A Proposal: Web attacks and Webmaster’s Education Co-Relation
Author
Roopesh Reddy Sadashiva Reddy ,Hima Bindu Sadashiva Reddy
Abstract
There
is a lot of research done so far. Each of the studies provides detailed
information about theWeb attacks that occurred, and the precautions taken and
implemented. However, we still find that
the Web attacksexisteven all the solutions, research and security policy are provided.
None of the studies explain why this problem persists even after multiple
solutions have been suggested. There is no evidence as to why a permanent
solution has not been discovered so far. At least one solution so that similar attacks do not repeat. Take for
example the antivirus we use on our PC,
it's very simple to understand. If we do not use this antivirus, our PC will be
attacked by deadly viruses that can damage our computer. This is why anyone who
owns a PC should definitely have anti-virus software installed. Similarly, developing
software to resist Web attacks will be a very good solution to solve the
problem of Webattacks. Development of this particular software was only
possible after the discovery of possible attacks related to
script attacks on multiple Websites. To find the gap, the proposed study should
be done according to the details mentioned in the methodology section. Both
dependent and independent variable as Web attacks and Web master has been
proposed. Hypothesis for this proposal is defined based on these variables.
Keywords
Web master,Web applications, Webattacks, Webattack
DOI : https://doi.org/10.55248/gengpi.2022.3.7.42
Full Text:
Download Paper PDF
References
[1] Hydara, I, Bakar Md Sultan, A, Zulzalil, H,
Admodisastro, N (2014). Current state of research on Web (XSS) – A systematic
literature review. Department of Software Engineering and Information System,
170 –186, 10.1016/j.infsof.2014.07.010
[2] Venkat Narayana Rao, T, Tejaswini, V, Preethi, K
(2012) DEFENDING AGAINST WebATTACKS AND Web, Journal of Global Research in
Computer Science, Volume 3, No. 5, 60 – 64
[3] Garcia-alfaro, J, Navarro-Arribas2, G. (2007).
Prevention of Web Attacks on Current Web Applications. In Meersman,
R.O.B.E.R.T. & Tari, Z.A.H.I.R (Eds), On the Move to Meaningful Internet
Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS (pp. 1770-1784).
[4] Dr. Shanmugam1, J, Dr. Ponnavaikko2, M (2008) Web-Latest
developments and solutions: A survey, Int. J. Open Problems Compt. Math., Vol.
1, No. 2, 102 - 121
[5] Whitehatseccom. (2013). Whitehatseccom. Retrieved 14
December, 2015, from https://www.whitehatsec.com/assets/WPstatsReport_052013.pdf
[6] Athanasopoulos, E , Krithinakis, E, Markatos, E,
(2010) Hunting Web Attacks in the Network, Institute of Computer Science
Foundation for Research and Technology, 1-8
[7] Amit Singh, A, Sathappan, S (2014) A Survey on WebWeb-attack
and Defense Mechanisms, International Journal of Advanced Research in Computer
Science and Software Engineering Research Paper ,Volume 4, Issue 3 , 1160 –
1164
[8] Vogt, P, Nentwich, F, Jovanovic, N, Kirda, E,
Kruegel, C and Vigna, G (2007) Web Prevention with Dynamic Data Tainting and
Static Analysis, Secure Systems Lab Technical University Vienna, 1-12
[9] NSA, September 2011 Protect Against Web (Web) Attacks
, Information Assurance Mission as National Security Agency, 1-2
[10] Kaur, G (2014) Study of Web Attacks and Their
Countermeasures, International Journal of Computer Applications Technology and
Research, Volume 3, Issue 10, 604 – 609.
[11] SHALINI1, S, USHA2, S (2011) Prevention Of Web
Attacks (Web) On Web Applications In The Client Side, International Journal of
Computer Science Issues, Vol. 8, Issue 4, No 1, 650 - 654
[12] Practical Research: Planning and Design, P. D. Leedy
& J. E. Ormrod, 11th (2015)
[13] Whitehatseccom. (2014). Whitehatseccom. Retrieved 14
December, 2015, from http://info.whitehatsec.com/rs/whitehatsecurity/images/statsreport2014-20140410.pdf
[14] Whitehatseccom. (2015). Whitehatseccom. Retrieved 14
December, 2015, from https://info.whitehatsec.com/rs/whitehatsecurity/images/2015-Stats-Report.pdf
[15] Rodriguez, K. M., Reddy, R. S., Barreiros, A. Q.,
& Zehtab, M. (2012, June). Optimizing Program Operations: Creating a Web-Based
Application to Assign and Monitor Patient Outcomes, Educator Productivity and
Service Reimbursement. In DIABETES (Vol. 61, pp. A631-A631). 1701 N BEAUREGARD
ST, ALEXANDRIA, VA 22311-1717 USA: AMER DIABETES ASSOC.
[16] Kwon, D., Reddy, R., & Reis, I. M. (2021).
ABCMETAapp: R shiny application for simulation-based estimation of mean and
standard deviation for meta-analysis via approximate Bayesian computation.
Research synthesis methods, 12(6), 842–848. https://doi.org/10.1002/jrsm.1505
[17] Reddy, H. B. S., Reddy, R. R. S., Jonnalagadda, R.,
Singh, P., & Gogineni, A. (2022). Usability Evaluation of an Unpopular
Restaurant Recommender Web Application Zomato. Asian Journal of Research in
Computer Science, 13(4), 12-33.
[18] Reddy, H. B. S., Reddy, R. R. S., Jonnalagadda, R.,
Singh, P., & Gogineni, A. (2022). Analysis of the Unexplored Security
Issues Common to All Types of NoSQL Databases. Asian Journal of Research in
Computer Science, 14(1), 1-12.
[19] Singh, P., Williams, K., Jonnalagadda, R., Gogineni,
A., &; Reddy, R. R. (2022). International students: What’s missing and what
matters. Open Journal of Social Sciences, 10(02),
[20] Jonnalagadda, R., Singh, P., Gogineni, A., Reddy, R.
R., & Reddy, H. B. (2022). Developing, implementing and evaluating training
for online graduate teaching assistants based on Addie Model. Asian Journal of
Education and Social Studies, 1-10.
[21] Sarmiento, J. M., Gogineni, A., Bernstein, J. N.,
Lee, C., Lineen, E. B., Pust, G. D., & Byers, P. M. (2020).Alcohol/illicit
substance use in fatal motorcycle crashes. Journal of surgical research, 256,
243-250.
[22] Brown, M. E., Rizzuto, T., & Singh, P. (2019).
Strategic compatibility, collaboration and collective impact for community
change. Leadership & Organization Development Journal.
[23] Sprague-Jones, J., Singh, P., Rousseau, M., Counts,
J., & Firman, C. (2020). The Protective Factors Survey: Establishing
validity and reliability of a self-report measure of protective factors against
child maltreatment. Children and Youth Services Review, 111, 104868
[24] Reddy Sadashiva
Reddy, R., Reis, I. M., & Kwon, D. (2020). ABCMETAapp: R Shiny Application for Simulation-based
Estimation of Mean and Standard Deviation for Meta-analysis via Approximate
Bayesian Computation (ABC). arXiv e-prints, arXiv-2004.
Share your valuable work from Social Media Buttons