A Critical Analysis on Different Vulnerabilities in Web Application

Authors

  • Narendra M Kandoi Research Scholar, Computer Science & Engineering, S.G.B. Amravati University Amravati, Maharashtra, India
  • Dr. Vilas M Thakare Research Guide, S.G.B. Amravati University Amravati, Maharashtra, India

Keywords:

Web Application, Aspect Oriented Programming, Mashup, UML Diagrams, Vulnerability Detection, Security.

Abstract

Web application developers start by modeling the functionalities of the application modules and its security
necessities using dedicated UML diagrams. Web mashups comprise of a hosting page, for the most part called the
integrator, and various outsider segments regularly called gadgets, gadgets, blocks, or pipes. Aspect Oriented
programming (AOP) makes it conceivable to segregate this and different issues that were already indistinguishable into
modules. An instance of a mashup-based application is a site that merges the information on open flats from one source
with the representation usefulness of another source to make an easy to-use delineate. In this paper we develop an
efficient aspect oriented programming aided information flow based access control model and automatic classifier based
vulnerability prediction model to enhance mashup security. We developed a vulnerable online application, to test the
proposed approach. First we tried all sorts of SQL Injection and XSS attacks to see how the application behaved.

Published

2017-12-25

How to Cite

Narendra M Kandoi, & Dr. Vilas M Thakare. (2017). A Critical Analysis on Different Vulnerabilities in Web Application. International Journal of Advance Engineering and Research Development (IJAERD), 4(12), 582–587. Retrieved from https://ijaerd.org/index.php/IJAERD/article/view/4483