{"id":"https://openalex.org/W2888931477","doi":"https://doi.org/10.1145/3231053.3231116","title":"A comprehensive study of cyber attacks &amp; counter measures for web systems","display_name":"A comprehensive study of cyber attacks &amp; counter measures for web systems","publication_year":2018,"publication_date":"2018-06-26","ids":{"openalex":"https://openalex.org/W2888931477","doi":"https://doi.org/10.1145/3231053.3231116","mag":"2888931477"},"language":"en","primary_location":{"id":"doi:10.1145/3231053.3231116","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3231053.3231116","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd International Conference on Future Networks and Distributed Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5059900651","display_name":"Abid Jamil","orcid":null},"institutions":[{"id":"https://openalex.org/I4210147796","display_name":"University of Faisalabad","ror":"https://ror.org/04eps4h65","country_code":"PK","type":"education","lineage":["https://openalex.org/I4210147796"]}],"countries":["PK"],"is_corresponding":true,"raw_author_name":"Abid Jamil","raw_affiliation_strings":["Chiniot Faisalabad Campus, Pakistan"],"affiliations":[{"raw_affiliation_string":"Chiniot Faisalabad Campus, Pakistan","institution_ids":["https://openalex.org/I4210147796"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009672277","display_name":"Kashif Asif","orcid":null},"institutions":[{"id":"https://openalex.org/I152236710","display_name":"Foundation University Islamabad","ror":"https://ror.org/0130a6s10","country_code":"PK","type":"education","lineage":["https://openalex.org/I152236710"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Kashif Asif","raw_affiliation_strings":["Foundation University Islamabad, Pakistan"],"affiliations":[{"raw_affiliation_string":"Foundation University Islamabad, Pakistan","institution_ids":["https://openalex.org/I152236710"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082741707","display_name":"Rehan Ashraf","orcid":"https://orcid.org/0000-0003-0893-4791"},"institutions":[{"id":"https://openalex.org/I505182","display_name":"National Textile University","ror":"https://ror.org/030dak672","country_code":"PK","type":"education","lineage":["https://openalex.org/I505182"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Rehan Ashraf","raw_affiliation_strings":["National Textile University, Faisalabad, Pakistan"],"affiliations":[{"raw_affiliation_string":"National Textile University, Faisalabad, Pakistan","institution_ids":["https://openalex.org/I505182"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027695151","display_name":"Sheraz Mehmood","orcid":null},"institutions":[{"id":"https://openalex.org/I505182","display_name":"National Textile University","ror":"https://ror.org/030dak672","country_code":"PK","type":"education","lineage":["https://openalex.org/I505182"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Sheraz Mehmood","raw_affiliation_strings":["National Textile University, Faisalabad, Pakistan"],"affiliations":[{"raw_affiliation_string":"National Textile University, Faisalabad, Pakistan","institution_ids":["https://openalex.org/I505182"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024801876","display_name":"Ghulam Mustafa","orcid":"https://orcid.org/0000-0001-5521-9921"},"institutions":[{"id":"https://openalex.org/I505182","display_name":"National Textile University","ror":"https://ror.org/030dak672","country_code":"PK","type":"education","lineage":["https://openalex.org/I505182"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Ghulam Mustafa","raw_affiliation_strings":["National textile University, Faisalabad, Pakistan"],"affiliations":[{"raw_affiliation_string":"National textile University, Faisalabad, Pakistan","institution_ids":["https://openalex.org/I505182"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5059900651"],"corresponding_institution_ids":["https://openalex.org/I4210147796"],"apc_list":null,"apc_paid":null,"fwci":0.8257,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.73373997,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"5","issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.918581485748291},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.8261348009109497},{"id":"https://openalex.org/keywords/countermeasure","display_name":"Countermeasure","score":0.6976780891418457},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6890112161636353},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.5443326234817505},{"id":"https://openalex.org/keywords/web-application-security","display_name":"Web application security","score":0.5047451257705688},{"id":"https://openalex.org/keywords/web-server","display_name":"Web server","score":0.4598456621170044},{"id":"https://openalex.org/keywords/doors","display_name":"Doors","score":0.4484019875526428},{"id":"https://openalex.org/keywords/security-bug","display_name":"Security bug","score":0.42885416746139526},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.3935343325138092},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3590528964996338},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.31922125816345215},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2904106378555298},{"id":"https://openalex.org/keywords/web-development","display_name":"Web development","score":0.17363539338111877},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1666257083415985},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.14046180248260498},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09008532762527466},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.08382225036621094}],"concepts":[{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.918581485748291},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.8261348009109497},{"id":"https://openalex.org/C21593369","wikidata":"https://www.wikidata.org/wiki/Q1032176","display_name":"Countermeasure","level":2,"score":0.6976780891418457},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6890112161636353},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.5443326234817505},{"id":"https://openalex.org/C59241245","wikidata":"https://www.wikidata.org/wiki/Q4781497","display_name":"Web application security","level":4,"score":0.5047451257705688},{"id":"https://openalex.org/C11392498","wikidata":"https://www.wikidata.org/wiki/Q11288","display_name":"Web server","level":3,"score":0.4598456621170044},{"id":"https://openalex.org/C125209513","wikidata":"https://www.wikidata.org/wiki/Q4037520","display_name":"Doors","level":2,"score":0.4484019875526428},{"id":"https://openalex.org/C131275738","wikidata":"https://www.wikidata.org/wiki/Q7445023","display_name":"Security bug","level":5,"score":0.42885416746139526},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3935343325138092},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3590528964996338},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.31922125816345215},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2904106378555298},{"id":"https://openalex.org/C79373723","wikidata":"https://www.wikidata.org/wiki/Q386275","display_name":"Web development","level":3,"score":0.17363539338111877},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1666257083415985},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.14046180248260498},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09008532762527466},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.08382225036621094},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3231053.3231116","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3231053.3231116","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd International Conference on Future Networks and Distributed Systems","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7599999904632568}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1564285798","https://openalex.org/W1612741463","https://openalex.org/W2015627570","https://openalex.org/W2163647753","https://openalex.org/W2184720590","https://openalex.org/W2529831505","https://openalex.org/W2536921356","https://openalex.org/W2557860121","https://openalex.org/W2558367095","https://openalex.org/W2586823173","https://openalex.org/W2608393213","https://openalex.org/W2611202431","https://openalex.org/W2621647126","https://openalex.org/W2622824343","https://openalex.org/W2693391168","https://openalex.org/W2804714321","https://openalex.org/W2963961461","https://openalex.org/W3104854141","https://openalex.org/W6710725306"],"related_works":["https://openalex.org/W4233761355","https://openalex.org/W2794659749","https://openalex.org/W4385770215","https://openalex.org/W1527427713","https://openalex.org/W2094754363","https://openalex.org/W2378014086","https://openalex.org/W2378312056","https://openalex.org/W2181766705","https://openalex.org/W2884320726","https://openalex.org/W2265061089"],"abstract_inverted_index":{"Technology":[0],"is":[1,6,14,21],"growing":[2],"rapidly":[3],"and":[4,34,45,115,129],"data":[5],"being":[7],"stored":[8],"on":[9,16],"online":[10,38],"servers.":[11],"As":[12],"technology":[13],"evolving,":[15],"the":[17,147],"other":[18],"side":[19],"it":[20],"opening":[22],"doors":[23],"for":[24],"cyber":[25],"crimes.":[26],"Attackers":[27],"are":[28,59],"continually":[29],"developing":[30],"new":[31],"methods,":[32],"tools":[33],"techniques":[35,63,72],"to":[36,50,52,55,110,117,125,130,145],"deface":[37],"systems.":[39,151],"A":[40],"website":[41],"with":[42],"compromised":[43],"security":[44,143,148],"Vulnerabilities":[46],"can":[47,73,84],"give":[48],"opportunities":[49],"hackers":[51],"get":[53],"access":[54],"your":[56],"network.":[57],"There":[58],"a":[60,103],"lot":[61],"of":[62,69,106,149],"that":[64],"doesn't":[65],"required":[66],"prior":[67],"knowledge":[68,78],"hacking.":[70],"These":[71,82],"be":[74,85,136],"applied":[75],"using":[76],"little":[77],"about":[79],"these":[80,127],"attack.":[81],"attacks":[83],"performed":[86],"by":[87,138],"any":[88],"user":[89],"if":[90],"there":[91],"exits":[92],"some":[93],"vulnerable":[94],"code":[95],"in":[96],"website.":[97],"In":[98],"this":[99],"paper,":[100],"we":[101],"presented":[102],"different":[104,123],"type":[105],"cyber-attacks,":[107],"loopholes":[108],"due":[109],"which":[111],"hacking":[112,119],"become":[113],"possible":[114],"countermeasures":[116],"prevent":[118],"attacks.":[120],"We":[121],"perform":[122],"experiments":[124],"detect":[126],"attacks,":[128],"test":[131],"countermeasures.":[132],"This":[133],"countermeasure":[134],"should":[135],"used":[137],"developers,":[139],"Penetration":[140],"Testers":[141],"&":[142],"experts":[144],"ensure":[146],"web":[150]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
