104. D. Mulyono, H.S. Jinn, A study of finger vein biometric for personal identification, in Biometrics and Security Technologies, IEEE, pp. 1–8, 2008

    Google Scholar 

  105. K. Wang, Z. Yuan, D. Zhuang, Hand vein recognition based on multi supplemental features of multi-classifier fusion decision, in Mechatronics and Automation, Proceedings of the 2006 IEEE International Conference (Luoyang, Henan: IEEE, 2006)

    Google Scholar 

  106. G. Ioan Buciu, Biometrics systems and technologies: a survey. Int. J. Comput. Commun. Control 11(3), 315–330 (2016)

    Article  Google Scholar 

  107. L. Wang, H. Ning, T. Tan, W. Hu, Fusion of static and dynamic body biometrics for gait recognition. IEEE Trans. Circuits Syst. Video Technol. 14(2), 149–158 (2004)

    Article  Google Scholar 

  108. J.E. Mason, I. Traoré, I. Woungang, Gait (Canada) biometric recognition, in Machine Learning Techniques for Gait Biometric Recognition, ed. by J.E. Mason, I. Traoré, I. Woungang (Springer International Publishing, Switzerland), 9–35, 2016.

    Google Scholar 

  109. Pulse,2012, [Online], http://www.homelandsecuritynewswire.com/sites/default/files/imagecache/stand ard/pulse_biometrics-1.jpg. Accessed 25 July 2016

  110. F. Agrafioti, D. Hatzinakos, J. Gao, Heart Biometrics: Theory, Methods and Applications (INTECH Open Access Publisher, 2011)

    Google Scholar 

  111. Hand signature, [Online], http://www.b2bedocuments.com/images/signaturepad08.jpg. Accessed 25 July 2016

  112. R. Das, S. Dhar, S. Das, S. Dutta, S. Mukherjee, A comparative study of biometric authentication based on handwritten signature. Int. J. Res. Eng. Technol. 02(12), 2321–7308 (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Leila Benarous or Benamar Kadri .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Benarous, L., Kadri, B., Bouridane, A. (2017). A Survey on Cyber Security Evolution and Threats: Biometric Authentication Solutions. In: Jiang, R., Al-maadeed, S., Bouridane, A., Crookes, P.D., Beghdadi, A. (eds) Biometric Security and Privacy. Signal Processing for Security Technologies. Springer, Cham. https://doi.org/10.1007/978-3-319-47301-7_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-47301-7_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-47300-0

  • Online ISBN: 978-3-319-47301-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics