2018
DOI: 10.5013/ijssst.a.19.02.06
|View full text |Cite
|
Sign up to set email alerts
|

Broken Authentication and Session Management Vulnerability: A Case Study of Web Application

Abstract: Web applications have extensively taken over the roles of atomization and enhancement of prevailing solutions. It also provides different services to the multiple users of the application. In the recent time, performance of the web services are measured through two important properties such as authentication and session management. However, user authentication appears to be crucial when a valid user of the web application inappropriately discontinues their communication while the session remains active and an … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0
1

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(13 citation statements)
references
References 20 publications
0
12
0
1
Order By: Relevance
“…Moreover, the PCS can expose different services such as web applications, Virtual Network Computing software, and so on. Several works broadly analyzed the vulnerabilities of web server and common attacks such as SQL injection [ 24 ], cross-site scripting [ 25 ], broken authentication and session management [ 26 ], and Denial of Services [ 27 ]. Furthermore, the patch management in ICS environment is more complicated than in the IT sector, so those vulnerabilities persist on industrial devices.…”
Section: Attack Surface Of Storage Systemsmentioning
confidence: 99%
“…Moreover, the PCS can expose different services such as web applications, Virtual Network Computing software, and so on. Several works broadly analyzed the vulnerabilities of web server and common attacks such as SQL injection [ 24 ], cross-site scripting [ 25 ], broken authentication and session management [ 26 ], and Denial of Services [ 27 ]. Furthermore, the patch management in ICS environment is more complicated than in the IT sector, so those vulnerabilities persist on industrial devices.…”
Section: Attack Surface Of Storage Systemsmentioning
confidence: 99%
“…(i) Injections: manipulating the input to force a web application to execute arbitrary commands in the operating system and queries in databases [9], SQL injection is the most famous of injection attacks [10], and it allows the attacker to interact with the database by reading, writing, and modifying records. (ii) Broken authentication: exploiting logical and weakness points in the authentication mechanism to takeover and control accounts [11]. (iii) Sensitive data exposure: manipulating a web application to make it throw exceptions and expose sensitive data such as credentials of the database [12].…”
Section: Related Workmentioning
confidence: 99%
“…Input of data: d (dataset), a (algorithm), p1 (web server port), i1 (web server IP), p2 (WAF port), i2 (WAF IP). ( 1) Start (2) Connect to database to initialize Inputs (d, a, p1, i1, p2, i2) (3) Start WAF listener using Inputs (p1, i1, p2, i2) (4) Training WAF using Inputs (d, a) (5) While WAF listener is "ON": (6) If new request arrived R: (7) Parse R (8) Compute basic features vector B from parsed R (9) Compute V Final features vector from B (10) Compute C (class) of parsed request R by classify based on V (11) If C � "anomal" (12) Drop request (13) Redirect to custom page with message "Attack" (14) Else//C � 'normal' (15) pass request to web server (16) Store V and C in database ( 17) Endif ( 18) Endif ( 19) EndWhile (20) End ALGORITHM 1: Units of proposal WAF (detailed algorithm).…”
Section: Features Engineeringmentioning
confidence: 99%
“…Keempat, issue lainnya yang berhubungan contohnya password di dalam source code tidak boleh dalam bentuk hard-coded. Kelima, Session ID Protection hal ini digunakan biasanya untuk server mengidentifikasi user yang akan masuk ke dalam session menggunakan session ID (Hassan et al, 2018). Broken authentication memiliki fungsi untuk autentikasi dan manajemen session yang tidak dapat diterapkan dengan baik, memungkinkan penyerang menyusup untuk mendapatkan username dan password dan mengeksploitasi kelemahan implementasi untuk mengasumsikan identitas pengguna lain secara permanen atau sementara (OWASP, 2017).…”
Section: Pendahuluanunclassified