The Reality of Internet Infrastructure and Services Defacement: A Second Look at Characterizing Web-Based Vulnerabilities
In recent years, the number of people using the Internet has increased worldwide, and the use of web applications in many areas of daily life, such as education, healthcare, finance, and entertainment, has also increased. On the other hand, there has been an increase in the number of web application...
Main Authors: | Neaimh Albalawi, Norah Alamrani, Rasha Aloufi, Mariam Albalawi, Amer Aljaedi, Adel R. Alharbi |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2023-06-01
|
Series: | Electronics |
Subjects: | |
Online Access: | https://www.mdpi.com/2079-9292/12/12/2664 |
Similar Items
-
Website Defacement Detection and Monitoring Methods: A Review
by: Mariam Albalawi, et al.
Published: (2022-11-01) -
DNS Intrusion Detection (DID) — A SNORT-based solution to detect DNS Amplification and DNS Tunneling attacks
by: Sanjay Adiwal, et al.
Published: (2023-03-01) -
In-Depth Evaluation of the Impact of National-Level DNS Filtering on DNS Resolvers over Space and Time
by: Yanan Cheng, et al.
Published: (2022-04-01) -
Facement and Defacement in Sufi Narratives
by: Maryam RaminNia
Published: (2022-10-01) -
Benchmarking Authoritative DNS Servers
by: Gabor Lencse
Published: (2020-01-01)