Abstract
Cybersecurity threats are serious, costly and challenging because they are various, evolutive and easily spread. This chapter is dedicated to brief these issues, its evolution and the various solutions provided by the researchers; it also surveys the biometric solutions to one of the key issues of cybersecurity which is the intrusion, by providing robust authentication solutions basing on the unique physical and behavioural characteristics of the user.
References
Cyber attack (2016) [Online], http://money.cnn.com/2015/04/14/technology/security/cyber-attack-hacks-security/
Tor, [Online], https://www.torproject.org/. Accessed 26 July 2016
A. Kwon, D. Lazar, S. Devadas, B. Ford, Riffle an efficient communication system with strong anonymity, in Proceedings on Privacy Enhancing Technologies, vol. 1, no. 20, 2016
G.I. Rathod, D.A. Nikam, Darknet: a class of networks to share anonymous digital content. Int. J. Innov. Res. Comput. Commun. Eng. 3(7), 8 (2015)
Top 500 websites, ALEXA [Online], http://www.alexa.com/topsites. Accessed 25 Mar 2016
K. Geers, Strategic Cyber Security (CCD COE, Tallinn, 2011)
S. Lawson, Beyond Cyber-Doom: Cyberattack Scenarios and the Evidence of History (Mercatus Center at George Mason University, 2011), p. 38
R. Brown, Computer security threats: a brief history (2014) [Online], https://powermore.dell.com/technology/computer-security-threats-brief-history/. Accessed 01 Mar 2016
M. Warner, Cybersecurity: a pre-history. Intell. Natl. Secur. 27(5), 19 (2012)
M.D. Cavelty, Cyber Security (Oxford University Press, Oxford, 2012)
C.P. Pfleeger, S.L. Pfleeger, J. Margulies, Security in Computing, 5th edn. (Prentice Hall, Upper Saddle River, NJ, 2015)
K.M. Lord, T. Sharp, America’s Cyber Future Security and Prosperity in the Information Age volume II, Washington, DC : Center of New American Security, 2011
Q. Gu, P. Liu, Denial of Service Attacks. Handbook of Computer Networks: Distributed Networks, Network Planning, Control, Management, and New Trends and Applications, 3, 454–468, 2007
D.L. Shinder, E. Tittel, Tittel, Cybercrime Scene of the Computer Forensics Handbook (Syngress, Rockland, USA, 2002)
S. Friedl’s, An Illustrated Guide to the Kaminsky DNS Vulnerability, Unixwiz.net Tech Tips [Online], http://unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html. Accessed 27 July 2016
S. Fontaine, Attaque DOS (Deny of service), authsecu [Online], http://www.authsecu.com/dos-attaque-deny-of-service/dos-attaque-deny-of-service.php#Attaque_SynFlood. Accessed 19 Mar 2016
Y. Wang, G. Attebury, B. Ramamurthy, A survey of security issues in wireless sensor networks. IEEE Commun. Surv. Tutorials 8(2), 23 (2006)
“Man in the middle attack,” valency networks (2008) [Online], http://www.valencynetworks.com/articles/cyber-attacks-explained-man-in-the-middle-attack.html. Accessed 31 July 2016
S. Şen, J.A. Clark, J.E. Tapiador, Security threats in mobile ad hoc networks, in Security of Self-Organizing Networks: MANET, WSN, WMN, VANET, Auerbach Publications, 2011
Y.-C. Hu, A. Perrig, D.B. Johnson, Wormhole attacks in wireless networks. IEEE J. Sel. Areas Commun. 24(2), 11 (2006)
M. Jakobsson, S. Wetzel, B. Yener, Stealth attacks on ad-hoc wireless networks, in Vehicular Technology Conference, IEEE 58th, p. 9, 2003
C. Laurendeau, M. Barbeau, Threats to Security in DSRC/WAVE (Springer, Heidelberg, 2006), pp. 266–279
S.M.K.R. Raazi, Z. Pervez, S. Lee, Key management schemes of wireless sensor networks a survey, in Security of Self-Organizing Networks MANET, WSN, WMN, VANET, Auerbach Publications, 2011
J. Chirillo, Hack Attacks Revealed, a Complete Reference with Custom Security Hacking Toolkit (John Wiley & Sons, New York, NY, 2001)
M.N. Mejri, J. Ben-Othman, M. Hamdi, Survey on VANET security challenges and possible cryptographic solutions. Veh. Commun. 1(2), 53–66 (2014)
J. Sen, A Survey on Wireless Sensor Network Security, 2010
Z.M. Fadlullah, T. Taleb, M. Schöller, Combating against security attacks against mobile ad hoc networks (MANETs), in Security of Self-Organizing Networks MANET, WSN, WMN, VANE, Auerbach Publications, 2011
S. Piper, Intrusion Prevention Systems for Dummies (Wiley Publishing, Inc., 2011)
S. Martin, M. Tokutomi, Password Cracking, researchers report, Arizona University, USA (2012)
C.P. Pfleeger, S.L.R. Pfleeger, Security in Computing, 4th edn. (Prentice Hall, 2006)
K.D. Mitnick, W.L. Simon, The Art of Deception Controlling the Human Element of Security (Wiley Publishing, Indiana, USA and simultaneously in Canada 2002)
P.A.H. Peterson, P. Reiher, Exploits: buffer overflows, pathname attacks, and SQL injections, mathcs [Online], http://mathcs.slu.edu/~chambers/spring11/security/assignments/lab05.html. Accessed 26 Mar 2016
S. Noel, D. Wijesekera, C. Youman, Modern Intrusion Detection, Data Mining, and Degrees of Attack Guilt (Springer, 2002)
J.M. Kizza, A Guide to Computer Network Security (Springer, 2009)
R.L. Krutz, R.D. Vines, Cloud Security A Comprehensive Guide to Secure Cloud Computing (Wiley Publishing, 2010)
W. Apolinarski, Cohen and the First Computer Virus, Seminar “Malware” Prof. Dr. Joachim von zur Gathen, Daniel Loebenberger WS (2007–2008)
G. White, S. Black, Malware, Spyware, Adware, Viruses, Information Technology Services (Clark College), 2011
N. Weaver, V. Paxson, S. Staniford, R. Cunningham, A taxonomy of computer worms, in ACM Workshop on Rapid Malcode, 2003
M. Madou, E. Lee, J. West, B. Chess, Watch what you write: preventing cross-site scripting by observing program output, in OWASP AppSec Conference, 2008
M. Bishop, Introduction to Computer Viruses (Pearson Education India, 2006)
M. Egan, T. Mather, The Executive Guide to Information Security Threats, Challenges, and Solutions (Addison Wesley Professional, 2004)
C. Wysopal, C. Eng, T. Shields, Static Detection of Application Backdoors (Black Hat, USA, 2007)
E. Casey, Digital Evidence and Computer Crime 3rd edn. (Academic Press, 2011)
T. Roosta, S. Shieh, S. Sastry, Taxonomy of security attacks in sensor networks and countermeasures, in The First IEEE International Conference on System Integration and Reliability Improvements, 2006, p. 25
P. Seuwou, D. Patel, G. Ubakanma, Vehicular ad hoc network applications and security: a study into the economic and the legal implications. Int. J. Electron. Secur. Digit. Forensics 6(2), 115–129 (2014)
T. Roosta, Taxonomy of security attacks in sensor networks and countermeasures, in The first IEEE International Conference on System Integration and Reliability Improvements, vol. 25, 2006
M. Mana, M. Feham, B.A. Bensaber, SEKEBAN (secure and efficient key exchange for wireless body area network). Int. J. Adv. Sci. Technol. 12, 15 (2009)
M.A. Ameen, J. Liu, K. Kwak, Security and privacy issues in wireless sensor networks for healthcare applications. J. Med. Syst. 36(1), 8 (2012)
M. Abomhara, G.M. Koien, Security and privacy in the internet of things: current status and open issues, in Privacy and Security in Mobile Systems (PRISMS), International Conference on. IEEE, 2014
S.J. Stolfo, S.M. Bellovin, S. Hershkop, A.D. Keromytis, Insider Attack and Cyber Security Beyond the Hacker (Springer, 2008)
J. Wayman, A. Jain, D. Maltoni, D. Maio, An Introduction to Biometric Authentication Systems (Springer, London, 2005)
I. Curry, An Introduction to Cryptography and Digital Signatures, Version 2.0 (Entrust 2001)
S. Singh, The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography (Anchor, 2011)
L. Benarous, M. Djoudi, A. Bouridane, Etudes Comparatives d’outils de stéganographie et d’outils de stéganalyse: Application aux images et aux vidéos (Amar Telidji University, Laghouat, Algeria, 2015)
Y. Miche, Developing fast machine learning techniques with applications to steganalysis problems, Thèse de doctorat., Institut National Polytechnique de Grenoble-INPG, 2010
T. Sereyvathana, Discriminative algorithms for large-scale image steganalysis and their limitation, Electronic Theses, Treatises and Dissertations, The Florida State University, Florida, 2012
Stegosploit, the hack news [Online], http://thehackernews.com/2015/06/Stegosploit-malware.html. Accessed 25 July 2016
Hackers exfiltrating data with video steganography, tripwire [Online], http://www.tripwire.com/state-of-security/incident-detection/hackers-exfiltrating-data-with-video-steganography-via-cloud-video-services/. Accessed 25 July 2016
S.K.J. Pooja, P. Balgurgi, Audio steganography used for secure data transmission, in Proceedings of International Conference on Advances in Computing, Springer, India, 2012
M. Shirali-Shahreza, Text Steganography by changing words spelling, in Advanced Communication Technology, 2008. ICACT 2008. 10th International Conference on, Volume: 3, Gangwon-do, 2008
M.L. Bensaad, Steganography and digital watermarking, Ph.D. Thesis, University of Laghouat (Amar Telidji), Laghouat, Algeria, 2014
R. Bergmair, Towards Linguistic Steganography: A Systematic Investigation of Approaches Systems, and Issues, Final year thesis, B. Sc.(Hons.) in Computer Studies, The University of Derby, UK, 2004
A. Harper, S. Harris, J. Ness, C. Eagle, G. Lenkey, T. Williams, Gray Hat Hacking the Ethical Hacker’s Handbook, 3rd edn. (McGraw-Hill, 2011)
M.A. Pavlyushchik, Method and system for antimalware scanning with variable scan settings. Patent U.S. 7725941 B1, 25 May 2010
J. Alexander, Intrusion Detection and Prevention Systems (IDS/IPS) Good Practice Guide Jason Alexander (NHS Connecting for Health, 2009)
S. Dinesh, Intrusion Prevention Systems: security’s silver bullet? Bus. Commun. Rev. 33(3), 36–41 (2003)
K. Scarfone, P. Mell, Guide to Intrusion Detection and Prevention Systems (IDPS), NIST special publication, 800, 94, 2007
C. Martin, Intrusion detection and prevention systems in the industrial automation and control systems environment, in Process Control Systems Industry Conference, Industrial Defender Inc. 2008.
I. Mukhopadhyay, M. Chakraborty, S. Chakrabarti, A comparative study of related technologies of intrusion detection & prevention systems. J. Inf. Secur. 2, 11 (2011)
Y. Farhaoui, Intrusion prevention system inspired immune systems. Indones. J. Electr. Eng. Comput. Sci. 2(1), 168–179 (2016)
Masquelier, Mottier, Pronzato, Les Firewalls, Institut d’électronique et d’informatique Gaspard-Monge (IGM), France, 2000
M.A. Ameen, J. Liu, K. Kwak, Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications (Springer, 2010), p. 9
Y. Yan, Y. Qian, H. Sharif, D. Tipper, A survey on cyber security for smart grid communications. IEEE Commun. Surv. Tutorials 14(4), 998–1010 (2012)
S. Goldwasser, M. Bellare, Lecture Notes on Cryptography (MIT, 2008)
J. Hoopes, Virtualization for Security Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting, Syngress, Burlington, USA, 2008
M. Raya, J. P. Hubaux, The security of vehicular ad hoc networks. J. Comput. Secur. 15(1), 39–68 (2007)
A. Cecil, A summary of hacking organizations, conferences, publications, and effects on society. [online], http://www.cse.wustl.edu/~jain/cse571-07/ftp/hacking_orgs/. Accessed 25 July 2016
Certified Ethical Hacker, Eccouncil [Online], https://www.eccouncil.org/Certification/certified-ethical-hacker. Accessed 09 June 2016
L.A. Long, Profiling Hackers (The SANS Institut, 2012)
Eye Scaning 2012, [Online], http://www.messagetoeagle.com/images/eyescanning.jpg. Accessed 25 July 2016
D. John, How iris recognition works. IEEE Trans. Circuits Syst. Video Technol. 14(1), 21–30 (2004)
D. Bhattacharyya, R. Ranjan, F. Alisherov, M. Choi, Biometric authentication: a review. Int. J. u–e-Serv. Sci. Technol. 2(3), 13–28 (2009)
A. Abaza, A. Ross, C. Hebert, M.A.F. Harrison, M.S. Nixon, A survey on ear biometrics. ACM Comput. Surv. 45(2), 35 (2013)
NEC biometrics technology uses sound to distinguish individually unique ear shape. NEC, 7 Mar 2016 [Online], http://www.nec.com/en/press/201603/global_20160307_01.html. Accessed 30 Apr 2016
Face recognition, 2016 [Online], http://reconocimientofacial.site/wp-content/uploads/2016/01/reconocimiento-facial-orna-innovations.jpg Accessed 07 October 2016
M. Savvides, J. Heo, S.W. Park, Face Recognition, in Handbook of Biometrics, ed. by A.K. Jain, P. Flynn, A.A. Ross (Springer Science & Business Media, New York, 2007), p. 43
human facial recognition, 2002, [Online]. http://www.nationalinfrared.com/images/Human_facial_imaging_recognition.jpg. Accessed 25 July 2016
S. Vasikarla, H. Madasu, Online biometric authentication using facial thermograms, in Applied Imagery Pattern Recognition Workshop (AIPR), IEEE, 2012
Lip print 2013, [Online], http://www.jfds.org/articles/2013/5/2/images/JForensicDentSci_2013_5_2_110_ 119777_f7.jpg. Accessed 25 July 2016
M. Chora, The Lip as a Biometric (Springer, 2009)
O.S. Adeoye, A survey of emerging biometric technologies. Int. J. Comput. Appl. 9(10), 0975–8887 (2010)
D. Maltoni, R. Cappelli, Handbook of biometrics, in Fingerprint Recognition, ed. by A.K. Jain, P. Flynn, A.A. Ross (Springer, New York, 2008), pp. 23–42
I.B. Barbosa, T. Theoharis, A.E. Abdallah, On the use of fingernail images as transient biometric identifiers Biometric recognition using fingernail images. Mach. Vis. Appl. 27(1), 65–76 (2016)
SkullConduct, 2016, [Online], http://s.newsweek.com/sites/www.newsweek.com/files/styles/embed-lg/public/2016/04/25/biometrics-skull-skullconduct-password-security.jpg. Accessed 25 July 2016
S. Schneegass, Y. Oualil, A. Bulling, SkullConduct: biometric user identification on eyewear computers using bone conduction through the skull, in Proceedings of the 34th ACM SIGCHI Conference on Human Factors in Computing Systems (CHI 2016), 2016
H.O. Alanazi, B.B Zaidan, A.A Zaidan, 3D Skull recognition using 3D matching technique. J. Comput. 2(1) (2010), p121–126
C.R. Hema, M.P. Paulraj, H. Kaur, Brain signatures: a modality for biometric authentication, in International Conference on Electronic Design, Penang, Malaysia, 2008
P. Inbavalli, G. Nandhini, Body odor as a biometric authentication. Int. J. Comput. Sci. Inform. Technol. 5(5), 6270–6274 (2014)
Intech, 2011, [Online], http://www.intechopen.com/source/html/17745/media/image2.png. Accessed 01 Aug 2016
G. Lu, D. Zhang, W.K. Kong, M. Wong, A palmprint authentication system, in Handbook of Biometrics, ed. by A.K. Jain, P. Flynn, A.A. Ross (Springer, New York, 2008), p. 171–187
[Online], http://www.360biometrics.com/img/hand_features.gif. Accessed 25 July 2016
S.T. David, P. Sidlauskas, in Hand Geometry Recognition. Handbook of Biometrics (Springer, 2008), p. 91–107
Palm Veins, 2012, [Online], https://crisisboom.files.wordpress.com/2012/01/how-palm-vein-works.gif. Accessed 25 July 2016
D. Mulyono, H.S. Jinn, A study of finger vein biometric for personal identification, in Biometrics and Security Technologies, IEEE, pp. 1–8, 2008
K. Wang, Z. Yuan, D. Zhuang, Hand vein recognition based on multi supplemental features of multi-classifier fusion decision, in Mechatronics and Automation, Proceedings of the 2006 IEEE International Conference (Luoyang, Henan: IEEE, 2006)
G. Ioan Buciu, Biometrics systems and technologies: a survey. Int. J. Comput. Commun. Control 11(3), 315–330 (2016)
L. Wang, H. Ning, T. Tan, W. Hu, Fusion of static and dynamic body biometrics for gait recognition. IEEE Trans. Circuits Syst. Video Technol. 14(2), 149–158 (2004)
J.E. Mason, I. Traoré, I. Woungang, Gait (Canada) biometric recognition, in Machine Learning Techniques for Gait Biometric Recognition, ed. by J.E. Mason, I. Traoré, I. Woungang (Springer International Publishing, Switzerland), 9–35, 2016.
Pulse,2012, [Online], http://www.homelandsecuritynewswire.com/sites/default/files/imagecache/stand ard/pulse_biometrics-1.jpg. Accessed 25 July 2016
F. Agrafioti, D. Hatzinakos, J. Gao, Heart Biometrics: Theory, Methods and Applications (INTECH Open Access Publisher, 2011)
Hand signature, [Online], http://www.b2bedocuments.com/images/signaturepad08.jpg. Accessed 25 July 2016
R. Das, S. Dhar, S. Das, S. Dutta, S. Mukherjee, A comparative study of biometric authentication based on handwritten signature. Int. J. Res. Eng. Technol. 02(12), 2321–7308 (2013)
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Benarous, L., Kadri, B., Bouridane, A. (2017). A Survey on Cyber Security Evolution and Threats: Biometric Authentication Solutions. In: Jiang, R., Al-maadeed, S., Bouridane, A., Crookes, P.D., Beghdadi, A. (eds) Biometric Security and Privacy. Signal Processing for Security Technologies. Springer, Cham. https://doi.org/10.1007/978-3-319-47301-7_15
Download citation
DOI: https://doi.org/10.1007/978-3-319-47301-7_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-47300-0
Online ISBN: 978-3-319-47301-7
eBook Packages: EngineeringEngineering (R0)