Abstract
Every system used in real time will be having some security threats. Internet has not been exception for it. From as early as 1980s there has been occurrence of several different types of security attacks with Internet being their major target. Internet happens to be main target due to type and amount of information it stores and advancements in computer networks which makes it very easy for accessing the same. Also, at the same time limitations/design flaws in Internet design, programming languages etc. make attack techniques to evolve from day to day. Due to such evolution of new attack mechanisms, at present, we have a big list of different attacks. Further, motivations for making such attacks range from just having fun to sabotaging critical & specific infrastructures at national level. Hence, in this context, it is very necessary and useful to know about latest trends in security attacks. In this connection this paper provides a brief survey of latest security attacks on web. This paper also provides a summarized comparison of discussed attacks against chosen important parameters. In addition, an observational data about attacks via Emails over a period of time is also presented. The paper concludes by mentioning the need of such surveys and research opportunities in this area.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Boneh, D., Mitchell, J.: Controlhijacking (2009), https://courseware.stanford.edu/pg/courses/CS155
Sotirov, A.: Heap Feng Shui in Javascript. Blackhat Europe (2007)
Daniel, M., Honoroff, J., Miller, C.: Engineering Heap Overflow Exploits with JavaScript. In: WooT 2008 (2008)
Ratanaworabhan, P., Livshits, B., Zorn, B.: Nozzle: A Defense Against Heap-spraying Code Injection Attacks
Blazakis, D.: Interpreter Exploitation: Pointer inference and JiT spraying
Boneh, D.: Unwanted Traffic:DoS/DDoS and Spam Email (2009), https://courseware.stanford.edu/pg/courses/CS155
Shelton, T.: Rootkits: the basics (2006), http://blacksecurity.org
Hoglund, G., Butler, J.: Rootkits: Subverting the Windows Kernel
Sandeep, S.: Process Tracing Using Ptrace, Part2, http://linuxgazette.net/issue83/sandeep.html
Sandeep, S.: Process Tracing Using Ptrace, Part 3, http://linuxgazette.net/issue85/sandeep.html
Bursztein, E.: Malware (2009), https://courseware.stanford.edu/pg/courses/CS155
Romano, M., Rosignoli, S., Giannini, E.: Robot Wars – How Botnets Work. For hakin9
Real World Example: Stuxnet Worm (2010), http://www.csir.co.za/dpss/docs/stuxnet%20presentation2.ppt
http://computerscienceppt.blogspot.com/2010/08/computer-and-network-security.html
http://www.windowsecurity.com/articles/robot-wars-how-botnets-work.html
Cyber Security Threats, The Lowy Institute for International Policy (September 8, 2010)
Paul, B., Yegneswaran, Raju, K.P.: An Inside Look at Botnets. In: Advances in Information Security. Springer, Heidelberg (2006)
http://www.symantec.com/avcenter/reference/windows.rootkit.overview.pdf
http://mcafee.com/us/local_content/white_papers/threat_center/wp_akapoor_rootkits1_en.pdf
http://computerscienceppt.blogspot.com/2010/08/computer-and-network-security.html
Lobo, D., Wu, X.-W., Sun, L., Watters, P.: Windows Rootkits: Attacks and Countermeasures. In: 2010 Second Cybercrime and Trustworthy Computing Workshop (2010)
Feily, M., Shahrestani, A., Ramadass, S.: A Survey of Botnet and Botnet Detection. In: Third International Conference on Emerging Security Information, Systems and Technologies (2009)
Worm Targets Industrial-Plant Operations. IEEE Computer Society News Letter (November 2010)
An, Z., Liu, H.: Realization of Buffer Overflow. In: International Forum on Information Technology and Applications (2010)
Qiao, Z., Zhang, Y., Xie, C.: Research and Survey of Low-rate Denial of Service Attacks. In: 13th IEEE Conference on Advances in Communication Technology, ICACT, February 13-16 (2011)
Abu-Nimeh, S., Chen, T.M., Alzubi, O.: A Survey of Malicious and Spam Posts in Facebook. IEEE (2011), doi:10.1109/MC.2011.222
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kallapur, P.V., Geetha, V. (2011). Web Security: A Survey of Latest Trends in Security Attacks. In: Wu, Y. (eds) Advances in Computer, Communication, Control and Automation. Lecture Notes in Electrical Engineering, vol 121. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25541-0_52
Download citation
DOI: https://doi.org/10.1007/978-3-642-25541-0_52
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-25540-3
Online ISBN: 978-3-642-25541-0
eBook Packages: EngineeringEngineering (R0)