COOKIES: Specification, Privacy Protection and Preventing Session Hijacking
COOKIES: Specification, Privacy Protection and Preventing Session Hijacking
COOKIES: Specification, Privacy Protection and Preventing Session Hijacking
Manamohan.G Surya S
Department of Computer Science Department of Computer Science
JNN College of Engineering JNN College of Engineering
Shimoga Shimoga
Abstarct----Nowadays the most frequent thing is The purpose of the computer cookie is to help the website
information seeking through any of the websitses. This keep track of your visits and activity. This isn’t always a
paper mainly consolidates on how actually the webpages bad thing. For example, many online retailers use cookies to
or browsers facilitates the requirements of the user, that keep track of the items in a user’s shopping cart as they
is through cookies. Cookies were designed to be a reliable
explore the site. Without cookies, your shopping cart would
mechanism for websites to remember stateful information
or to record the user's browsing activity. It also throws reset to zero every time you clicked a new link on the site.
light on the different types of cookies and the main uses That would make it difficult to buy anything online!
associated with it. The use of cookies to profile individuals
has raised serious security and privacy concerns. Several A website might also use cookies to keep a record of your
countries have enacted privacy protection laws to address most recent visit or to record your login information. Many
these concerns . These can cause the rigorous glitches to people find this useful so that they can store passwords on
the system if not handled properly. frequently used sites, or simply so they know what they
have visited or downloaded in the past.
Keywords:- Cookies, Privacy, Security, Analysis, Hijacking,
Different types of cookies keep track of different activities.
Sessions, One-Time cookies.
Session cookies are used only when a person is actively
navigating a website; once you leave the site, the session
I. INTRODUCTION:
cookie disappears. Tracking cookies may be used to create
long-term records of multiple visits to the same site.
A. MEET THE COMPUTER COOKIE: Authentication cookies track whether a user is logged in,
and if so, under what name.
A computer “cookie” is more formally known as an HTTP
cookie, a web cookie, an Internet cookie or a browser
cookie. The name is a shorter version of “magic cookie,” II. TYPES:
which is a term for a packet of data that a computer receives
and then sends back without changing or altering it. A. SESSION COOKIES:
No matter what it’s called, a computer cookie consists of Also known as a “temporary cookie”, this type of cookie
information. When you visit a website, the website sends attaches itself to a user’s computer when they enter and
the cookie to your computer. Your computer stores it in a browse a website. The cookie is then erased when the user
file located inside your web browser. closes the Web browser or exits the site. A session cookie
does not collect information from a user’s computer or
activity while it sits on the system.
B. WHY AND WHAT DO COOKIES DO ?
-- To Do: Disabling session cookies in your browser can be
difficult. This is due to their “first party” nature, which --To Do: It’s possible to block third-party cookies from your
means they belong to the website the user is visiting and device. Browsers such as Google Chrome, Firefox, and
subsequently all administrative ability rests with the Internet Explorer have options in their Settings menu that
administrators of the website. allows users to turn off their third-party cookies. Dennis
O’Reilly’s CNET article provides step-by-step instructions
Also, most well-known sites such as Facebook and Google to remove third-party cookies from a select number of
are required to have session cookies embedded in their browsers.
programming, making it very difficult for users to get
around them.
B. PERSISTENT COOKIES:
C. THIRD PARTY COOKIES: A 2015 report also found 76% of adults responding that they
were not confident about the privacy and security of the
A good example of third-party cookies is through records of their activities maintained by the online
advertisements or banners for third-party products or advertisers who place adverts on the websites visited by
services present on a website. Cookies are also present in them. Tracking of users without their consent can be
the social media “buttons” commonly found on websites. considered as a violation of their privacy .
When a user encounters an article or a piece of information,
the website will provide the option to share the content
Recent examples of the impacts of enforcement of such
thereby activating the designated social media’s cookies. regulations involved Google and Facebook. Google was
fined $22.5 million in August 2012 for placing
“DoubleClick Advertising Cookies” on users’ systems scheme that utilizes one way hashing and sparse caching
which was considered a violation of the consent order . Also techniques, but practically it is not impLementable, their
in February 2016, Facebook was found to be tracking non- research focuses only on hashing, but it does not describe
Facebook account holders with cookies by the French data
how a session hijack is being prevented.
protection authority prompting the authority to issue
Facebook an ultimatum of three (3) months to comply with
Not even one of the previously described mechanisms has
the regulation. This urges the need for a more detailed study
about the degree of adherence to privacy protection laws by been widely deployed. Even though many of them prevent
different websites, when setting cookies on users' computer session hijacking, they miss the mark to address the
systems. necessities of highly distributed web appLications,
particuLarly requests statelessness. As a resuLt, most of the
B. SESSION HIJACKING: web appLications have opted for aLways on HTTPS as the
main defense against session hijacking attacks. However,
aLways on HTTPS may be probLematic to depLoy,
A Lot of security issues have been raised due to the use of
particuLarLy in Large web appLications, because they were
cookies as session authentication tokens. Several surveys
not designed for such requirement. ALwaysY on HTTPS
have proved multiple problems with web authentication
not onLy affects the performance but aLso impacts existing
mechanisms, including susceptibility to session hijacking
functionaLity (e.g., virtuaL hosting, appLications and
attacks. As a result, security researchers have suggested
network content filtering ). Therefore, to effectiveLy
changes to improve the robustness of authentication
prevent session hijacking attacks, a more robust, efficient,
cookies. Park et al and Fu et al suggested a mechanism
and practicaL aLternative is needed.
using a cookie that provided improved privacy and integrity
guarantee by using well known as cryptographic techniques.
Moreover, these authors made use of cookie expiration time IV. TRACKING THROUGH THE GLITCHES:
to reduce the impact of session hijacking attacks. On the
other hand, many applications use Long expiration time to
The result of the evaluation also revealed that United
avoid affecting a userГs experience, reducing the Kingdom has the highest number of compliant websites
effectiveness of this approach. As a substitute to cookies for with
the identification and authentication of users, Juels et al about 70% of the websites being compliant with the privacy
proposed the use of cache cookies, which are stored in web protection law. It is recommended that the regulatory
browsers by servers (e.g., browser history and temporary agencies in the least compliant countries should adopt
internet files). Even though resistant to pharming attacks, United Kingdom’s model of driving enforcement with the
relevant laws. It was also observed that apart from being
cache cookies need HTTPS for protection to prevent active
able to classify cookies into firstparty and third-party, it is
attacks. In addition, HTTPS only protect cookies on a practically impossible to know the functions of such cookies
network. An adversary can aLso steal cookies from a userГs except they are explicitly stated. It is recommended that
computer through many different attacks (e.g., cross site website developers should adopt a standard naming
scripting attacks , cross site tracing attacks , and convention that will allow users to easily identify the
domainYreLated attacks . Always on HTTPS is the most functions of the web cookies being set on their computers.
The various web browsers provide users with the settings to
recommended defense against session hijacking. To secure
determine the type of cookies being set.
communication in an Internet session, Lamport proposed
one way hash chain (OHC) technique2a cryptographic
technique that relies on one time passwords. Specifically,
the OHC technique has been utilized in many applications
with the goal of reducing the possibility of session
hijacking. For exampLe, the authors proposed a mechanism
using OTC, a disposable credential, to replace
authentication credentials. To protect a userГs session,
implementing a framework that ties a session to a current
browser by fingerprinting and monitoring an underlying
browser and also detecting browser changes at server side.
The OTC generates a set of tokens that are used only once
and discarded once used. The authors proposed a hybrid
TABLE I. COMPARISON OF PRIVACY OTC through which he/she wiLL be authenticated for every
request he/she makes. Each time a user sends a request, an
PROTECTION LAWS OF SELECTED OTC is sent aLong with the request.
COUNTRIES
ii. RPS:
iii. Server:
i. User:
A user or cLient is the one who initiates a request. Suppose Fig2. BLock diagram of the proposed
a user wants to purchase something, he wiLL send a request system for preventing session hijacking
that contains a userГs username and password to the server.
After successfuL authentication, the user wiLL be given an with modified OtC.
The Proposed system works as follows stored on the client's hard disk so if the server
(Fig. 2): crashes they are still available.
.
3. the server checks the credentiaLs, processes the Disadvantages of Cookies:
request, i.e., it fetches the requested page and sends
The following are the disadvantages of cookies :
it to the cLient, but before that, it passes through
RPS. i. Sometimes clients disable cookies on their
browsers in response to security or privacy worries
4. RPS creates OtC, session ID, and gives it to the which will cause problem for web applications that
cLient, and it aLso forwards the response. require them.
6. From now on for every request made by the user, iii. Cookies are limited to simple string information.
the user sends OtC to RPS. They cannot store complex information.
VI. REFERENCES:
v1.2.http://us.Norton.com,oct,2008.
Evaluation of Cookies”,IEEE,pp548-556,2015.