Openly accessible

Crime toolkits : the current threats to web applications

Alazab, Ammar, Abawajy, Jemal, Hobbs, Michael and Khraisat, Ansam 2013, Crime toolkits : the current threats to web applications, Journal of information privacy & security, vol. 9, no. 2, pp. 21-39.

Attached Files
Name Description MIMEType Size Downloads
alazab-crimetoolkitsthe-2013.pdf Published version application/pdf 1.08MB 2

Title Crime toolkits : the current threats to web applications
Author(s) Alazab, Ammar
Abawajy, Jemal
Hobbs, Michael
Khraisat, Ansam
Journal name Journal of information privacy & security
Volume number 9
Issue number 2
Start page 21
End page 39
Total pages 19
Publisher Ivy League Publishing
Place of publication Marietta, Ga.
Publication date 2013
ISSN 1553-6548
Keyword(s) cybercrime
attack
Zeus
crime toolkits
intrusion dectection system
Summary Increasingly, web applications are being developed over the Internet. Securing these web applications is becoming important as they hold critical security features. However, cybercriminals are becoming smarter by developing a crime toolkit, and employing sophisticated techniques to evade detection. These crime toolkits can be used by any person to target Internet users. In this paper, we explore the techniques used in crime toolkits. We present a current state-of-the-art analysis of crime toolkits and focus on attacks against web applications. The crime toolkit techniques are compared with the vulnerability of web applications to help reveal particular behaviour such as popular web application vulnerabilities that malicious writers prefer. In addition, we outline the existing protection mechanism, and observe that the possibility for damage is rising, particularly as specialization and scale increase in cybercrime.
Language eng
Field of Research 080501 Distributed and Grid Systems
Socio Economic Objective 890103 Mobile Data Networks and Services
HERDC Research category C2 Other contribution to refereed journal
Copyright notice ©2013, Ivy League Publishing
Persistent URL http://hdl.handle.net/10536/DRO/DU:30057718

Document type: Journal Article
Collections: School of Information Technology
Open Access Collection
Connect to link resolver
 
Link to Related Work
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.

Versions
Version Filter Type
Access Statistics: 12 Abstract Views, 2 File Downloads  -  Detailed Statistics
Created: Tue, 12 Nov 2013, 14:11:12 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.