{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T08:21:33Z","timestamp":1769329293457,"version":"3.49.0"},"reference-count":18,"publisher":"Breda Publishing Press","issue":"5","license":[{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Network Security"],"published-print":{"date-parts":[[2019,5]]},"abstract":"<jats:p> According to Internet Live Stat, the total number of online websites has already soared over 1.9 billion and is steadily increasing. <jats:sup>1<\/jats:sup> The most popular content management systems (CMS) installed on such websites are PHP-based frameworks such as Wordpress and Joomla, which account for (as of December 2018) 59% and 6% of market share. <jats:sup>2,3<\/jats:sup> A large number of those websites belong to small companies and individuals that may have few motivations to pay thousands of dollars for security maintenance services. Also, due to development costs, the owners \u2013 even the developers they hire \u2013 may prefer an off-the-shelf CMS such as Joomla to accelerate deployment. <\/jats:p><jats:p> A large proportion of the nearly two billion websites now on the Internet are run by individuals and organisations without the skills or resources to make them secure. <\/jats:p><jats:p> These sites are targets for cyber criminals looking to exploit weaknesses to \u2018monetise\u2019 them. Van-Linh Nguyen, Po-Ching Lin and Ren-Hung Hwang of the National Chung Cheng University, Taiwan, examine the tactics employed by criminals and present a framework for preventing such attacks, while acknowledging that this is a battle that is likely to continue. <\/jats:p>","DOI":"10.1016\/s1353-4858(19)30061-3","type":"journal-article","created":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T20:48:50Z","timestamp":1558558130000},"page":"11-19","source":"Crossref","is-referenced-by-count":7,"title":["Web attacks: defeating monetisation attempts"],"prefix":"10.70985","volume":"2019","author":[{"given":"Van-Linh","family":"Nguyen","sequence":"first","affiliation":[{"name":"National Chung Cheng University, Taiwan"}]},{"given":"Po-Ching","family":"Lin","sequence":"additional","affiliation":[{"name":"National Chung Cheng University, Taiwan"}]},{"given":"Ren-Hung","family":"Hwang","sequence":"additional","affiliation":[{"name":"National Chung Cheng University, Taiwan"}]}],"member":"51855","reference":[{"key":"bib1","unstructured":"\u2018Total number of websites\u2019. Internet Live Stats;  www.Internetlivestats.com\/total-number-of-websites\/ accessed May 2019"},{"key":"bib2","unstructured":"\u2018Technologies Overview\u2019. W3techs;  https:\/\/w3techs.com\/technologies accessed May 2019"},{"key":"bib3","unstructured":"\u2018Web Technology Usage Trends\u2019. Built With;  https:\/\/trends.builtwith.com accessed May 2019"},{"key":"bib4","unstructured":"\u2018Protect web apps and services\u2019. Citrix;  www.citrix.com\/products\/citrix-web-app-firewall\/ accessed May 2019"},{"key":"bib5","unstructured":"ModSecurity, home page;  https:\/\/modsecurity.org accessed May 2019"},{"key":"bib6","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1515\/popets-2018-0025","volume":"3","author":"M\u00f6ser Malte","year":"2018","journal-title":"Proceedings on Privacy Enhancing Technologies"},{"key":"bib7","unstructured":"\u2018How does Google make its money: the 20 most expensive keywords in Google AdWords\u2019. WordStream; \nwww.wordstream.com\/articles\/most-expensive-keywords accessed May 2019"},{"key":"bib8","unstructured":"Exploit Database, home page; \nwww.exploit-db.com accessed May 2019"},{"key":"bib9","unstructured":"Joomla : Vulnerability Statistics'. CVE Details; \nwww.cvedetails.com\/vendor\/3496\/Joomla.html accessed May 2019"},{"key":"bib10","unstructured":"\u2018Wordpress : Vulnerability Statistics\u2019. CVE Details; \nwww.cvedetails.com\/product\/4096\/Wordpress-Wordpress.html accessed May 2019"},{"key":"bib11","unstructured":"\u2018WordPress Plugin WP Super Cache \u2013 PHP Remote Code Execution\u2019. Exploit Database; \nwww.exploit-db.com\/exploits\/38494 accessed May 2019"},{"key":"bib12","unstructured":"Nulled Scripts, home page; \nwww.nulled-scripts.xyz accessed May 2019"},{"key":"bib13","unstructured":"Google Safe Browsing, home page; \nhttps:\/\/safebrowsing.google.com accessed May 2019"},{"key":"bib14","unstructured":"PhishTank, home page; \nwww.phishtank.com accessed May 2019"},{"key":"bib15","unstructured":"\u2018PayPal Phishing using JavaScript redirect\u2019; My Online Security; 23 Sep 2017: \nhttps:\/\/myonlinesecurity.co.uk\/paypal-phishing-using-javascript-redirect\/ accessed May 2019"},{"key":"bib16","unstructured":"Google Webmaster Tools console (requires account). Google; \nwww.google.com\/webmasters\/tools\/sitemap-list?pli=1 accessed May 2019"},{"key":"bib17","unstructured":"\u2018Webattack\u2019. Via BitBucket; \nhttps:\/\/bitbucket.org\/johnnguyenccu\/webattack\/src accessed May 2019"},{"key":"bib18","unstructured":"\u2018GeoIP2 Country Database\u2019. MaxMind; \nwww.maxmind.com\/en\/geoip2-country-database accessed May 2019"}],"container-title":["Network Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1353485819300613?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1353485819300613?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/www.magonlinelibrary.com\/doi\/pdf\/10.1016\/S1353-4858%2819%2930061-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,3]],"date-time":"2024-12-03T22:18:54Z","timestamp":1733264334000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.magonlinelibrary.com\/doi\/10.1016\/S1353-4858%2819%2930061-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5]]},"references-count":18,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2019,5]]}},"alternative-id":["10.1016\/S1353-4858(19)30061-3"],"URL":"https:\/\/doi.org\/10.1016\/s1353-4858(19)30061-3","relation":{},"ISSN":["1353-4858","1872-9371"],"issn-type":[{"value":"1353-4858","type":"print"},{"value":"1872-9371","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,5]]}}}