Loading

Web Vulnerability Detection and Security Mechanism
Katkar Anjali S.1, Kulkarni Raj B.2

1Katkar AnjaliS., Computer Science and Engineering department, Shivaji University,Walchand Institute of Technology, Sholapur, Maharashtra, India.
2Kulkarni Raj B, Computer Science and Engineering department, Shivaji University,Walchand Institute of Technology, Sholapur, Maharashtra, India.
Manuscript received on September 01, 2012. | Revised Manuscript received on September 02, 2012. | Manuscript published on September 05, 2012. | PP: 237-241 | Volume-2 Issue-4, September 2012. | Retrieval Number: D0953082412/2012©BEIESP
Open Access | Ethics and Policies | Cite
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Web applications consist of several different and interacting technologies. These interactions between different technologies can cause vast security problems. As organizations are taking their businesses online they make their systems accessible to the world. They might have a firewall in place and possibly even their web server is running an up-to-date version of its software but that is not enough to protect their resources. The research areas of this paper outline the major publicly reported security vulnerability in recent year’s strong growth of the web applications. Unvalidated Input, Broken Access Control, Broken Authentication and Sessions Management, Insecure Configuration Management, Improper Error Handling, Parameter Modification, Cookie Modification and Directory Traversal have been the most dominant class of web vulnerabilities. Further, the research includes methods for detecting the vulnerabilities and then providing security mechanism to protect web application from those vulnerabilities. The result shows the security mechanisms against the attacks and vulnerabilities. Securing the websites against these vulnerabilities is very difficult and challenging task as day to day new techniques for attacks are invented, so the study of various types of vulnerabilities, detecting the attacks and providing solution for these vulnerabilities is essential part in internet world.
Keywords: Security, Vulnerability detection and Web applications.