Authors:
Sivaram Rajeyyagari,DOI NO:
https://doi.org/10.26782/jmcms.2019.06.00031Keywords:
Cyber security,cyber crime,cyber ethics,social media,Abstract
Every website developed with web technologies. Security is most widely needed for every website. Cyber security is one of the important prevention for websites. This will protect web applications from various attacks. Many attacks are there such as server attacks, DOS attack, data attack and other types of attacks. This will damage the server and social networking sites to disturb the user data. Various drawbacks are addressed in providing security and privacy. To solve these issues, enhanced cyber security is introduced and provided advanced cyber security for web applications and also for servers. The performance of the proposed system is show in resultsRefference:
I.A. Avancini, M. Ceccato, “Towards Security Testing with Taint Analysis and Genetic Algorithms”, ICSE Workshop on Software Engineering for Secure Systems, vol. 5, pp.65-71, 2010.
II.L. K. Shar, H. B. K. Tan, “Automated removal of cross site scripting vulnerabilities in web applications”, Inf. Softw. Technol., vol. 54, pp. 467-478, 2012.
III.L. S. Shar, H. B. K. Tan, L. C. Briand, “Mining SQL injection and cross site scripting vulnerabilities using hybrid program analysis”, Proc. of Int. Conf. on Software Engineering (ICSE ’13), pp. 642-651, 2013.
IV.Marashdih Abdalla Wasef, “ZaabaZarulFitri Cross Site Scripting Detection Approaches in Web Application”, International Journal of Advanced Computer Science and Applications., vol. 7, no. 10, pp. 155-160, 2016.
V.Meijunjin, “An Approach For Sql Injection Vulnerability Detection”, 2009 Sixth International Conference On Information Technology: New Generations IEEE, pp.1411-1414.
VI.R. Kumar, “Mitigating the authentication vulnerabilities in Web applications through security requirements”, Information and Communication Technologies (WICT), vol. 60,pp. 651-663, 2011.
VII.S. Ali, S.K. Shahzad, H. Javed, “SQLIPA: An Authentication Mechanism Against SQL Injection”, European Journal of Scientific Research, vol. 38, no. 4, pp. 604-611, 2009.
VIII.S. J. Sadana, N. Selam, “Analysis of Cross Site Scripting Attack”, Proc. International Journal of Engineering Research and Applications (IJERA), vol. 1, no. 4, pp. 1764-1773, 2011.
IX.Tajpour Atefeh, Maslin Masrom, Mohammad Zaman Heydari, Suhaimi Ibrahim, “SQL injection detection and prevention tools assessment”, Computer Science and Information Technology (ICCSIT) 2010 3rd IEEE International Conference, vol. 9, pp. 518-522, 2010.
X.Yang Haixia, Nan Zhihong, “A Database Security Testing Scheme Of Web Application”, 4th International Conference On Computer Science And Education, pp. 953-955, 2009.
XI.Y. Li, Z. Wang, T. Guo, “Reflected XSS Vulnerability Analysis”, International Research Journal of Computer Science and Information Systems (IRJCSIS), vol. 2, pp.25-33, 2013.
XII.YongJoonPark, JaeChul Park, “Web Application Intrusion Detection System For Input Validation Attack”, Third 2008 International Conference On Convergence And Hybrid Information Technology IEEE, pp. 498-504.
Sivaram Rajeyyagari
View
Download