Skip to main content

Web Security: A Survey of Latest Trends in Security Attacks

  • Conference paper
Advances in Computer, Communication, Control and Automation

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 121))

  • 3457 Accesses

Abstract

Every system used in real time will be having some security threats. Internet has not been exception for it. From as early as 1980s there has been occurrence of several different types of security attacks with Internet being their major target. Internet happens to be main target due to type and amount of information it stores and advancements in computer networks which makes it very easy for accessing the same. Also, at the same time limitations/design flaws in Internet design, programming languages etc. make attack techniques to evolve from day to day. Due to such evolution of new attack mechanisms, at present, we have a big list of different attacks. Further, motivations for making such attacks range from just having fun to sabotaging critical & specific infrastructures at national level. Hence, in this context, it is very necessary and useful to know about latest trends in security attacks. In this connection this paper provides a brief survey of latest security attacks on web. This paper also provides a summarized comparison of discussed attacks against chosen important parameters. In addition, an observational data about attacks via Emails over a period of time is also presented. The paper concludes by mentioning the need of such surveys and research opportunities in this area.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Boneh, D., Mitchell, J.: Controlhijacking (2009), https://courseware.stanford.edu/pg/courses/CS155

  2. Sotirov, A.: Heap Feng Shui in Javascript. Blackhat Europe (2007)

    Google Scholar 

  3. Daniel, M., Honoroff, J., Miller, C.: Engineering Heap Overflow Exploits with JavaScript. In: WooT 2008 (2008)

    Google Scholar 

  4. Ratanaworabhan, P., Livshits, B., Zorn, B.: Nozzle: A Defense Against Heap-spraying Code Injection Attacks

    Google Scholar 

  5. Blazakis, D.: Interpreter Exploitation: Pointer inference and JiT spraying

    Google Scholar 

  6. Boneh, D.: Unwanted Traffic:DoS/DDoS and Spam Email (2009), https://courseware.stanford.edu/pg/courses/CS155

  7. Shelton, T.: Rootkits: the basics (2006), http://blacksecurity.org

  8. Hoglund, G., Butler, J.: Rootkits: Subverting the Windows Kernel

    Google Scholar 

  9. Sandeep, S.: Process Tracing Using Ptrace, Part2, http://linuxgazette.net/issue83/sandeep.html

  10. Sandeep, S.: Process Tracing Using Ptrace, Part 3, http://linuxgazette.net/issue85/sandeep.html

  11. Bursztein, E.: Malware (2009), https://courseware.stanford.edu/pg/courses/CS155

  12. Romano, M., Rosignoli, S., Giannini, E.: Robot Wars – How Botnets Work. For hakin9

    Google Scholar 

  13. Real World Example: Stuxnet Worm (2010), http://www.csir.co.za/dpss/docs/stuxnet%20presentation2.ppt

  14. http://computerscienceppt.blogspot.com/2010/08/computer-and-network-security.html

  15. http://www.windowsecurity.com/articles/robot-wars-how-botnets-work.html

  16. Cyber Security Threats, The Lowy Institute for International Policy (September 8, 2010)

    Google Scholar 

  17. Paul, B., Yegneswaran, Raju, K.P.: An Inside Look at Botnets. In: Advances in Information Security. Springer, Heidelberg (2006)

    Google Scholar 

  18. http://www.symantec.com/avcenter/reference/windows.rootkit.overview.pdf

  19. http://mcafee.com/us/local_content/white_papers/threat_center/wp_akapoor_rootkits1_en.pdf

  20. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=408559

  21. http://computerscienceppt.blogspot.com/2010/08/computer-and-network-security.html

  22. Lobo, D., Wu, X.-W., Sun, L., Watters, P.: Windows Rootkits: Attacks and Countermeasures. In: 2010 Second Cybercrime and Trustworthy Computing Workshop (2010)

    Google Scholar 

  23. Feily, M., Shahrestani, A., Ramadass, S.: A Survey of Botnet and Botnet Detection. In: Third International Conference on Emerging Security Information, Systems and Technologies (2009)

    Google Scholar 

  24. Worm Targets Industrial-Plant Operations. IEEE Computer Society News Letter (November 2010)

    Google Scholar 

  25. An, Z., Liu, H.: Realization of Buffer Overflow. In: International Forum on Information Technology and Applications (2010)

    Google Scholar 

  26. Qiao, Z., Zhang, Y., Xie, C.: Research and Survey of Low-rate Denial of Service Attacks. In: 13th IEEE Conference on Advances in Communication Technology, ICACT, February 13-16 (2011)

    Google Scholar 

  27. Abu-Nimeh, S., Chen, T.M., Alzubi, O.: A Survey of Malicious and Spam Posts in Facebook. IEEE (2011), doi:10.1109/MC.2011.222

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kallapur, P.V., Geetha, V. (2011). Web Security: A Survey of Latest Trends in Security Attacks. In: Wu, Y. (eds) Advances in Computer, Communication, Control and Automation. Lecture Notes in Electrical Engineering, vol 121. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25541-0_52

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-25541-0_52

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-25540-3

  • Online ISBN: 978-3-642-25541-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics