A preliminary review on web session hijacking
A fast internet-based technology such as web-driven and mobile application is the most popular usage of people nowadays. With the blink of the eye, the number of users is increasing tremendously every single second. So does the number of web-driven and mobile application. Thus, the number of a hacke...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Science Publishing Corporation Inc
2018
|
Subjects: | |
Online Access: | View Fulltext in Publisher View in Scopus |
LEADER | 02107nam a2200241Ia 4500 | ||
---|---|---|---|
001 | 10.14419-ijet.v7i3.15.17515 | ||
008 | 220120s2018 CNT 000 0 und d | ||
020 | |a 2227524X (ISSN) | ||
245 | 1 | 0 | |a A preliminary review on web session hijacking |
260 | 0 | |b Science Publishing Corporation Inc |c 2018 | |
490 | 1 | |t International Journal of Engineering and Technology(UAE) | |
650 | 0 | 4 | |a Information security |
650 | 0 | 4 | |a Session hijacking |
650 | 0 | 4 | |a Web attack |
650 | 0 | 4 | |a Web security |
856 | |z View Fulltext in Publisher |u https://doi.org/10.14419/ijet.v7i3.15.17515 | ||
856 | |z View in Scopus |u https://www.scopus.com/inward/record.uri?eid=2-s2.0-85082355491&doi=10.14419%2fijet.v7i3.15.17515&partnerID=40&md5=c379067c527d0d4fb76d6b64b690e199 | ||
520 | 3 | |a A fast internet-based technology such as web-driven and mobile application is the most popular usage of people nowadays. With the blink of the eye, the number of users is increasing tremendously every single second. So does the number of web-driven and mobile application. Thus, the number of a hacked website also increases daily. As the end user, we are likely to concern about the security breach that might occur. One of the threats that can happen at application layer users is web session hijacking. Generally, session hijacking is the attack occurs to impersonate the real resource to serve the pretended as the legitimate user. One of the ways for this threat to happen is by stealing the session identification number. This paper presents the session hijacking definition, the taxonomy and the attack that might occur also a various possible method to detect or prevent the attack in a various situation by previous researchers. In addition, this review hopes to bring some awareness to the end users about the threat that is likely to occur while accessing any resources over the Internet using website. © 2018 Authors. | |
700 | 1 | 0 | |a Ahmad, R.B. |e author |
700 | 1 | 0 | |a Elias, S.J. |e author |
700 | 1 | 0 | |a Ismail, N.N.S. |e author |
700 | 1 | 0 | |a Warip, M.N.M. |e author |
773 | |t International Journal of Engineering and Technology(UAE) |