IDEAS home Printed from https://ideas.repec.org/a/aif/journl/v28y2023i1p21-30.html
   My bibliography  Save this article

Enhancing Cybersecurity against Stuxnet in the Future of Cyberwarfare: A Combined Approach Using Firewalls and Intrusion Detection Systems

Author

Listed:
  • Zina Balani

    (Department of Software Engineering, Lebanese French University, Erbil, Iraq.)

  • Mohammed Nasseh Mohammed

    (Department of Software and Informatics, college of Engineering, Salahaddin University, Erbil, Iraq.)

Abstract

Stuxnet is a highly customized malware developed to destroy centrifuges used in the Iranian nuclear program through SCADA systems. It infects a computer through a USB drive, making it effective for targeting air-gapped networks. Stuxnet is larger and more complex than an equivalent worm; it is created in several different programming languages, and some components are encrypted. The malware utilizes four unprecedented zero-day vulnerability attacks that exploit application security vulnerabilities before developers become aware of the vulnerability. Additionally, it employs advanced rootkit technology to conceal itself from users and antimalware software on both Windows and the control computer it targets. To strengthen cybersecurity, this study implemented and configured a combination of firewalls and intrusion detection systems (IDS) to enhance security against the Stuxnet malware. By integrating these security measures, the aim was to establish a robust defense against the sophisticated attack methods employed by Stuxnet. It is essential to continuously update and adapt these security measures as the threat landscape evolves. By remaining vigilant and proactive, organizations can effectively safeguard their systems from sophisticated threats like Stuxnet, bolstering their cybersecurity defenses.

Suggested Citation

  • Zina Balani & Mohammed Nasseh Mohammed, 2023. "Enhancing Cybersecurity against Stuxnet in the Future of Cyberwarfare: A Combined Approach Using Firewalls and Intrusion Detection Systems," International Journal of Science and Business, IJSAB International, vol. 28(1), pages 21-30.
  • Handle: RePEc:aif:journl:v:28:y:2023:i:1:p:21-30
    as

    Download full text from publisher

    File URL: https://ijsab.com/wp-content/uploads/2202.pdf
    Download Restriction: no

    File URL: https://ijsab.com/volume-28-issue-1/6085
    Download Restriction: no
    ---><---

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:aif:journl:v:28:y:2023:i:1:p:21-30. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Farjana Rahman (email available below). General contact details of provider: .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.