DSpace Repository

Design and Development Automated Detection of Session Fixation Vulnerability in Web Application

Show simple item record

dc.contributor.author Anik, Shantanu Dey
dc.date.accessioned 2022-12-28T07:28:08Z
dc.date.available 2022-12-28T07:28:08Z
dc.date.issued 22-11-08
dc.identifier.uri http://dspace.daffodilvarsity.edu.bd:8080/handle/123456789/9287
dc.description.abstract Session Fixation is one of the most serious broken authentication vulnerabilities for a web application, and it is now listed as Identification and Authentication Failures in OWASP's Top 10 Web Application Vulnerabilities for 2021. A Session fixation attack is actually performed on a web application that has a lack of proper session management. Secure session management implementation calls for a thorough, all-encompassing strategy and should be incorporated as an integral module during the web applications' design and development lifecycle. A successful session fixation attack can be harmful to the user and also to the application. Some of the solutions and detection models are already proposed but require extensions from existing tools. This paper explores session fixation, which is a unique instance of a session management issue. The major goal of this paper is to propose a design for the automation tool for the detection of session fixation vulnerability based on user agent. Keywords: Session Fixation, Session Management, OWASP, Automation tool, User agent en_US
dc.language.iso en_US en_US
dc.publisher Daffodil International University en_US
dc.subject Web applications en_US
dc.subject Vulnerabilities en_US
dc.subject Automation system en_US
dc.title Design and Development Automated Detection of Session Fixation Vulnerability in Web Application en_US
dc.type Other en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Browse

My Account