State of the Art Survey on Session Hijacking

α
Parves Kamal
Parves Kamal
α St. Cloud State University St. Cloud State University

Send Message

To: Author

State of the Art Survey on Session Hijacking

Article Fingerprint

ReserarchID

CSTNWSEG0J7

State of the Art Survey on Session Hijacking Banner

AI TAKEAWAY

Connecting with the Eternal Ground
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

Abstract

With the advent of online banking more and more users are willing to make purchases online and doing so flourishes the online E-Business sector ever so more. Attackers are ever so vigilant and active now on web than ever to leverage the insecure web application and database that is out there on the internet to exploit. Today’s internet as we see are heavily integrated with sophisticated network whether it’s wired or wireless network. But the inherent compliancy to not integrating security while developing application leave it vulnerable to many attacks. One of the attack that has been prevalent now-a-days is: session hijacking.

References

11 Cites in Article
  1. Marco Morana (2004). Alexander, Michael Charles, (20 Nov. 1920–19 Dec. 2004), writer.
  2. A Whitaker,D Newman (2006). Penetration testing and network defense.
  3. Sans (2015). Unknown Title.
  4. Gunter Ollman (2004). Best Practice in Managing HTTP-Based Client Sessions.
  5. J Louis (2011). Detection of session hijacking.
  6. (2014). CEHv8. Ethical Hacking and Counter Measures.
  7. (2004). Computer Terms (Webopedia).
  8. D (2015). Do you need to encrypt session data?.
  9. Mark Curphey,David Endler,William Hau,Steve Taylor,Tim Smith,Alex Russell,Gene Mckenna,Richard Parke,Kevin Mclaughlin,Nigel Tranter,Amit Klien,Dennis Groves,Izhar By-Gad,Sverre Huseby,Martin Eizner,Martin Eizner,Roy Mcnamara (2002). A Guide to Building Secure Web Applications.
  10. (2015). IMPLEMENTING SECURE WEB SERVICES REQUIREMENTS USING PKI.
  11. Ariyan Zarei (2014). IMPROVE CAPTCHA'S SECURITY USING GAUSSIAN BLUR FILTER.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

How to Cite This Article

Parves Kamal. 2016. \u201cState of the Art Survey on Session Hijacking\u201d. Global Journal of Computer Science and Technology - E: Network, Web & Security GJCST-E Volume 16 (GJCST Volume 16 Issue E1): .

Download Citation

Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Keywords
Classification
C.2.1 C.2.4
Version of record

v1.2

Issue date

March 11, 2016

Language
en
Experiance in AR

Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.

Read in 3D

Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.

Article Matrices
Total Views: 7351
Total Downloads: 2093
2026 Trends
Related Research

Published Article

With the advent of online banking more and more users are willing to make purchases online and doing so flourishes the online E-Business sector ever so more. Attackers are ever so vigilant and active now on web than ever to leverage the insecure web application and database that is out there on the internet to exploit. Today’s internet as we see are heavily integrated with sophisticated network whether it’s wired or wireless network. But the inherent compliancy to not integrating security while developing application leave it vulnerable to many attacks. One of the attack that has been prevalent now-a-days is: session hijacking.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

State of the Art Survey on Session Hijacking

Parves Kamal
Parves Kamal St. Cloud State University

Research Journals