Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Article type: Review Article
Authors: Chughtai, Muhammad Saada | Bibi, Irfanab | Karim, Shahidc; d; * | Shah, Syed Wajid Alie | Laghari, Asif Alif | Khan, Abdullah Ayubf
Affiliations: [a] Department of Computer Science, Barani Institute of Management Sciences, Rawalpindi, Pakistan | [b] Department of Computer Science, Faculty of Computing and Information Technology, University of the Punjab, Lahore, Pakistan | [c] Faculty of Science and Technology, ILMA University, Karachi, Pakistan | [d] Research & Development Institute of Northwestern Polytechnical University in Shenzhen, Shenzhen 518057, China | [e] Centre for Cyber Security Research and Innovation (CSRI), Deakin University, Geelong, VIC 3220, Australia | [f] Department of Computer Science, Sindh Madressatul Islam University, Karachi, Pakistan
Correspondence: [*] Corresponding author. E-mail: [email protected].
Abstract: Web applications play a vital role in modern digital world. Their pervasiveness is mainly underpinned by numerous technological advances that can often lead to misconfigurations, thereby opening a way for a variety of attack vectors. The rapid development of E-commerce, big data, cloud computing and other technologies, further enterprise services are entering to the internet world and have increasingly become the key targets of network attacks. Therefore, the appropriate remedies are essential to maintain the very fabric of security in digital world. This paper aims to identify such vulnerabilities that need to be addressed for ensuring the web security. We identify and compare the static, dynamic, and hybrid tools that can counter the prevalent attacks perpetrated through the identified vulnerabilities. Additionally, we also review the applications of AI in intrusion detection and pinpoint the research gaps. Finally, we cross-compare the various security models and highlight the relevant future research directions.
Keywords: Web security, vulnerabilities, E-commerce, cyber-attacks, deep learning
DOI: 10.3233/JHS-230037
Journal: Journal of High Speed Networks, vol. 30, no. 1, pp. 115-146, 2024
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]