WASM - A Metric for Securing a Web Application

被引:0
|
作者
Kumar, Rakesh [1 ]
Kaur, Gurvinder [2 ]
机构
[1] Kurukshetra Univ, Dept Comp Sci & Applicat, Kurukshetra 132119, Haryana, India
[2] Guru Nanak Khalsa Inst Technol & Management Studi, Yamunanagar, Haryana, India
来源
JOURNAL OF RESEARCH AND PRACTICE IN INFORMATION TECHNOLOGY | 2014年 / 46卷 / 01期
关键词
Client; Network; Server; Web Security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet is a medium to connect millions of computers which share and access information all over the world. With the evolution of the web and its increased use in every aspect of life, the need for web security has become imperative. As websites opt for commercial viability, the threat of hackers, viruses, or annoyance attacks becomes more pronounced. Organizations face several security-related challenges. If organizational information is hacked either through the network or through other means, it could incur a heavy cost to the company. A failure in network security could also cost the organization in terms of its goodwill and reputation. This paper identified common threats on the web and classified these threats into various categories, such as accidental, malicious, authorization, application, privacy, and access control threats. This also highlights the three main areas in which web can be secured ie. client side threats, server side threats and network side threats. This paper discusses the primary goals and objectives of security contained within the CIA Triad: Confidentiality, Integrity and Availability. Different types of attackers which are responsible for security of web are also depicted. This paper shows different attacks related to client side, server side and network side threats. Client-side Security threats are classified into: Cross Site Scripting, Cross Site Request Forgery, Broken Authentication and Session Management, Security Misconfiguration and Failure to Restrict URL Access. Server-side Security consists of Structured Query Language (SQL) Injection, Malicious File Execution, Insecure Direct Object Reference, Insecure Cryptographic Storage and Unvalidated Redirects and Forwards. The network threats highlighted are Denial of Service (DoS), Insufficient Transport Layer Protection, Eavesdropping, Data Modification, IP Address Spoofing, Sniffer attacks, Man-in-the-Middle Attack, Phishing, Brute force attack and TCP Session Hijacking. The paper shows the causes of each of the attacks and the web application metrics which were earlier defined are also highlighted. A metric named Web Application Security Metric (WASM) is proposed in this regard to make the web page secure. This metric calculates the sum of the weight of the categories like: Input validation, Authentication, Authorization, Configuration management, Sensitive data, Session management, Cryptography, Parameter manipulation, Exception management and Auditing and logging.
引用
收藏
页码:19 / 29
页数:11
相关论文
共 50 条
  • [41] E-health application: Development of a web framework for the creation and application of metric, systems to the digital medical image
    Pernas, Juan Antonio
    Pellit, Santiago
    Novoa, Francisco Javier
    Vazquez, Jose Manuel
    Grande, Ruben
    Pereira, Javier
    Teijeiro, Jorge
    Pazos, Alejandro
    PROCEEDINGS OF THE 6TH WSEAS INTERNATIONAL CONFERENCE ON E-ACTIVITIES: E-ACTIVITIES: NETWORKING THE WORLD, 2007, : 326 - +
  • [42] Securing the anonymity of content providers in the World Wide Web
    Demuth, T
    Rieke, A
    SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS, 1999, 3657 : 494 - 502
  • [43] An integrated approach for securing electronic transactions over the Web
    Kolokotronis, N.
    Margaritis, C.
    Papadopulou, P.
    Kanellis, P.
    Martakos, D.
    Benchmarking, 2002, 9 (02): : 166 - 181
  • [44] Securing User Credentials in Web Browser: Review and Suggestion
    Ahmed, Abdulghani Ali
    Khay, Lee Mei
    2017 IEEE CONFERENCE ON BIG DATA AND ANALYTICS (ICBDA), 2017, : 67 - 71
  • [45] Securing instance-level interactions in web services
    Zhang, DC
    Xu, J
    ISADS 2005: INTERNATIONAL SYMPOSIUM ON AUTONOMOUS DECENTRALIZED SYSTEMS,PROCEEDINGS, 2005, : 443 - 450
  • [46] Securing XML Web Services with Elliptic Curve Cryptography
    Liu, Ying
    Yeap, Tet H.
    O'Brien, William
    2007 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-3, 2007, : 974 - 977
  • [48] Securing web services: Practical usage of standards and specifications
    Tran, Lan Anh
    LIBRARY HI TECH, 2008, 26 (02) : 321 - 323
  • [49] Securing Password Authentication for Web-based Applications
    Tan, Teik Guan
    Szalachowski, Pawel
    Zhou, Jianying
    2022 5TH IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (IEEE DSC 2022), 2022,
  • [50] Issues in securing web-accessible information systems
    Lavery, J
    Boldyreff, C
    PROCEEDINGS OF THE TENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, 2001, : 189 - 193