A preliminary review on web session hijacking
A fast internet-based technology such as web-driven and mobile application is the most popular usage of people nowadays. With the blink of the eye, the number of users is increasing tremendously every single second. So does the number of web-driven and mobile application. Thus, the number of a hacke...
Published in: | International Journal of Engineering and Technology(UAE) |
---|---|
Main Author: | |
Format: | Article |
Language: | English |
Published: |
Science Publishing Corporation Inc
2018
|
Online Access: | https://www.scopus.com/inward/record.uri?eid=2-s2.0-85082355491&doi=10.14419%2fijet.v7i3.15.17515&partnerID=40&md5=c379067c527d0d4fb76d6b64b690e199 |
id |
2-s2.0-85082355491 |
---|---|
spelling |
2-s2.0-85082355491 Ismail N.N.S.; Warip M.N.M.; Elias S.J.; Ahmad R.B. A preliminary review on web session hijacking 2018 International Journal of Engineering and Technology(UAE) 7 3 10.14419/ijet.v7i3.15.17515 https://www.scopus.com/inward/record.uri?eid=2-s2.0-85082355491&doi=10.14419%2fijet.v7i3.15.17515&partnerID=40&md5=c379067c527d0d4fb76d6b64b690e199 A fast internet-based technology such as web-driven and mobile application is the most popular usage of people nowadays. With the blink of the eye, the number of users is increasing tremendously every single second. So does the number of web-driven and mobile application. Thus, the number of a hacked website also increases daily. As the end user, we are likely to concern about the security breach that might occur. One of the threats that can happen at application layer users is web session hijacking. Generally, session hijacking is the attack occurs to impersonate the real resource to serve the pretended as the legitimate user. One of the ways for this threat to happen is by stealing the session identification number. This paper presents the session hijacking definition, the taxonomy and the attack that might occur also a various possible method to detect or prevent the attack in a various situation by previous researchers. In addition, this review hopes to bring some awareness to the end users about the threat that is likely to occur while accessing any resources over the Internet using website. © 2018 Authors. Science Publishing Corporation Inc 2227524X English Article All Open Access; Bronze Open Access |
author |
Ismail N.N.S.; Warip M.N.M.; Elias S.J.; Ahmad R.B. |
spellingShingle |
Ismail N.N.S.; Warip M.N.M.; Elias S.J.; Ahmad R.B. A preliminary review on web session hijacking |
author_facet |
Ismail N.N.S.; Warip M.N.M.; Elias S.J.; Ahmad R.B. |
author_sort |
Ismail N.N.S.; Warip M.N.M.; Elias S.J.; Ahmad R.B. |
title |
A preliminary review on web session hijacking |
title_short |
A preliminary review on web session hijacking |
title_full |
A preliminary review on web session hijacking |
title_fullStr |
A preliminary review on web session hijacking |
title_full_unstemmed |
A preliminary review on web session hijacking |
title_sort |
A preliminary review on web session hijacking |
publishDate |
2018 |
container_title |
International Journal of Engineering and Technology(UAE) |
container_volume |
7 |
container_issue |
3 |
doi_str_mv |
10.14419/ijet.v7i3.15.17515 |
url |
https://www.scopus.com/inward/record.uri?eid=2-s2.0-85082355491&doi=10.14419%2fijet.v7i3.15.17515&partnerID=40&md5=c379067c527d0d4fb76d6b64b690e199 |
description |
A fast internet-based technology such as web-driven and mobile application is the most popular usage of people nowadays. With the blink of the eye, the number of users is increasing tremendously every single second. So does the number of web-driven and mobile application. Thus, the number of a hacked website also increases daily. As the end user, we are likely to concern about the security breach that might occur. One of the threats that can happen at application layer users is web session hijacking. Generally, session hijacking is the attack occurs to impersonate the real resource to serve the pretended as the legitimate user. One of the ways for this threat to happen is by stealing the session identification number. This paper presents the session hijacking definition, the taxonomy and the attack that might occur also a various possible method to detect or prevent the attack in a various situation by previous researchers. In addition, this review hopes to bring some awareness to the end users about the threat that is likely to occur while accessing any resources over the Internet using website. © 2018 Authors. |
publisher |
Science Publishing Corporation Inc |
issn |
2227524X |
language |
English |
format |
Article |
accesstype |
All Open Access; Bronze Open Access |
record_format |
scopus |
collection |
Scopus |
_version_ |
1809677686514122752 |