The Reality of Internet Infrastructure and Services Defacement: A Second Look at Characterizing Web-Based Vulnerabilities

被引:1
|
作者
Albalawi, Neaimh [1 ]
Alamrani, Norah [1 ]
Aloufi, Rasha [1 ]
Albalawi, Mariam [1 ]
Aljaedi, Amer [1 ]
Alharbi, Adel R. [1 ]
机构
[1] Univ Tabuk, Coll Comp & Informat Technol, Tabuk 71491, Saudi Arabia
关键词
DNS; website defacement; identity theft; DNS poisoning; spoofing; DOS; DDOS; web application penetration testing; web application scanners;
D O I
10.3390/electronics12122664
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, the number of people using the Internet has increased worldwide, and the use of web applications in many areas of daily life, such as education, healthcare, finance, and entertainment, has also increased. On the other hand, there has been an increase in the number of web application security issues that directly compromise the confidentiality, availability, and integrity of data. One of the most widespread web problems is defacement. In this research, we focus on the vulnerabilities detected on the websites previously exploited and distorted by attackers, and we show the vulnerabilities discovered by the most popular scanning tools, such as OWASP ZAP, Burp Suite, and Nikto, depending on the risk from the highest to the lowest. First, we scan 1000 URLs of defaced websites by using three web application assessment tools (OWASP ZAP, Burp Suite, and Nikto) to detect vulnerabilities which should be taken care of and avoided when building and structuring websites. Then, we compare these tools based on their performance, scanning time, the names and number of vulnerabilities, and the severity of their impact (high, medium, low). Our results show that Burp Suite Professional has the highest number of vulnerabilities, while Nikto has the highest scanning speed. Additionally, the OWASP ZAP tool is shown to have medium- and low-level alerts, but no high-level alerts. Moreover, we detail the best and worst uses of these tools. Furthermore, we discuss the concept of Domain Name System (DNS), how it can be attacked in the most common ways, such as poisoning, DDOS, and DOS, and link it to our topic on the basis of the importance of its infrastructure and how it can be the cause of hacking and distorting sites. Moreover, we introduce the tools used for DNS monitoring. Finally, we give recommendations about the importance of security in the community and for programmers and application developers. Some of them do not have enough knowledge about security, which allow vulnerabilities to occur.
引用
收藏
页数:20
相关论文
共 50 条
  • [1] A web-based coordination infrastructure for grid collective services
    Jaén, J
    Canós, JH
    Navarro, E
    [J]. ADVANCES IN WEB-AGE INFORMATION MANAGEMENT: PROCEEDINGS, 2004, 3129 : 449 - 457
  • [2] WebLicht: Web-based LRT Services in a Distributed eScience Infrastructure
    Hinrichs, Marie
    Zastrow, Thomas
    Hinrichs, Erhard
    [J]. LREC 2010 - SEVENTH INTERNATIONAL CONFERENCE ON LANGUAGE RESOURCES AND EVALUATION, 2010,
  • [3] Web-based Augmented Reality for Information Delivery Services: A Performance Study
    Roy, Samrat Guha
    Kanjilal, Uma
    [J]. DESIDOC JOURNAL OF LIBRARY & INFORMATION TECHNOLOGY, 2021, 41 (03): : 167 - 174
  • [4] Analysis of Vulnerabilities in College Web-Based System
    Nam, Younsu
    Choi, Sunoh
    [J]. ELECTRONICS, 2024, 13 (12)
  • [5] Web-based virtual reality
    Ottosson, Stig
    Holmdahl, Lars
    [J]. JOURNAL OF ENGINEERING DESIGN, 2007, 18 (02) : 103 - 111
  • [6] Characterizing Organizational Use of Web-Based Services: Methodology, Challenges, Observations, and Insights
    Gill, Phillipa
    Arlitt, Martin
    Carlsson, Niklas
    Mahanti, Anirban
    Williamson, Carey
    [J]. ACM TRANSACTIONS ON THE WEB, 2011, 5 (04)
  • [7] Build an IP design-reuse infrastructure with Web-based tools, services
    Tuck, B
    [J]. COMPUTER DESIGN, 1998, 37 (07): : 98 - 99
  • [8] Infrastructure for Web-based application integration
    Gawlick, D
    [J]. 17TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, PROCEEDINGS, 2001, : 473 - 476
  • [9] WEB-BASED SEARCH SERVICES
    不详
    [J]. ONLINE & CDROM REVIEW, 1995, 19 (04): : 223 - 227
  • [10] WEB-based enhanced services
    Rheinart, C
    [J]. INTELLIGENT NETWORKS AND INTELLIGENCE IN NETWORKS, 1997, : 301 - 312