WASM - A Metric for Securing a Web Application

被引:0
|
作者
Kumar, Rakesh [1 ]
Kaur, Gurvinder [2 ]
机构
[1] Kurukshetra Univ, Dept Comp Sci & Applicat, Kurukshetra 132119, Haryana, India
[2] Guru Nanak Khalsa Inst Technol & Management Studi, Yamunanagar, Haryana, India
关键词
Client; Network; Server; Web Security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet is a medium to connect millions of computers which share and access information all over the world. With the evolution of the web and its increased use in every aspect of life, the need for web security has become imperative. As websites opt for commercial viability, the threat of hackers, viruses, or annoyance attacks becomes more pronounced. Organizations face several security-related challenges. If organizational information is hacked either through the network or through other means, it could incur a heavy cost to the company. A failure in network security could also cost the organization in terms of its goodwill and reputation. This paper identified common threats on the web and classified these threats into various categories, such as accidental, malicious, authorization, application, privacy, and access control threats. This also highlights the three main areas in which web can be secured ie. client side threats, server side threats and network side threats. This paper discusses the primary goals and objectives of security contained within the CIA Triad: Confidentiality, Integrity and Availability. Different types of attackers which are responsible for security of web are also depicted. This paper shows different attacks related to client side, server side and network side threats. Client-side Security threats are classified into: Cross Site Scripting, Cross Site Request Forgery, Broken Authentication and Session Management, Security Misconfiguration and Failure to Restrict URL Access. Server-side Security consists of Structured Query Language (SQL) Injection, Malicious File Execution, Insecure Direct Object Reference, Insecure Cryptographic Storage and Unvalidated Redirects and Forwards. The network threats highlighted are Denial of Service (DoS), Insufficient Transport Layer Protection, Eavesdropping, Data Modification, IP Address Spoofing, Sniffer attacks, Man-in-the-Middle Attack, Phishing, Brute force attack and TCP Session Hijacking. The paper shows the causes of each of the attacks and the web application metrics which were earlier defined are also highlighted. A metric named Web Application Security Metric (WASM) is proposed in this regard to make the web page secure. This metric calculates the sum of the weight of the categories like: Input validation, Authentication, Authorization, Configuration management, Sensitive data, Session management, Cryptography, Parameter manipulation, Exception management and Auditing and logging.
引用
收藏
页码:19 / 29
页数:11
相关论文
共 50 条
  • [1] Securing Web Application by Embedded Firewall
    Kazanavicius, E.
    Kazanavicius, V.
    Venckauskas, A.
    Paskevicius, R.
    ELEKTRONIKA IR ELEKTROTECHNIKA, 2012, 119 (03) : 65 - 68
  • [2] A Survey on Deception Techniques for Securing Web Application
    Efendi, Mohd A., I
    Ibrahim, Z.
    Zawawi, Ahmad M. N.
    Rahim, Abdul F.
    Pahri, Mohamad N. A.
    Ismail, A.
    2019 IEEE 5TH INTL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY) / IEEE INTL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC) / IEEE INTL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2019, : 328 - 331
  • [3] SECURING INFORMATION RESOURCES USING WEB APPLICATION FIREWALLS
    Baranov, Petr A.
    Beybutov, Eldar R.
    BIZNES INFORMATIKA-BUSINESS INFORMATICS, 2015, 34 (04): : 71 - 78
  • [4] Securing the web
    Baker, Steven
    1997, (15):
  • [5] A design and implementation of profile based web application securing proxy
    Yun, Youngtae
    Park, Sangseo
    Kim, Yosik
    Ryou, Jaecheol
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2006, 3903 : 248 - 259
  • [6] Securing Web communications
    Rabinovitch, E
    IEEE COMMUNICATIONS MAGAZINE, 2000, 38 (05) : 17 - 18
  • [7] Securing Web scripting
    Anupam, V
    Mayer, A
    IEEE INTERNET COMPUTING, 1998, 2 (06) : 46 - 55
  • [8] Securing the Tangled Web
    Kern, Christoph
    COMMUNICATIONS OF THE ACM, 2014, 57 (09) : 38 - 47
  • [9] Securing Web services
    Hondo, M
    Nagaratnam, N
    Nadalin, A
    IBM SYSTEMS JOURNAL, 2002, 41 (02) : 228 - 241
  • [10] Securing web application system: A solution based on SMS for identifying users
    Liu, SY
    Liu, ZY
    Su, ZR
    Proceedings of the 11th Joint International Computer Conference, 2005, : 104 - 109