2024
DOI: 10.1109/access.2024.3350444
|View full text |Cite
|
Sign up to set email alerts
|

Unveiling Vulnerabilities of Web Attacks Considering Man in the Middle Attack and Session Hijacking

Muteeb Bin Muzammil,
Muhammad Bilal,
Sahar Ajmal
et al.

Abstract: The current era extensively utilizes the Internet, which uses data. Due to the apparent openaccess Internet service, this data is highly vulnerable to attacks. Data privacy is affected by Web-based attacks. This Systematic Literature Review (SLR) focuses on two Web-based attacks: Man-In-The-Middle and session hijacking. It reviews about 30 studies from the years 2016-2023 that have been selected utilizing a proper study selection procedure. This SLR comprises three research questions. The first describes the o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 52 publications
0
0
0
Order By: Relevance
“…Man in the Middle (MITM): A hacker compromises, stymies, or impersonates two systems' communications. An industrial robot may be blown out of its designated lane and speed restriction by an attacker taking control of a smart actuator, which might harm a meeting place or hurt operators [35]. 10.…”
mentioning
confidence: 99%
“…Man in the Middle (MITM): A hacker compromises, stymies, or impersonates two systems' communications. An industrial robot may be blown out of its designated lane and speed restriction by an attacker taking control of a smart actuator, which might harm a meeting place or hurt operators [35]. 10.…”
mentioning
confidence: 99%