Analysis of Web Server Security Challenges

Authors

  • Amadi E. C. Department of Information Management Technology, Federal University of Technology, Owerri
  • Onenunne F. C. Department of Information Management Technology, Federal University of Technology, Owerri
  • Iheukwumere O. C. Department of Information Management Technology, Federal University of Technology, Owerri
  • Onyeyiri U. N. Department of Information Management Technology, Federal University of Technology, Owerri

DOI:

https://doi.org/10.53555/cse.v2i6.182

Keywords:

Web,, servers,, security, vulnerabilities

Abstract

As the web expands in size and adoption, so does the interest of attackers who seek to exploit web applications and infiltrate user data. While there is a steady stream of news regarding major breaches and millions of user credentials compromised. It is logical to assume that overtime, the applications of bigger players of the web are becoming more secure. However as these applications become resistant to most prevalent attacks, adversaries may be tempted to move easier, unprotected target would still hold sensitive user data. This article reviews some of the security challenges being faces by web server on the internet.

Downloads

Download data is not yet available.

References

Ali Alper Yayla, Q. H. (2016). The impact of Information security events on the stock value of firms: the effect of contigency factors. Retrieved from Palgrave macmillian: http://www.palgrave-journals.com/jit/journal/v26/n1/fig_tab/jit201043.html

Bhupendra Singh Thakur, S. C. (June 2013). Content Sniffing Attack Detection in Client and Server side: A Survey. International Journal of Advanced Computer Research (ISSN (print): 2249-7277 ISSN (online): 2277-7970)Volume-3 Number-2 Issue-10 , 4.

BISSON, D. (2016, January 14). THE STATE OF SECURITY. Retrieved from tripwire: http://www.tripwire.com/state-of-security/security-data-protection/cyber-security/ddos-attacks-increased-by-180-compared-to-2014-reveals-akamai-report

Cox, R. (2013, August 26). 5 Notorious DDoS Attacks in 2013: Big Problem for the Internet of Things. Retrieved from siliconANGLE: http://siliconangle.com/blog/2013/08/26/5-notorious-ddos-attacks-in-2013-big-problem-for-the-internet-of-things

Esraa Alomari, S. M. (2012). Botnet-based Distributed Denial of Service(DDoS) Attacks on Web Servers: Classification and Art. International journal of Computer Application (0975-8887), 9.

Ezer Osei Yeboah-Boateng, P. M. (2014). Phishing, SMiShing & Vishing: An Assessment of Threats against Mobile Devices. Journal of Emerging Trends in Computing and Information Sciences, 11.

GLAZER, E. (2014, October 3). J.P. Morgan's Cyber Attack: How The Bank Responded. Retrieved from THE WALL STREET JOURNAL: http://blogs.wsj.com/moneybeat/2014/10/03/j-p-morgans-cyber-attack-how-the-bank-responded

Guru99. (2015, September). How to hack a Web Server. Retrieved from Guru99 Website: http://www.guru99.com/how-to-hack-web-server.html

Haya Shulman, M. W. (2014). DNSSEC for cyber forensics. Shulman and Waidner EURASIP Journal on Information Security , 14.

Ibrahim S. Alfayoumi, T. S. (2015). Client-Side Pharming Attacks Detection using Authoritative Domain Name Servers. International Journal of Computer Applications (0975-8887) Volume113, 6.

Jyoti Chhikara, R. D. (2013). Phishing & Anti-Phishing Techniques: Case Study. International Journal of Advanced Research in Computer Science and Software Engineering, 8.

Meier, J., Mackman, A., Dunner, M., Vasireddy, S., Escamilla, R., & Murukan, A. (2006). Improving Web Application Security: Threats and Countermeasures. In J. Meier, A. Mackman, M. Dunner, S. Vasireddy, R. Escamilla, & A. Murukan, Improving Web Application Security: Threats and Countermeasures(p. Chapter 16). Microsoft Corporation.

Ms. Ritu Royal, D. P. (January 2012). DETECTING AND PREVENTING WEB ATTACKS BY FILTERS. International Journal of Enterprise Computing and Business Systems, 16.

Patrikakis, C., Masiko, M., & Zouraraki, O. (2004). Distributed Denial of Service Attacks. The Internet Protocol Journal.

Rouse, M. (2015, September). What is web server security?Retrieved from TechTarget: http://searchsecurity.techtarget.com/definition/web-server-security

Shulman, H., &Waidner, M. (2014). DNSSEC for cyber forensics. EURASIP Journal on Information Security.

Sumit Siddharth, P. D. (2006, April 27). Five common Web application vulnerabilities. Retrieved from Symantec: http://www.symantec.com/connect/articles/five-common-web-application-vulnerabilities

Tan, F. W. (May 2014). A SRVEY OF TRENDS IN MASSIVE DDOS ATTACKS AND CLOUD-BASED MITIGATIONS. International Journal of Network Security & Its Applications (IJNSA), Vol 6.No 3, 15.

Vina M. Lomte, P. D. (October 2012). A Secure Web Application: E-Tracking system. International Journal of UbiComp(IJU), Vol. 3, No. 4, 18.

Yeboah-Boateng, E. O., & Amano, P. M. (2014). Phishing, SMiShing & Vishing: An Assessment of Threats against Mobile Devices. Journal of Emerging Trends in Computing and Information Sciences.

Downloads

Published

2016-06-30

How to Cite

E. C., A., F. C., O., O. C. , I., & U. N. , O. (2016). Analysis of Web Server Security Challenges. International Journal For Research In Advanced Computer Science And Engineering, 2(6), 11–20. https://doi.org/10.53555/cse.v2i6.182