Zaigham Riaz’s scientific contributions

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (1)


Figure 1 Heatmap show in Bytes in with Column Chart
Figure 10 src i p country code vs bytes out
Figure 11 Web Traffic Analysis Over Time
Shadow Watch: Unveiling and Mitigating Suspicious Web Threat Interactions
  • Article
  • Full-text available

March 2025

·

31 Reads

Talib Nadeem Usmani

·

Zaigham Riaz

·

·

The security of the Web is a significant issue for personal, corporate, and state users in the context of digitalisation. With all kinds of activities related to the Internet growing, different types of threats also emerge, including phishing, malware, ransomware, and others which threaten personal information, funds, and critical system structures. The present paper discusses the principal threats that are inherent in the web environment, the effects of these threats, and protection means. Phishing is a common kind of social engineering that aims at making the target release relevant information. Viruses and worms, in their broad sense, include Malware, which sneaks into systems to corrupt, steal or delete important information. Ransomware is a virus that encrypts a victim"s files and asks for payment for the decryption key. At the same time, drive-by downloads are another virus that installs themselves on a victim"s computer from compromised websites without the victim knowing. With spoofing and man-in-the-middle attacks, data integrity is not preserved. At the same time, SQL injection and cross-site scripting are aimed at controlling web applications in order to control databases. Ddos-attack or Distributed Denial of Service attacks on services knock them off balance by flooding them with traffic. Minimising risks entails keeping oneself posted on the latest developments, updating the software, locking passwords in the cyber world, using a two-factor identification key, and making sure that different strains of technology have backup copies of the materials that have been tampered with. Adhering to security practices and being alert to new threats is vital for an organisation to have a safe online existence. Hence, this study emphasises the need to adopt appropriate measures for evaluating web threats in order to have safe interactions.

Download