[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Nagpal et al., 2014 - Google Patents

Preventive measures for securing web applications using broken authentication and session management attacks: A study

Nagpal et al., 2014

View PDF
Document ID
14596170778007998661
Author
Nagpal N
Nagpal B
Publication year
Publication venue
International Conference on Advances in Computer Engineering and Applications (ICACEA)

External Links

Snippet

Web applications are widely adopted in today's life. At the same time, web applications tend to be error prone and implementation vulnerabilities are readily exploited by the attackers. Therefore it becomes more important to ensure the reliability and security of the web …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis

Similar Documents

Publication Publication Date Title
Yang et al. A security analysis of the OAuth protocol
Sun et al. oPass: A user authentication protocol resistant to password stealing and password reuse attacks
Huang et al. Using one-time passwords to prevent password phishing attacks
US8527757B2 (en) Method of preventing web browser extensions from hijacking user information
TWI543574B (en) Method for authenticatiing online transactions using a browser
Lin et al. Threat modeling for CSRF attacks
Nagpal et al. Preventive measures for securing web applications using broken authentication and session management attacks: A study
Badra et al. Phishing attacks and solutions
Gao et al. A research of security in website account binding
Deeptha et al. Extending OpenID connect towards mission critical applications
Karthiga et al. Enhancing performance of user authentication protocol with resist to password reuse attacks
Leung Visual security is feeble for anti-phishing
Alanazi et al. The history of web application security risks
Haque et al. Enhancement of web security against external attack
Namitha et al. A survey on session management vulnerabilities in web application
Joseph et al. Cookie based protocol to defend malicious browser extensions
Kela et al. IMPLEMENTATION OF CYBER SECURITY ATTACKS AND STRATEGIC MITIGATION MECHANISMS.
Holtmann Single Sign-On Security: Security Analysis of Real-Life OpenID Connect Implementations
Murphey Secure session management: preventing security voids in web applications
Burns Cross site request forgery
WO2010070456A2 (en) Method and apparatus for authenticating online transactions using a browser
Burns Cross site reference forgery
Nair et al. Cyber Attacks and its Prevention Techniques
Patil et al. ANALYSIS OF CROSS SITE REQUEST FORGERY ATTACK ON WEBKIT
Muehlberger CSRF and XSS