The Security Vulnerabilities in Websites the Security
DOI:
https://doi.org/10.61841/j57xkm23Keywords:
Security Systems, Vulnerabilities, Web Applications, Software Development, Malware DetectionsAbstract
Nowadays, internet usage growth is rapidly increasing day by day with respect to technological aspects. To add a brief description to this, as of late web security has been seen with regard to anchoring the web application layer from assaults by unapproved clients. The vulnerabilities existing in the web application layer have been ascribed either to utilizing an unseemly programming improvement model to manage the advancement procedure or to the utilization of a product improvement show that does not think about security as a key factor. Along these lines, this orderly writing survey is directed to examine the different security vulnerabilities used to anchor the web application layer, the security methodologies or strategies utilized all the while, the phases in the product improvement in which the methodologies or procedures are underscored, and the apparatuses and components used to distinguish vulnerabilities. This article might help the data users to abstain from those arrogations.
Downloads
References
[1] J. Pescatore, Web Services: Application-Level Firewalls Required, report no. SPA-15-5542, Gartner, Stamford, Conn, 7 Mar. 2002; available at www4.garter.com/DisplayDocument?id=353429 web accessed on 29 January 2019
[2] Xiaowei Li and Yuan Xue, “A Survey on Web Application Security,” technical report, Vanderbilt University, 2011.
[3] Z. Su and G. Wassermann. The essence of command injection attacks in Web applications. In Proc. POPL, 2006.
[4] Kumar, G. N. S., and A. Srinath. 2018. "An Ergonomical Condition of Pedestrians on Accelerating Moving Walkway: A People Mover System." International Journal of Mechanical and Production Engineering
Research and Development 8 (Special Issue 7): 1376-1381.
[5] Mohit Kumar, Abhishek Gupta, Azhar Shadab, Lokesh Kumar & Vikas Kumar Tiwari, Defending Against
Modern Threats in Web Applications, International Journal of Computer Science and Informatics ISSN
(PRINT): 2231–5292, Vol-1, Iss-4, 2012.
[6] Fielding, R., Gettys, J., Migul, J., Freystyk, H., Masinter, L., Leach, P., Berners-Lee, T.: Hypertext Transfer Protocol {HTTP/1.1.RFC 2616, http://www/w3/prg/Protocols/rfc2616/rfc2616.html (June 1999).
[7] Berners-Lee, T., Fielding, R., Irvine, U., Masinter, L.: Uniform Resource Identifiers (URI): Generic Syntax. RFC 2396, http://www.ietf.org/rfc/rfc2396.txt (August 1998).
[8] Kumar, Gurram Narendra Santosh and A. Srinath. "Exploration of Accelerating Moving Walkway for Futuristic Transport System in Congested and Traffical Areas." (2018): 616-624.
[9] Mallik, K.S.K., Kumar, G.N.S., Balasubramanyam, S., Swetha, D. A review on preparation and structural
characterization studies of graphitic carbon nitride (2017) Journal of Advanced Research in Dynamical and
Control Systems, 9 (Special Issue 14), pp. 1869-1880
[10] Rama Chandra Manohar, K., S. Upendar, V. Durgesh, B. Sandeep, K. S. K. Mallik, G. N. S. Kumar, and S. H.
Ahammad. 2018. "Modeling and Analysis of Kaplan Turbine Blade using CFD." International Journal of
Engineering and Technology (UAE) 7 (3.12 Special Issue 12): 1086-1089.
[11] A. Barth, J. Caballero, and D. Song, “Secure content sniffing for web browsers, or how to stop papers from
reviewing themselves,” Conference: 30th IEEE Symposium on Security and Privacy (S&P 2009), 17-20 May
2009, Oakland, California, USA, DOI: 10.1109/SP.2009.3 ·
[12] Malware Info Resource Center, http://www.malwareinfo.com/mal_faq_inject.html web accessed on January
31, 2019
[13] [13] Google Security Blog,
http://googleonlinesecurity.blogspot.com/2009/08/malwarestatistics-update.html web accessed on February
1, 2019
[14] http://www.forbes.com/sites/andygreenberg/2011/08/05/androidapp-turns-smartphones-into-mobile-hacking-machines/ web accessed on February 3, 2019
[15] Balasubramanyam, S., D. Padmaja Usharani, A. Harsha Vardhan Reddy, Danthala Swetha, Gurram Narendra Santosh Kumar, K. Anusha, and Sk Hasane Ahammad. “Selecting a College Academic Branch-a Design Decision-Taking System for Student Career Selection.” International Journal of Engineering Technology 7, no. 4.19 (2018): 323-328.
Downloads
Published
Issue
Section
License
Copyright (c) 2020 AUTHOR

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.