Avoiding Vulnerabilities and Attacks with a Proactive Strategy for Web Applications

Shahzad Ashraf
{"title":"Avoiding Vulnerabilities and Attacks with a Proactive Strategy for Web Applications","authors":"Shahzad Ashraf","doi":"10.32474/arme.2021.03.000157","DOIUrl":null,"url":null,"abstract":"As the number of users interacting with dark websites grows, it opens the door for vulnerable and malevolent actors, making web traffic unsafe and risky. To prevent such vulnerabilities and maleficent activities on dark websites the proactive strategic measures have been taken into account and the relevant hidden causes are explored that helps to overcome the security risks during various web operations. In the first step, from the dark web corpus, the web addresses have been analyzed to check the status of whether these web addresses are available or not. To prevent the web addresses mining challenges a script was designed to mines irrelevant web address URL by visiting multiple search engines based on user input. In the 2nd step, another script was designed to check those domains having chances of becoming inactive because for security reasons such as onion sites. In 3rd step, various gape has been identified in dark web hosting using crawls that create the new links from configuration files. In the 4th step, using manual and automated testing the maleficent activities were identified in web traffic. Further proceeding to the 5th step, the web address lifespan was determined which quantifies the duration between the first and last occurrences of a web address. Finally, using Fisher’s Exact Test (FET), two comparative scenarios have been developed by considering the similar attributes and the role of operating system interaction with surface and dark websites. In the first scenario for identifying the similar attributes of surface and dark websites, the role of maleficent and spammer has been investigated and found that overall, 86 and 800% of attributes of surface and dark websites are identical. Similarly, for 2nd scenario identifying how long the operating systems have interacted with surface and dark websites, it was found that windows, Linux, and android based operating systems have an incredible role and made the contents much pusillanimous which creates high chances of information leakage. In the end, up to 40 days of user interaction to surface and dark web has been analyzed and found various aggravated statistics regarding vulnerabilities involvement in network traffic such as maleficent, spammer and the information leakage. At the same time, the interaction period of operating systems with surface and dark websites such as windows, Linux, and Android is also statistically investigated. While gathering the aforementioned investigation it is observed that most of the websites use CMS, such as WordPress, Joomla, Drupal, and various forums, and are outdated with either no patching or having vulnerabilities. Since either, they hosted with old versions of the software or were not updated with the latest patches, most URLs in the dark web are vulnerable to attacks. After this study, clear and up-to-date statistics are unveiled regarding dark websites, and it is recommended that to get rid of vulnerabilities the obtained statistics can be considered before developing new applications","PeriodicalId":203129,"journal":{"name":"Advances in Robotics & Mechanical Engineering","volume":"42 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Advances in Robotics & Mechanical Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.32474/arme.2021.03.000157","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

As the number of users interacting with dark websites grows, it opens the door for vulnerable and malevolent actors, making web traffic unsafe and risky. To prevent such vulnerabilities and maleficent activities on dark websites the proactive strategic measures have been taken into account and the relevant hidden causes are explored that helps to overcome the security risks during various web operations. In the first step, from the dark web corpus, the web addresses have been analyzed to check the status of whether these web addresses are available or not. To prevent the web addresses mining challenges a script was designed to mines irrelevant web address URL by visiting multiple search engines based on user input. In the 2nd step, another script was designed to check those domains having chances of becoming inactive because for security reasons such as onion sites. In 3rd step, various gape has been identified in dark web hosting using crawls that create the new links from configuration files. In the 4th step, using manual and automated testing the maleficent activities were identified in web traffic. Further proceeding to the 5th step, the web address lifespan was determined which quantifies the duration between the first and last occurrences of a web address. Finally, using Fisher’s Exact Test (FET), two comparative scenarios have been developed by considering the similar attributes and the role of operating system interaction with surface and dark websites. In the first scenario for identifying the similar attributes of surface and dark websites, the role of maleficent and spammer has been investigated and found that overall, 86 and 800% of attributes of surface and dark websites are identical. Similarly, for 2nd scenario identifying how long the operating systems have interacted with surface and dark websites, it was found that windows, Linux, and android based operating systems have an incredible role and made the contents much pusillanimous which creates high chances of information leakage. In the end, up to 40 days of user interaction to surface and dark web has been analyzed and found various aggravated statistics regarding vulnerabilities involvement in network traffic such as maleficent, spammer and the information leakage. At the same time, the interaction period of operating systems with surface and dark websites such as windows, Linux, and Android is also statistically investigated. While gathering the aforementioned investigation it is observed that most of the websites use CMS, such as WordPress, Joomla, Drupal, and various forums, and are outdated with either no patching or having vulnerabilities. Since either, they hosted with old versions of the software or were not updated with the latest patches, most URLs in the dark web are vulnerable to attacks. After this study, clear and up-to-date statistics are unveiled regarding dark websites, and it is recommended that to get rid of vulnerabilities the obtained statistics can be considered before developing new applications
使用主动策略避免Web应用程序的漏洞和攻击
随着与黑暗网站互动的用户数量的增长,它为易受攻击和恶意行为者打开了大门,使网络流量变得不安全和有风险。为防止这些漏洞和恶意活动在暗网站出现,我们采取了积极主动的策略措施,并探讨了相关的隐藏原因,以帮助克服各种网络运作中的安全风险。第一步,从暗网语料库中对网址进行分析,检查这些网址是否可用。为了防止网址挖掘挑战,设计了一个脚本,通过访问基于用户输入的多个搜索引擎来挖掘不相关的网址URL。在第二步中,设计了另一个脚本来检查那些由于安全原因(如洋葱网站)而有可能变得不活跃的域。在第三步中,使用从配置文件中创建新链接的爬虫,在暗网托管中识别出各种缺口。在第4步中,使用手动和自动测试在web流量中识别出恶意活动。进一步进行到第五步,确定了web地址寿命,它量化了web地址第一次和最后一次出现之间的持续时间。最后,使用Fisher精确测试(FET),通过考虑操作系统与表面和暗网站交互的相似属性和作用,开发了两个比较场景。在识别表层网站和暗网站相似属性的第一个场景中,我们调查了maleficent和spammer的作用,发现总体上表层网站和暗网站的属性有86%和800%是相同的。同样,对于第二个场景,识别操作系统与表面和暗网站交互的时间,我们发现基于windows、Linux和android的操作系统的作用非常大,使得内容非常脆弱,信息泄露的可能性很高。最后,我们分析了长达40天的用户与地表网和暗网的交互,发现了恶意攻击、垃圾邮件、信息泄露等涉及网络流量的漏洞的各种加重统计数据。同时,对windows、Linux、Android等操作系统与表层网站和暗表层网站的交互周期进行了统计调查。在收集上述调查时,可以观察到大多数网站使用CMS,例如WordPress, Joomla, Drupal和各种论坛,并且已经过时,没有补丁或存在漏洞。由于它们要么使用旧版本的软件,要么没有更新最新的补丁,因此暗网中的大多数url都容易受到攻击。通过本次研究,我们获得了关于暗网站的清晰且最新的统计数据,建议在开发新的应用程序之前,可以考虑获得的统计数据以消除漏洞
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信