WASM - A Metric for Securing a Web Application

被引:0
|
作者
Kumar, Rakesh [1 ]
Kaur, Gurvinder [2 ]
机构
[1] Kurukshetra Univ, Dept Comp Sci & Applicat, Kurukshetra 132119, Haryana, India
[2] Guru Nanak Khalsa Inst Technol & Management Studi, Yamunanagar, Haryana, India
来源
JOURNAL OF RESEARCH AND PRACTICE IN INFORMATION TECHNOLOGY | 2014年 / 46卷 / 01期
关键词
Client; Network; Server; Web Security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet is a medium to connect millions of computers which share and access information all over the world. With the evolution of the web and its increased use in every aspect of life, the need for web security has become imperative. As websites opt for commercial viability, the threat of hackers, viruses, or annoyance attacks becomes more pronounced. Organizations face several security-related challenges. If organizational information is hacked either through the network or through other means, it could incur a heavy cost to the company. A failure in network security could also cost the organization in terms of its goodwill and reputation. This paper identified common threats on the web and classified these threats into various categories, such as accidental, malicious, authorization, application, privacy, and access control threats. This also highlights the three main areas in which web can be secured ie. client side threats, server side threats and network side threats. This paper discusses the primary goals and objectives of security contained within the CIA Triad: Confidentiality, Integrity and Availability. Different types of attackers which are responsible for security of web are also depicted. This paper shows different attacks related to client side, server side and network side threats. Client-side Security threats are classified into: Cross Site Scripting, Cross Site Request Forgery, Broken Authentication and Session Management, Security Misconfiguration and Failure to Restrict URL Access. Server-side Security consists of Structured Query Language (SQL) Injection, Malicious File Execution, Insecure Direct Object Reference, Insecure Cryptographic Storage and Unvalidated Redirects and Forwards. The network threats highlighted are Denial of Service (DoS), Insufficient Transport Layer Protection, Eavesdropping, Data Modification, IP Address Spoofing, Sniffer attacks, Man-in-the-Middle Attack, Phishing, Brute force attack and TCP Session Hijacking. The paper shows the causes of each of the attacks and the web application metrics which were earlier defined are also highlighted. A metric named Web Application Security Metric (WASM) is proposed in this regard to make the web page secure. This metric calculates the sum of the weight of the categories like: Input validation, Authentication, Authorization, Configuration management, Sensitive data, Session management, Cryptography, Parameter manipulation, Exception management and Auditing and logging.
引用
收藏
页码:19 / 29
页数:11
相关论文
共 50 条
  • [21] Enhancements to securing XML Web Services
    Heinz, E
    Dogdu, E
    IC'04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTERNET COMPUTING, VOLS 1 AND 2, 2004, : 808 - 814
  • [22] Building a semantic Web for securing the homeland
    Guzman, NJ
    IEEE ENGINEERING IN MEDICINE AND BIOLOGY MAGAZINE, 2004, 23 (01): : 71 - 80
  • [23] Securing the wireless World Wide Web
    Cravotta, N
    EDN, 2000, 45 (17) : 89 - +
  • [24] CamAuth: Securing Web Authentication with Camera
    Xie, Mengjun
    Li, Yanyan
    Yoshigoe, Kenji
    Seker, Remzi
    Bian, Jiang
    2015 IEEE 16TH INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING (HASE), 2015, : 232 - 239
  • [25] Securing Timeout Instructions in Web Applications
    Russo, Alejandro
    Sabelfeld, Andrei
    PROCEEDINGS OF THE 22ND IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM, 2009, : 92 - 106
  • [26] Securing web-based exams
    Sessink, O
    Beeftink, R
    Tramper, J
    Hartog, R
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2004, 10 (02) : 145 - 157
  • [27] Securing the HealthHeritage web, a family health history web site
    Barrett, JR
    Woolfolk, WD
    Wagner, DP
    Wenzel, AJ
    Knaus, WA
    JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION, 2000, : 961 - 961
  • [28] Securing Health Sensing Using Integrated Circuit Metric
    Tahir, Ruhma
    Tahir, Hasan
    McDonald-Maier, Klaus
    SENSORS, 2015, 15 (10) : 26621 - 26642
  • [29] Characterization of a Metric for Web Applications (Web Points)
    Mendes Salgado, Ana Sofia
    Gonzalez Abreu Ribeiro, Pedro Miguel
    PROCEEDINGS OF 2021 16TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI'2021), 2021,
  • [30] Securing Web servers against insider attack
    Jiang, S
    Smith, S
    Minami, K
    17TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2001, : 265 - 276