Version 1
: Received: 16 September 2024 / Approved: 18 September 2024 / Online: 20 September 2024 (03:17:26 CEST)
How to cite:
Ravichandran, N.; Tewaraja, T.; Rajasegaran, V.; Kumar, S. S.; Gunasekar, S. K. L.; Sindiramutty, S. R. Comprehensive Review Analysis and Countermeasures for Cybersecurity Threats: DDoS, Ransomware, and Trojan Horse Attacks. Preprints2024, 2024091369. https://doi.org/10.20944/preprints202409.1369.v1
Ravichandran, N.; Tewaraja, T.; Rajasegaran, V.; Kumar, S. S.; Gunasekar, S. K. L.; Sindiramutty, S. R. Comprehensive Review Analysis and Countermeasures for Cybersecurity Threats: DDoS, Ransomware, and Trojan Horse Attacks. Preprints 2024, 2024091369. https://doi.org/10.20944/preprints202409.1369.v1
Ravichandran, N.; Tewaraja, T.; Rajasegaran, V.; Kumar, S. S.; Gunasekar, S. K. L.; Sindiramutty, S. R. Comprehensive Review Analysis and Countermeasures for Cybersecurity Threats: DDoS, Ransomware, and Trojan Horse Attacks. Preprints2024, 2024091369. https://doi.org/10.20944/preprints202409.1369.v1
APA Style
Ravichandran, N., Tewaraja, T., Rajasegaran, V., Kumar, S. S., Gunasekar, S. K. L., & Sindiramutty, S. R. (2024). Comprehensive Review Analysis and Countermeasures for Cybersecurity Threats: DDoS, Ransomware, and Trojan Horse Attacks. Preprints. https://doi.org/10.20944/preprints202409.1369.v1
Chicago/Turabian Style
Ravichandran, N., Siva Kumar Livekha Gunasekar and Siva Raja Sindiramutty. 2024 "Comprehensive Review Analysis and Countermeasures for Cybersecurity Threats: DDoS, Ransomware, and Trojan Horse Attacks" Preprints. https://doi.org/10.20944/preprints202409.1369.v1
Abstract
With all the sophisticated threats to network security, intrusion detection is a section of the security technology industry that is becoming increasingly significant. In this research paper, we have discussed in detail the detection, effects, and prevention protocols of security issues. Security issues are a wide range of elements. Hence, we narrowed our research to two main sectors which are malware attacks and distributed denial of service (DDOS). To make the research more informative, we looked at three selected real-life cases of security intrusion that occurred around the world in recent years. Malware attacks and DDOS are constantly being developed creatively to challenge all the current security systems. In addition, we have analysed and highlighted the potential threats of the security issue and included proposed countermeasure ideas to avoid the security issues. The research findings also show us that malware is evolving simultaneously with our security technology growth. This gives us an understanding that prevention is significantly a continual improvement process.
Computer Science and Mathematics, Computer Science
Copyright:
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.