Preprint Review Version 1 Preserved in Portico This version is not peer-reviewed

Comprehensive Review Analysis and Countermeasures for Cybersecurity Threats: DDoS, Ransomware, and Trojan Horse Attacks

Version 1 : Received: 16 September 2024 / Approved: 18 September 2024 / Online: 20 September 2024 (03:17:26 CEST)

How to cite: Ravichandran, N.; Tewaraja, T.; Rajasegaran, V.; Kumar, S. S.; Gunasekar, S. K. L.; Sindiramutty, S. R. Comprehensive Review Analysis and Countermeasures for Cybersecurity Threats: DDoS, Ransomware, and Trojan Horse Attacks. Preprints 2024, 2024091369. https://doi.org/10.20944/preprints202409.1369.v1 Ravichandran, N.; Tewaraja, T.; Rajasegaran, V.; Kumar, S. S.; Gunasekar, S. K. L.; Sindiramutty, S. R. Comprehensive Review Analysis and Countermeasures for Cybersecurity Threats: DDoS, Ransomware, and Trojan Horse Attacks. Preprints 2024, 2024091369. https://doi.org/10.20944/preprints202409.1369.v1

Abstract

With all the sophisticated threats to network security, intrusion detection is a section of the security technology industry that is becoming increasingly significant. In this research paper, we have discussed in detail the detection, effects, and prevention protocols of security issues. Security issues are a wide range of elements. Hence, we narrowed our research to two main sectors which are malware attacks and distributed denial of service (DDOS). To make the research more informative, we looked at three selected real-life cases of security intrusion that occurred around the world in recent years. Malware attacks and DDOS are constantly being developed creatively to challenge all the current security systems. In addition, we have analysed and highlighted the potential threats of the security issue and included proposed countermeasure ideas to avoid the security issues. The research findings also show us that malware is evolving simultaneously with our security technology growth. This gives us an understanding that prevention is significantly a continual improvement process.

Keywords

Cybersecurity; DDoS Attacks; Ransomware; Trojan Horse; Countermeasures

Subject

Computer Science and Mathematics, Computer Science

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.