Analysis of Web Server Security Challenges
DOI:
https://doi.org/10.53555/cse.v2i6.182Keywords:
Web,, servers,, security, vulnerabilitiesAbstract
As the web expands in size and adoption, so does the interest of attackers who seek to exploit web applications and infiltrate user data. While there is a steady stream of news regarding major breaches and millions of user credentials compromised. It is logical to assume that overtime, the applications of bigger players of the web are becoming more secure. However as these applications become resistant to most prevalent attacks, adversaries may be tempted to move easier, unprotected target would still hold sensitive user data. This article reviews some of the security challenges being faces by web server on the internet.
Downloads
References
Ali Alper Yayla, Q. H. (2016). The impact of Information security events on the stock value of firms: the effect of contigency factors. Retrieved from Palgrave macmillian: http://www.palgrave-journals.com/jit/journal/v26/n1/fig_tab/jit201043.html
Bhupendra Singh Thakur, S. C. (June 2013). Content Sniffing Attack Detection in Client and Server side: A Survey. International Journal of Advanced Computer Research (ISSN (print): 2249-7277 ISSN (online): 2277-7970)Volume-3 Number-2 Issue-10 , 4.
BISSON, D. (2016, January 14). THE STATE OF SECURITY. Retrieved from tripwire: http://www.tripwire.com/state-of-security/security-data-protection/cyber-security/ddos-attacks-increased-by-180-compared-to-2014-reveals-akamai-report
Cox, R. (2013, August 26). 5 Notorious DDoS Attacks in 2013: Big Problem for the Internet of Things. Retrieved from siliconANGLE: http://siliconangle.com/blog/2013/08/26/5-notorious-ddos-attacks-in-2013-big-problem-for-the-internet-of-things
Esraa Alomari, S. M. (2012). Botnet-based Distributed Denial of Service(DDoS) Attacks on Web Servers: Classification and Art. International journal of Computer Application (0975-8887), 9.
Ezer Osei Yeboah-Boateng, P. M. (2014). Phishing, SMiShing & Vishing: An Assessment of Threats against Mobile Devices. Journal of Emerging Trends in Computing and Information Sciences, 11.
GLAZER, E. (2014, October 3). J.P. Morgan's Cyber Attack: How The Bank Responded. Retrieved from THE WALL STREET JOURNAL: http://blogs.wsj.com/moneybeat/2014/10/03/j-p-morgans-cyber-attack-how-the-bank-responded
Guru99. (2015, September). How to hack a Web Server. Retrieved from Guru99 Website: http://www.guru99.com/how-to-hack-web-server.html
Haya Shulman, M. W. (2014). DNSSEC for cyber forensics. Shulman and Waidner EURASIP Journal on Information Security , 14.
Ibrahim S. Alfayoumi, T. S. (2015). Client-Side Pharming Attacks Detection using Authoritative Domain Name Servers. International Journal of Computer Applications (0975-8887) Volume113, 6.
Jyoti Chhikara, R. D. (2013). Phishing & Anti-Phishing Techniques: Case Study. International Journal of Advanced Research in Computer Science and Software Engineering, 8.
Meier, J., Mackman, A., Dunner, M., Vasireddy, S., Escamilla, R., & Murukan, A. (2006). Improving Web Application Security: Threats and Countermeasures. In J. Meier, A. Mackman, M. Dunner, S. Vasireddy, R. Escamilla, & A. Murukan, Improving Web Application Security: Threats and Countermeasures(p. Chapter 16). Microsoft Corporation.
Ms. Ritu Royal, D. P. (January 2012). DETECTING AND PREVENTING WEB ATTACKS BY FILTERS. International Journal of Enterprise Computing and Business Systems, 16.
Patrikakis, C., Masiko, M., & Zouraraki, O. (2004). Distributed Denial of Service Attacks. The Internet Protocol Journal.
Rouse, M. (2015, September). What is web server security?Retrieved from TechTarget: http://searchsecurity.techtarget.com/definition/web-server-security
Shulman, H., &Waidner, M. (2014). DNSSEC for cyber forensics. EURASIP Journal on Information Security.
Sumit Siddharth, P. D. (2006, April 27). Five common Web application vulnerabilities. Retrieved from Symantec: http://www.symantec.com/connect/articles/five-common-web-application-vulnerabilities
Tan, F. W. (May 2014). A SRVEY OF TRENDS IN MASSIVE DDOS ATTACKS AND CLOUD-BASED MITIGATIONS. International Journal of Network Security & Its Applications (IJNSA), Vol 6.No 3, 15.
Vina M. Lomte, P. D. (October 2012). A Secure Web Application: E-Tracking system. International Journal of UbiComp(IJU), Vol. 3, No. 4, 18.
Yeboah-Boateng, E. O., & Amano, P. M. (2014). Phishing, SMiShing & Vishing: An Assessment of Threats against Mobile Devices. Journal of Emerging Trends in Computing and Information Sciences.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2016 gnpublication@
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
In consideration of the journal, Green Publication taking action in reviewing and editing our manuscript, the authors undersigned hereby transfer, assign, or otherwise convey all copyright ownership to the Editorial Office of the Green Publication in the event that such work is published in the journal. Such conveyance covers any product that may derive from the published journal, whether print or electronic. Green Publication shall have the right to register copyright to the Article in its name as claimant, whether separately
or as part of the journal issue or other medium in which the Article is included.
By signing this Agreement, the author(s), and in the case of a Work Made For Hire, the employer, jointly and severally represent and warrant that the Article is original with the author(s) and does not infringe any copyright or violate any other right of any third parties, and that the Article has not been published elsewhere, and is not being considered for publication elsewhere in any form, except as provided herein. Each author’s signature should appear below. The signing author(s) (and, in