A Study on Web Application Security and Detecting Security Vulnerabilities

被引:0
|
作者
Kumar, Sandeep [1 ]
Mahajan, Renuka [2 ]
Kumar, Naresh [1 ]
Khatri, Sunil Kumar [1 ]
机构
[1] Amity Univ Uttar Pradesh, Amity Inst Informat Technol, Noida, India
[2] Jaipuria Inst Management, Noida, India
关键词
Web Security Threats; SQL Injection; Cross Site Scripting; Security Standards; Security Vulnerabilities; TAXONOMY;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The world is exceedingly reliant on the Internet. Nowadays, web security is biggest challenge in the corporate world. It is considered as the principle framework for the worldwide data society. Web applications are prone to security attacks. Web security is securing a web application layer from attacks by unauthorized users. A lot of the issues that occur over a web application is mainly due to the improper input provided by the client. This paper discusses the different aspects of web security and it's weakness. The main elements of web security techniques such as the passwords, encryption, authentication and integrity are also discussed in this paper. The anatomy of a web application attack and the attack techniques are also covered in details. This paper explores a number of methods for combatting this class of threats and assesses why they have not proven more successful. This paper proposes a better way for minimizing these type of web vulnerabilities. It also provides the best security mechanisms for the said attacks.
引用
收藏
页码:451 / 455
页数:5
相关论文
共 50 条
  • [1] Security Issues and Vulnerabilities in Web Application
    Anumotu, Sitara
    Jha, Kushagra
    Balhara, Amit
    Chawla, Pronika
    NEXT GENERATION OF INTERNET OF THINGS, 2023, 445 : 103 - 114
  • [2] Evaluation of Black-Box Web Application Security Scanners in Detecting Injection Vulnerabilities
    Althunayyan, Muzun
    Saxena, Neetesh
    Li, Shancang
    Gope, Prosanta
    ELECTRONICS, 2022, 11 (13)
  • [3] Web Application Security Vulnerabilities Detection Approaches: a Systematic Mapping Study
    Rafique, Sajjad
    Humayun, Mamoona
    Hamid, Bushra
    Abbas, Ansar
    Akhtar, Muhammad
    Iqbal, Kamil
    2015 16TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2015, : 469 - 474
  • [4] A Taxonomy of Web Security Vulnerabilities
    Al-Kahla, Wafaa
    Shatnawi, Ahmed S.
    Taqieddin, Eyad
    2021 12TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION SYSTEMS (ICICS), 2021, : 424 - 429
  • [5] Detecting security vulnerabilities with vulnerability nets
    Wang, Pingyan
    Liu, Shaoying
    Liu, Ai
    Jiang, Wen
    JOURNAL OF SYSTEMS AND SOFTWARE, 2024, 208
  • [6] Detecting Security Vulnerabilities with Vulnerability Nets
    Wang, Pingyan
    Liu, Shaoying
    Liu, Ai
    Jiang, Wen
    2022 IEEE 22ND INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY, AND SECURITY COMPANION, QRS-C, 2022, : 375 - 383
  • [7] A New Framework of Security Vulnerabilities Detection in PHP Web Application
    Zhao, Jingling
    Gong, Rulin
    2015 9TH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING IMIS 2015, 2015, : 271 - 276
  • [8] TipTracer: Detecting Android Application Vulnerabilities Based on the Compliance with Security Guidance
    Zhang L.
    Yang Z.
    Li M.
    Yang M.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2019, 56 (11): : 2315 - 2329
  • [9] A case study in detecting software security vulnerabilities using constraint optimization
    Weber, M
    Shah, V
    Ren, C
    FIRST IEEE INTERNATIONAL WORKSHOP ON SOURCE CODE ANALYSIS AND MANIPULATION, PROCEEDINGS, 2001, : 1 - 11
  • [10] European digital libraries: web security vulnerabilities
    Kuzma, Joanne
    LIBRARY HI TECH, 2010, 28 (03) : 402 - 413