Attacks on Newly Registered Content Management Websites – A ComparisonVolume 6, Issue 6 Published online: 28 February 2020
Article Views: 30
AbstractThis paper aims to study the case of hacker/intrusion activities on Content Management System (CMS) websites. CMSs are tools for creating and maintaining commercial-quality websites. Their popularity has increased, but so has their complexity and the number of third-party modules. These, however, increase the risk of vulnerabilities. The current study investigates the amount of incoming traffic that could be potentially malicious and where it originates. Additionally, we study if CMS’s based on different CMS software attract different kinds of traffic. Three virtual websites (running on the same computer) have been registered and launched to implement this study. Each site runs its own popular CMS software, but its content is identical (a weblog with a simple template). The sites run for six months on a platform of a commercial web hosting provider. This study is empirical in nature, and the analysis is based on logging every HTTP request that was sent to the sites. This was done using the logging capabilities of the web server software Apache. The sites were compared with each other, with an established website and an empty website. Our analysis shows that more than 90% of all traffic to the websites (both old and new) is potentially malicious. The results highlighted that a large majority of the intrusion attempts are very unsophisticated: they do not try to exploit any specific vulnerabilities of the underlying CMS. Therefore, keeping the CMS up-to-date and following CMS hardening practices is enough to repel these attacks. Reference
To Cite this articleM. Niinimaki, J. Lawrence, K. Chanyalikit and V. Pajula, & Attacks on newly registered content management websites – A comparison & International Journal of Technology and Engineering Studies, vol. 6, no. 1, pp.1–7, 2020. Doi: https://dx.doi.org/10.20469/ijtes.6.10001-1 |