IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Taxonomy of Login Attacks in Web Applications and Their Security Techniques Using Behavioral Biometrics

Taxonomy of Login Attacks in Web Applications and Their Security Techniques Using Behavioral Biometrics
View Sample PDF
Author(s): Rizwan Ur Rahman (Maulana Azad National Institute of Technology, Bhopal, India)and Deepak Singh Tomar (Maulana Azad National Institute of Technology, Bhopal, India)
Copyright: 2020
Pages: 18
Source title: Modern Theories and Practices for Cyber Ethics and Security Compliance
Source Author(s)/Editor(s): Winfred Yaokumah (University of Ghana, Ghana), Muttukrishnan Rajarajan (City University of London, UK), Jamal-Deen Abdulai (University of Ghana, Ghana), Isaac Wiafe (University of Ghana, Ghana)and Ferdinand Apietu Katsriku (University of Ghana, Ghana)
DOI: 10.4018/978-1-7998-3149-5.ch008

Purchase

View Taxonomy of Login Attacks in Web Applications and Their Security Techniques Using Behavioral Biometrics on the publisher's website for pricing and purchasing information.

Abstract

Research into web application security is still in its initial phase. In spite of enhancements in web application development, large numbers of security issues remain unresolved. Login attacks are the most malevolent threats to the web application. Authentication is the method of confirming the stated identity of a user. Conventional authentication systems suffer from a weakness that can compromise the defense of the system. An example of such vulnerabilities is login attack. An attacker may exploit a pre-saved password or an authentication credential to log into web applications. An added problem with current authentication systems is that the authentication process is done only at the start of a session. Once the user is authenticated in the web application, the user's identity is assumed to remain the same during the lifetime of the session. This chapter examines the level login attacks that could be a threat to websites. The chapter provides a review of vulnerabilities, threats of login attacks associated with websites, and effective measures to counter them.

Related Content

Amdy Diene. © 2024. 12 pages.
B. Sam Paul, A. Anuradha. © 2024. 21 pages.
Muhsina, Zidan Kachhi. © 2024. 15 pages.
Burak Tomak, Ayşe Yılmaz Virlan. © 2024. 14 pages.
Allen Farina, Carolyn N. Stevenson. © 2024. 25 pages.
Sadhana Mishra. © 2024. 16 pages.
Catherine Hayes. © 2024. 17 pages.
Body Bottom