0% found this document useful (0 votes)
8 views2 pages

A Survey On Web Application Security

Web application security

Uploaded by

Reshon Sheyal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views2 pages

A Survey On Web Application Security

Web application security

Uploaded by

Reshon Sheyal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

5.

A Survey on Web Application Security

This paper aims to evaluate different web application attack detection mechanisms
and assess their resistance against various attacking techniques. Such an
evaluation is crucial for measuring the effectiveness of available attack defense
mechanisms, identifying gaps, and developing effective solutions to enhance web
application security. This research identifies the limitations of current application
attack detection techniques and proposes remedies to improve their efficacy.

So when we consider this particular scenario, with the increasing frequency of


attacks and data breaches, web application security has become a significant
concern. As applications become more critical, complex, and interconnected,
ensuring their security becomes exponentially challenging. Various tools and
techniques exist to detect attacks, threats, and vulnerabilities in applications,
enabling developers to prevent and mitigate associated risks. However by
evaluating various web application attack detection mechanisms, this paper aims to
provide insights into their strengths, weaknesses, and effectiveness against
different attacking techniques.

Finally according to my persanal point of view this paper highlights that existing
work in web application security primarily focuses on addressing general security
flaws such as injection attacks, cross-site scripting (XSS), sensitive data leakage,
user authorization, and user authentication. This work involves activities such as
comparing penetration testing tools, identifying vulnerabilities, and finding ways to
mitigate the discovered flaws in real-world use-case applications.

Reference
[5] "A Survey on Web Application Security Testing Techniques" by Pranav T. S. and Sanjay S, Published
date : 15 Oct 2020

6. Detection of XSS Attacks in Web Applications: A Machine Learning Approach

This paper discusses the increasing prevalence of cyber-attacks on web applications


and websites, specifically focusing on XSS (Cross-Site Scripting) attacks. XSS
attacks are highlighted as a significant issue in web security, ranking as the second
most common risk according to the OWASP Top 10. The paragraph also mentions
the limitations of traditional defense methods, such as rule-based and signature-
based web application firewalls, which can be bypassed by obfuscated attack
payloads. In response, the paper proposes the use of machine learning algorithms
to detect XSS attacks and compares their performance in identifying such attacks in
web applications and websites.

Reference
[6] "Detecting DOM-Based XSS Vulnerabilities in Web Applications" by Mohan Kumar
and C. N. Manjunath (published on 2021).
6. A Holistic Approach to Securing Web Applications

In today's digital landscape, web applications have undergone significant


transformations since the early days of Internet communication. Gone are the static
HTML pages, replaced by dynamic and interactive web applications. This shift has
not only made the internet a universal medium but has also introduced a new set of
security risks.

However, it is crucial to recognize that web applications designed without adequate


security measures can pose serious risks. The consequences of such vulnerabilities
can range from data loss and compromised access to a loss of confidence and
privacy breach.

Therefore, safeguarding web applications against potential threats is paramount.


Implementing robust security measures, such as secure coding practices,
authentication mechanisms, encryption protocols, and regular security audits, is
essential to protect sensitive information and maintain user trust.

When I review this paper, according to my persanal point of view as technology


continues to evolve, so do the risks associated with web applications. It is
imperative for developers, businesses, and users to stay vigilant and prioritize
security in order to mitigate the potential risks and ensure the continued safe and
reliable operation of web applications.

[6] "Towards a Holistic Framework for Web Application Security" by Shashank Gupta
and Naveen Kumar Malik (2021)

You might also like