CFP last date
20 January 2025
Reseach Article

Some Basic Steps to Secure Web Application from Unauthorized Access

by H. M. Mohidul Islam
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 173 - Number 4
Year of Publication: 2017
Authors: H. M. Mohidul Islam
10.5120/ijca2017915293

H. M. Mohidul Islam . Some Basic Steps to Secure Web Application from Unauthorized Access. International Journal of Computer Applications. 173, 4 ( Sep 2017), 35-37. DOI=10.5120/ijca2017915293

@article{ 10.5120/ijca2017915293,
author = { H. M. Mohidul Islam },
title = { Some Basic Steps to Secure Web Application from Unauthorized Access },
journal = { International Journal of Computer Applications },
issue_date = { Sep 2017 },
volume = { 173 },
number = { 4 },
month = { Sep },
year = { 2017 },
issn = { 0975-8887 },
pages = { 35-37 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume173/number4/28327-2017915293/ },
doi = { 10.5120/ijca2017915293 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:20:24.040997+05:30
%A H. M. Mohidul Islam
%T Some Basic Steps to Secure Web Application from Unauthorized Access
%J International Journal of Computer Applications
%@ 0975-8887
%V 173
%N 4
%P 35-37
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Nowadays people are being more dependent on web application because of its accessibility. The web application is expected to play a significant role in internet applications. A web application can be accessed from anywhere by any person of the world through internet. People use web application for their own purpose through a web system. But it has some probability to be hacked or data stolen by an unauthorized person. There are some common vulnerabilities of a web application. If it is possible to prevent the attack and then web application will be secure to protect user’s information. And then the user also will get the best productivity of web application and they will increase interaction with the web based system. So it is very important to provide a secure web platform. In this paper, some basic steps have been proposed to secure web application form unauthorized access.

References
  1. Higgins, M., Ahmad, D., Arnold, C. L., Dunphy, B., Prosser, Mand Weafer, V., “Symantec Internet Security Threat n Report—Attack Trends for Q3 and Q4 2002,” Symantec, Feb 2003.
  2. D. Scott and R. Sharp, "Developing secure Web applications", IEEE Internet Computing, vol. 6, no. 6, pp. 38-45, 2002.
  3. M. Lam, M. Martin, B. Livshits and J. Whaley, "Securing web applications with static and dynamic information flow tracking", Proceedings of the 2008 ACM SIGPLAN symposium on Partial evaluation and semantics-based program manipulation - PEPM '08, 2008.
  4. Y. Huang, S. Huang, T. Lin and C. Tsai, "Web application security assessment by fault injection and behavior monitoring", Proceedings of the twelfth international conference on World Wide Web - WWW '03, 2003.
  5. Y. Huang, F. Yu, C. Hang, C. Tsai, D. Lee and S. Kuo, "Securing web application code by static analysis and runtime protection", Proceedings of the 13th conference on World Wide Web - WWW '04, 2004.
  6. A. Griffith, CodeIgniter 1. 7 professional Development. Birmingham: Packt Publishing, Limited, 2010.
  7. B. Adida, "Sessionlock", Proceeding of the 17th international conference on World Wide Web - WWW '08, 2008.
  8. S. Jiang, K. Minami, and S. Smith. Securing Web Servers against Insider Attack. In Annual Computer Security Applications Conference, 2001
  9. R. Saravanaguru, G. Abraham, K. Ventakasubramanian and K. Borasia, "Securing Web Services Using XML Signature and XML Encryption", 2013.
  10. Boyd, S. and Keromytis, A., 2004. SQLrand: Preventing SQL injection attacks. In Applied Cryptography and Network Security (pp. 292-302). Springer Berlin/Heidelberg
  11. Dacosta, I., Chakradeo, S., Ahamad, M. and Traynor, P., 2012. One-time cookies: Preventing session hijacking attacks with stateless authentication tokens. ACM Transactions on Internet Technology (TOIT), 12(1), p.1.
  12. Y. HEREN, "Design and implementation of web based on Laravel framework.", Atlantis Press, 2015.’
  13. D. Upton, Codelgniter for Rapid PHP application development. Birmingham [u.a.]: Packt Publ., 2007.
  14. D. Ryck, "Client-Side Web Security: Mitigating Threats against Web Sessions", 2014.
  15. B. Delipetrev and S. Ristova, "Performance benchmark of PHP frameworks with database select methods", IX INTERNATIONAL CONFERENCE FOR YOUNG RESEARCHERS, pp. 38-41, 2015.
  16. Popa, Raluca Ada, Emily Stark, Steven Valdez, Jonas Helfer, Nickolai Zeldovich, and Hari Balakrishnan "Building web applications on top of encrypted data using Mylar", 11th USENIX Symposium on Networked Systems Design and Implementation, 2014.
  17. T. Otwell, "Security - Laravel - The PHP Framework For Web Artisans", Laravel.com, 2011. [Online]. Available: https://laravel.com/docs/4.2/security
  18. Swamidas, M., A. Govardhan, and D. Vijayalakshmi, "QoS Web Service Security Dynamic Intruder Detection System for HTTP SSL services", arXiv preprint arXiv:1605.00918, 2016. Bowman, M., Debray, S. K., and Peterson, L. L. 1993. Reasoning about naming systems.
Index Terms

Computer Science
Information Sciences

Keywords

Web application Security Prevent unauthorized access Access Control.