Web Browser Vulnerabilities and Weakness Descriptive Analysis: Is it Chrome Keep Dominant?
DOI:
https://doi.org/10.14419/ijet.v7i4.44.26999Published:
2018-12-01Keywords:
Chrome, Vulnerability, Weakness, Attack, SecurityAbstract
Web Browser play the important mandatory role in accessing the application through the internet and may carry malicious content to the system hence threatening the system from the attacker. Google Chrome is one of popular browser since released on 2008 as one of product of Chromium Project at Google. Chrome is fourth ranking in Common Vulnerabilities Enumeration website and the first ranking among browser that have most of vulnerabilities reported. This paper describe a Descriptive analysis of weakness and vulnerabilities of Chrome browser. The analysis use comparison approach to other popular browser such as Safari and Firefox. The analysis also use main reference and database from mitre.org which have common weakness enumeration database and scoring system calculation for vulnerability. This work cover responsiveness rate among them regarding weakness and vulnerabilities update duration and severity rate. The validation has performed using Descriptive test regarding weakness and vulnerability behavior. According to Architectural, Development and Research Conceptual weakness reported, the browsers has not significantly indicate the difference except between Chrome and Firefox in research conceptual weakness. The severity of browser vulnerabilities shown by Firefox and the best responsiveness to update browser weakness shown by Chrome, followed by Safari. Using Descriptive analysis, Chrome will keep dominant against the other browser, while Firefox and Safari potentially become unpopular such as Internet Explorer for upcoming time.
References
[1] C. Reis, A. Barth, and C. Pizano, “Browser Security: Lessons from Google Chrome,†Queue, vol. 7, no. 5, p. 3, 2009.
[2] T. Meskauskas, “What Are The Most Secure Web Browsers In 2018?,†PCRisk, 2018. [Online]. Available: https://www.pcrisk.com/computer-technician-blog/windows/12350-most-secure-browsers-2018.
[3] P. Mell, K. Scarfone, and S. Romanosky, “A Complete Guide to the Common Vulnerability Scoring System Version 2.0,†FIRSTForum Incid. Response Secur. Teams, pp. 1–23, 2007.
[4] -, “Common Weakness Enumeration,†http://cwe.mitre.org/, 2018. [Online]. Available: http://cwe.mitre.org/.
[5] A. Barth, C. Jackson, and C. Reis, “The Security Architecture of the Chromium Browser,†Proc. WWW 2009, 2008.
[6] D. Smith, “The Yontoo Trojan: New Mac OS X Malware Infects Google Chrome, Firefox And Safari Browsers Via Adware,†International Business Time, 2013.
[7] D. Goodin, “MySQL.com breach leaves visitors exposed to malware,†The Register, 2011.
[8] -, “On Browser Security Updates, OS and Internet Use,†HoopsOnline, 2016.
[9] D. Szabo, FRAUD SMARTS - Fraud Prevention Handbook, 2017 Editi. eFraud Prevention, LLC, 2012.
[10] -, “Google Chrome Vulnerability Statistics,†CVE Details, 2018. [Online]. Available: https://www.cvedetails.com/product/15031/Google-Chrome.html?vendor_id=1224.
[11] P. S. Satish, “Web Browser Security : Different Attacks Detection and Prevention Techniques,†vol. 170, no. 9, pp. 35–41, 2017.
[12] HAL9000, “7 Chromium Based Browsers With Extra Features,†Raymond.cc, 2017. [Online]. Available: https://www.raymond.cc/blog/chromium-browser-alternatives-with-extra-features/. [Accessed: 14-Apr-2018].
[13] S. Anthony, “Opera admits defeat, switches to Google’s Chromium,†Extrme Tech, 2013. [Online]. Available: https://www.extremetech.com/computing/148312-opera-drops-presto-switch-to-google-and-apples-webkit-rendering-engine. [Accessed: 15-Jul-2018].
How to Cite
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution Licensethat allows others to share the work with an acknowledgement of the work''s authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal''s published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
Accepted 2019-02-02
Published 2018-12-01