High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

Web Application Attack and Countermeasure

Author(s):

Pawar Puja Uday , Bharati Vidyapeeth, College of Engineering,Kharghar,Navi Mumbai; Soni Varun, Bharati Vidyapeeth, College of Engineering,Kharghar,Navi Mumbai; Lakshane Pooja, Bharati Vidyapeeth, College of Engineering,Kharghar,Navi Mumbai; Prof. Sulakshana Mane, Bharati Vidyapeeth, College of Engineering,Kharghar,Navi Mumbai

Keywords:

Web Application Attacks, Injection Attack agents, OWASP

Abstract

Adoption of internet for business operations has changed the face of business interactions in business 2 business (B2B), business 2 consumer (B2C) or now popular consumer 2 consumer (C2C) models. Applications are built to adapt this changing business perspective and thereby giving more and more control to the end user/consumer to define the way they want to make the business happen. But as we say, each coin has two sides, with flexibility there comes a great responsibility of maintaining the sanity of the information, which these applications access and publish on the internet. The thought of increase of cyber terrorism and espionage incidents has triggered a worldwide uncertainty of ever increasing dependency of internet as a business medium. This paper hereby attempts to address these problems by taking references from the well-known attack vectors and thereby providing counter measures to identify, analyze and mitigate the problem. This paper primarily takes the reference from Open Web Application Security Project (OWASP) guidelines.

Other Details

Paper ID: IJSRDV2I12076
Published in: Volume : 2, Issue : 12
Publication Date: 01/03/2015
Page(s): 67-68

Article Preview

Download Article