Nagpal et al., 2014 - Google Patents
Preventive measures for securing web applications using broken authentication and session management attacks: A studyNagpal et al., 2014
View PDF- Document ID
- 14596170778007998661
- Author
- Nagpal N
- Nagpal B
- Publication year
- Publication venue
- International Conference on Advances in Computer Engineering and Applications (ICACEA)
External Links
Snippet
Web applications are widely adopted in today's life. At the same time, web applications tend to be error prone and implementation vulnerabilities are readily exploited by the attackers. Therefore it becomes more important to ensure the reliability and security of the web …
- 230000003449 preventive 0 title abstract description 6
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Yang et al. | A security analysis of the OAuth protocol | |
Sun et al. | oPass: A user authentication protocol resistant to password stealing and password reuse attacks | |
Huang et al. | Using one-time passwords to prevent password phishing attacks | |
US8527757B2 (en) | Method of preventing web browser extensions from hijacking user information | |
TWI543574B (en) | Method for authenticatiing online transactions using a browser | |
Lin et al. | Threat modeling for CSRF attacks | |
Nagpal et al. | Preventive measures for securing web applications using broken authentication and session management attacks: A study | |
Badra et al. | Phishing attacks and solutions | |
Gao et al. | A research of security in website account binding | |
Deeptha et al. | Extending OpenID connect towards mission critical applications | |
Karthiga et al. | Enhancing performance of user authentication protocol with resist to password reuse attacks | |
Leung | Visual security is feeble for anti-phishing | |
Alanazi et al. | The history of web application security risks | |
Haque et al. | Enhancement of web security against external attack | |
Namitha et al. | A survey on session management vulnerabilities in web application | |
Joseph et al. | Cookie based protocol to defend malicious browser extensions | |
Kela et al. | IMPLEMENTATION OF CYBER SECURITY ATTACKS AND STRATEGIC MITIGATION MECHANISMS. | |
Holtmann | Single Sign-On Security: Security Analysis of Real-Life OpenID Connect Implementations | |
Murphey | Secure session management: preventing security voids in web applications | |
Burns | Cross site request forgery | |
WO2010070456A2 (en) | Method and apparatus for authenticating online transactions using a browser | |
Burns | Cross site reference forgery | |
Nair et al. | Cyber Attacks and its Prevention Techniques | |
Patil et al. | ANALYSIS OF CROSS SITE REQUEST FORGERY ATTACK ON WEBKIT | |
Muehlberger | CSRF and XSS |