A Proposal: Web attacks and Webmaster’s Education Co-Relation

Author

Roopesh Reddy Sadashiva Reddy ,Hima Bindu Sadashiva Reddy


Abstract

There is a lot of research done so far. Each of the studies provides detailed information about theWeb attacks that occurred, and the precautions taken and implemented. However, we  still find that the Web attacksexisteven all the solutions, research and security policy are provided. None of the studies explain why this problem persists even after multiple solutions have been suggested. There is no evidence as to why a permanent solution has not been discovered so far. At least one solution so that  similar attacks do not repeat. Take for example the antivirus  we use on our PC, it's very simple to understand. If we do not use this antivirus, our PC will be attacked by deadly viruses that can damage our computer. This is why anyone who owns a PC should definitely have anti-virus software installed. Similarly, developing software to resist Web attacks will be a very good solution to solve the problem of Webattacks. Development of this particular software was only possible  after  the discovery of possible attacks related to script attacks on multiple Websites. To find the gap, the proposed study should be done according to the details mentioned in the methodology section. Both dependent and independent variable as Web attacks and Web master has been proposed. Hypothesis for this proposal is defined based on these variables.


Keywords

Web master,Web applications, Webattacks, Webattack


DOI : https://doi.org/10.55248/gengpi.2022.3.7.42


Full Text:

Download Paper PDF


References


[1] Hydara, I, Bakar Md Sultan, A, Zulzalil, H, Admodisastro, N (2014). Current state of research on Web (XSS) – A systematic literature review. Department of Software Engineering and Information System, 170 –186, 10.1016/j.infsof.2014.07.010

 

[2] Venkat Narayana Rao, T, Tejaswini, V, Preethi, K (2012) DEFENDING AGAINST WebATTACKS AND Web, Journal of Global Research in Computer Science, Volume 3, No. 5, 60 – 64

 

[3] Garcia-alfaro, J, Navarro-Arribas2, G. (2007). Prevention of Web Attacks on Current Web Applications. In Meersman, R.O.B.E.R.T. & Tari, Z.A.H.I.R (Eds), On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS (pp. 1770-1784).

 

[4] Dr. Shanmugam1, J, Dr. Ponnavaikko2, M (2008) Web-Latest developments and solutions: A survey, Int. J. Open Problems Compt. Math., Vol. 1, No. 2, 102 - 121

 

[5] Whitehatseccom. (2013). Whitehatseccom. Retrieved 14 December, 2015, from https://www.whitehatsec.com/assets/WPstatsReport_052013.pdf

 

[6] Athanasopoulos, E , Krithinakis, E, Markatos, E, (2010) Hunting Web Attacks in the Network, Institute of Computer Science Foundation for Research and Technology, 1-8

 

[7] Amit Singh, A, Sathappan, S (2014) A Survey on WebWeb-attack and Defense Mechanisms, International Journal of Advanced Research in Computer Science and Software Engineering Research Paper ,Volume 4, Issue 3 , 1160 – 1164

 

[8] Vogt, P, Nentwich, F, Jovanovic, N, Kirda, E, Kruegel, C and Vigna, G (2007) Web Prevention with Dynamic Data Tainting and Static Analysis, Secure Systems Lab Technical University Vienna, 1-12

 

[9] NSA, September 2011 Protect Against Web (Web) Attacks , Information Assurance Mission as National Security Agency, 1-2

 

[10] Kaur, G (2014) Study of Web Attacks and Their Countermeasures, International Journal of Computer Applications Technology and Research, Volume 3, Issue 10, 604 – 609.

 

[11] SHALINI1, S, USHA2, S (2011) Prevention Of Web Attacks (Web) On Web Applications In The Client Side, International Journal of Computer Science Issues, Vol. 8, Issue 4, No 1, 650 - 654

 

[12] Practical Research: Planning and Design, P. D. Leedy & J. E. Ormrod, 11th (2015)

 

[13] Whitehatseccom. (2014). Whitehatseccom. Retrieved 14 December, 2015, from http://info.whitehatsec.com/rs/whitehatsecurity/images/statsreport2014-20140410.pdf

 

[14] Whitehatseccom. (2015). Whitehatseccom. Retrieved 14 December, 2015, from https://info.whitehatsec.com/rs/whitehatsecurity/images/2015-Stats-Report.pdf

 

[15] Rodriguez, K. M., Reddy, R. S., Barreiros, A. Q., & Zehtab, M. (2012, June). Optimizing Program Operations: Creating a Web-Based Application to Assign and Monitor Patient Outcomes, Educator Productivity and Service Reimbursement. In DIABETES (Vol. 61, pp. A631-A631). 1701 N BEAUREGARD ST, ALEXANDRIA, VA 22311-1717 USA: AMER DIABETES ASSOC.

 

[16] Kwon, D., Reddy, R., & Reis, I. M. (2021). ABCMETAapp: R shiny application for simulation-based estimation of mean and standard deviation for meta-analysis via approximate Bayesian computation. Research synthesis methods, 12(6), 842–848. https://doi.org/10.1002/jrsm.1505

 

[17] Reddy, H. B. S., Reddy, R. R. S., Jonnalagadda, R., Singh, P., & Gogineni, A. (2022). Usability Evaluation of an Unpopular Restaurant Recommender Web Application Zomato. Asian Journal of Research in Computer Science, 13(4), 12-33.

 

[18] Reddy, H. B. S., Reddy, R. R. S., Jonnalagadda, R., Singh, P., & Gogineni, A. (2022). Analysis of the Unexplored Security Issues Common to All Types of NoSQL Databases. Asian Journal of Research in Computer Science, 14(1), 1-12.

 

[19] Singh, P., Williams, K., Jonnalagadda, R., Gogineni, A., &; Reddy, R. R. (2022). International students: What’s missing and what matters. Open Journal of Social Sciences, 10(02),

 

[20] Jonnalagadda, R., Singh, P., Gogineni, A., Reddy, R. R., & Reddy, H. B. (2022). Developing, implementing and evaluating training for online graduate teaching assistants based on Addie Model. Asian Journal of Education and Social Studies, 1-10.

 

[21] Sarmiento, J. M., Gogineni, A., Bernstein, J. N., Lee, C., Lineen, E. B., Pust, G. D., & Byers, P. M. (2020).Alcohol/illicit substance use in fatal motorcycle crashes. Journal of surgical research, 256, 243-250.

 

[22] Brown, M. E., Rizzuto, T., & Singh, P. (2019). Strategic compatibility, collaboration and collective impact for community change. Leadership & Organization Development Journal.

 

[23] Sprague-Jones, J., Singh, P., Rousseau, M., Counts, J., & Firman, C. (2020). The Protective Factors Survey: Establishing validity and reliability of a self-report measure of protective factors against child maltreatment. Children and Youth Services Review, 111, 104868

 

[24] Reddy Sadashiva Reddy, R., Reis, I. M., & Kwon, D. (2020). ABCMETAapp: R Shiny Application for Simulation-based Estimation of Mean and Standard Deviation for Meta-analysis via Approximate Bayesian Computation (ABC). arXiv e-prints, arXiv-2004.

Share your valuable work from Social Media Buttons