Skip to main content

Web Security: A Survey of Latest Trends in Security Attacks

  • Conference paper
  • 3257 Accesses

Part of the Lecture Notes in Electrical Engineering book series (LNEE,volume 121)


Every system used in real time will be having some security threats. Internet has not been exception for it. From as early as 1980s there has been occurrence of several different types of security attacks with Internet being their major target. Internet happens to be main target due to type and amount of information it stores and advancements in computer networks which makes it very easy for accessing the same. Also, at the same time limitations/design flaws in Internet design, programming languages etc. make attack techniques to evolve from day to day. Due to such evolution of new attack mechanisms, at present, we have a big list of different attacks. Further, motivations for making such attacks range from just having fun to sabotaging critical & specific infrastructures at national level. Hence, in this context, it is very necessary and useful to know about latest trends in security attacks. In this connection this paper provides a brief survey of latest security attacks on web. This paper also provides a summarized comparison of discussed attacks against chosen important parameters. In addition, an observational data about attacks via Emails over a period of time is also presented. The paper concludes by mentioning the need of such surveys and research opportunities in this area.


  • Network
  • Security
  • Security Attacks
  • Web Security

This is a preview of subscription content, access via your institution.

Buying options

USD   29.95
Price excludes VAT (USA)
  • DOI: 10.1007/978-3-642-25541-0_52
  • Chapter length: 11 pages
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
USD   229.00
Price excludes VAT (USA)
  • ISBN: 978-3-642-25541-0
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD   299.99
Price excludes VAT (USA)
Hardcover Book
USD   349.99
Price excludes VAT (USA)


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. Boneh, D., Mitchell, J.: Controlhijacking (2009),

  2. Sotirov, A.: Heap Feng Shui in Javascript. Blackhat Europe (2007)

    Google Scholar 

  3. Daniel, M., Honoroff, J., Miller, C.: Engineering Heap Overflow Exploits with JavaScript. In: WooT 2008 (2008)

    Google Scholar 

  4. Ratanaworabhan, P., Livshits, B., Zorn, B.: Nozzle: A Defense Against Heap-spraying Code Injection Attacks

    Google Scholar 

  5. Blazakis, D.: Interpreter Exploitation: Pointer inference and JiT spraying

    Google Scholar 

  6. Boneh, D.: Unwanted Traffic:DoS/DDoS and Spam Email (2009),

  7. Shelton, T.: Rootkits: the basics (2006),

  8. Hoglund, G., Butler, J.: Rootkits: Subverting the Windows Kernel

    Google Scholar 

  9. Sandeep, S.: Process Tracing Using Ptrace, Part2,

  10. Sandeep, S.: Process Tracing Using Ptrace, Part 3,

  11. Bursztein, E.: Malware (2009),

  12. Romano, M., Rosignoli, S., Giannini, E.: Robot Wars – How Botnets Work. For hakin9

    Google Scholar 

  13. Real World Example: Stuxnet Worm (2010),



  16. Cyber Security Threats, The Lowy Institute for International Policy (September 8, 2010)

    Google Scholar 

  17. Paul, B., Yegneswaran, Raju, K.P.: An Inside Look at Botnets. In: Advances in Information Security. Springer, Heidelberg (2006)

    Google Scholar 





  22. Lobo, D., Wu, X.-W., Sun, L., Watters, P.: Windows Rootkits: Attacks and Countermeasures. In: 2010 Second Cybercrime and Trustworthy Computing Workshop (2010)

    Google Scholar 

  23. Feily, M., Shahrestani, A., Ramadass, S.: A Survey of Botnet and Botnet Detection. In: Third International Conference on Emerging Security Information, Systems and Technologies (2009)

    Google Scholar 

  24. Worm Targets Industrial-Plant Operations. IEEE Computer Society News Letter (November 2010)

    Google Scholar 

  25. An, Z., Liu, H.: Realization of Buffer Overflow. In: International Forum on Information Technology and Applications (2010)

    Google Scholar 

  26. Qiao, Z., Zhang, Y., Xie, C.: Research and Survey of Low-rate Denial of Service Attacks. In: 13th IEEE Conference on Advances in Communication Technology, ICACT, February 13-16 (2011)

    Google Scholar 

  27. Abu-Nimeh, S., Chen, T.M., Alzubi, O.: A Survey of Malicious and Spam Posts in Facebook. IEEE (2011), doi:10.1109/MC.2011.222

    Google Scholar 

Download references

Author information

Authors and Affiliations


Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kallapur, P.V., Geetha, V. (2011). Web Security: A Survey of Latest Trends in Security Attacks. In: Wu, Y. (eds) Advances in Computer, Communication, Control and Automation. Lecture Notes in Electrical Engineering, vol 121. Springer, Berlin, Heidelberg.

Download citation

  • DOI:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-25540-3

  • Online ISBN: 978-3-642-25541-0

  • eBook Packages: EngineeringEngineering (R0)