A Meta-Analysis for Security Threats over the Web Ecosystem

被引:0
|
作者
Silva, Carlo [1 ]
Batista, Ricardo [1 ]
Queiroz, Ruy [1 ,2 ]
Garcia, Vinicius [1 ,2 ]
Silva, Jose
Gatti, Daniel
Nascimento, Leandro [3 ]
Brito, Kellyton [3 ]
Assad, Rodrigo [3 ]
机构
[1] Univ Fed Pernambuco, CIn, Recife, PE, Brazil
[2] PUC SP, TiDD, Sao Paulo, SP, Brazil
[3] Univ Fed Rural Pernambuco, DEINFO, Recife, PE, Brazil
关键词
Application Vulnerabilities; Browser Vulnerabilities; Social Engineering;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This article presents an analysis on the attacks related to the sensitive data breach in the Web ecosystem. The study is based on an Meta-Analysis which identified the significance of 21 years of relevant contributions to the subject. Considering the results we elaborate two contributions: (i) we group attacks according to their behavior and (ii) we reveal the most serious emerging attacks. Additionally, we present our critical sense in relation to an overall perspective on the results.
引用
收藏
页码:838 / 842
页数:5
相关论文
共 50 条
  • [1] Towards a Taxonomy for Security Threats on the Web Ecosystem
    Silva, Carlo
    Batista, Ricardo
    Queiroz, Ruy
    Garcia, Vinicius
    Silva, Jose
    Gatti, Daniel
    Assad, Rodrigo
    Nascimento, Leandro
    Brito, Kellyton
    Miranda, Pericles
    NOMS 2016 - 2016 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2016, : 584 - 590
  • [2] Web Application Security Threats and Protection Technical Analysis
    Wu, Ying
    Sheng, Yu
    PROCEEDINGS OF THE 2015 3D INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION AND COMMUNICATION TECHNOLOGY FOR EDUCATION, 2015, 11 : 418 - 421
  • [3] Threats analysis and prevention for Grid and Web service security
    Ni Jiancheng
    Li Zhishu
    Gao Zhonghe
    Sun Jirong
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 526 - +
  • [4] Meta-analysis of network information security and Web data mining techniques
    Wu, Dongling
    Shan, Shaolong
    PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON INFORMATION SCIENCES, MACHINERY, MATERIALS AND ENERGY (ICISMME 2015), 2015, 126 : 1974 - 1977
  • [5] Web Security: Emerging Threats and Defense
    Almutairi A.A.
    Mishra S.
    AlShehri M.
    Computer Systems Science and Engineering, 2021, 40 (03): : 1233 - 1248
  • [6] Web Security: Emerging Threats and Defense
    Almutairi, Abdulwahed Awad
    Mishra, Shailendra
    AlShehri, Mohammed
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 40 (03): : 1233 - 1248
  • [7] The ecohydrology of ecosystem transitions: a meta-analysis
    Viglizzo, Ernesto F.
    Nosetto, Marcelo D.
    Jobbagy, Esteban G.
    Florencia Ricard, M.
    Frank, Federico C.
    ECOHYDROLOGY, 2015, 8 (05) : 911 - 921
  • [8] Security Threats and Risk Analysis of an Iot Web Service for a Smart Vineyard
    Borrelli, Massimo
    Coric, Vanes
    Gnauer, Clemens
    Wolfgeher, Jennifer
    Tauber, Markus
    ERCIM NEWS, 2018, (113): : 42 - 43
  • [9] Web services and grid security vulnerabilities and threats analysis and model.
    Demchenko, Y
    Gommans, L
    de Laat, C
    Oudenaarde, B
    2005 6th International Workshop on Grid Computing (GRID), 2005, : 262 - 267
  • [10] Linking soil food web structure to above- and belowground ecosystem processes: a meta-analysis
    Sackett, Tara E.
    Classen, Aimee T.
    Sanders, Nathan J.
    OIKOS, 2010, 119 (12) : 1984 - 1992