SlideShare a Scribd company logo
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME
441
A SURVEY OF CLOUD BASED SECURED WEB APPLICATION
1
Ahmed Hashim Mohammed, 2
Dr. Hanaa M. A. Salman, 3
Dr. Saad K. Majeed
Computer Science Department, University of Mustansiriya
Computer Science Department, University of Technology
Computer Science Department, University of Technology,
ABSTRACT
Cloud computing is a schema for allowingappropriate onrequest network access to a shared
pool of configurable computing resources, that can be rapidlydelivered and released by minimal
management effort or service provider.In cloud computing, you need a Web browser to access to
everything needed to run your business from the required applications, services, and infrastructure.
Many web developers are not security-aware. As a result, there exist many web sites on the
Internet that are vulnerable. More and more Web-based enterprise applications deal with sensitive
financial and medical data, which, if compromised, in addition to downtime can mean millions of
dollars in damages. It is crucial to protect these applications from malicious attacks. In this paper we
present a comprehensive survey of cloud based secure web application in the literature.The goal of
this paper is to present a comparison of various previous methods proposed in the literature and a
comparison between Python to other used programming languages.
Keywords: Web Application, Cloud computing, Security, Method Taxonomy, Programming
Language
1. INTRODUCTION
Cloud Computing is a paradigm in which information is always stored in servers on the
internet and cached temporarily on clients that include desktops, entertainment centers, table
computers, notebooks, wall computers, hand-held, etc.”. These services are generally divided into
three types: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-
Service (SaaS). Cloud computing model advances several web applications as of its elasticity nature.
This form of computing increases the efficiency of computing anddecreases operating cost. Web
applications involve of several different and interacting technologies, these connections between
different technologies can cause vast security problems.Today’s combat zone for both ethical and
unethical hackers is the web. Rapid growth of web sites and web applications gives way to deliver
complex business applications through the web. As the web dependency increases, so do the web
hacking activities. Web applications are normally written in scripting languages like JavaScript, PHP
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING &
TECHNOLOGY (IJCET)
ISSN 0976 – 6367(Print)
ISSN 0976 – 6375(Online)
Volume 4, Issue 4, July-August (2013), pp. 441-448
© IAEME: www.iaeme.com/ijcet.asp
Journal Impact Factor (2013): 6.1302 (Calculated by GISI)
www.jifactor.com
IJCET
© I A E M E
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME
442
embedded in HTML allowing connectivity to the databases, retrieving data and putting them in the
WWW site, As many as 70% of websites have vulnerabilities that could lead to the theft of sensitive
corporate data such as credit card information and customer lists, Accessible 24/7 from anywhere
in the world, insecure web applications provide easy access to backend corporate databases and
also allow hackers to perform illegal activities using the compromised site [1].
Cloud Web Application Security (CWAS) crawls website and automatically analyzes web
applications to discover security holes in web applications that an attacker would likely abuse to gain
illicit access to your systems and data. It looks for multiple vulnerabilities including SQL injection,
Cross Site Scripting, Broken Authentication and Session Management, Insecure Direct Object
References and Cross-Site Request Forgery.
CWAS doesn't just let see how website is vulnerable. It also consider an important tool for
web developers because provides concise reports for each weakness identified and can be used to
increase the security of the web application being tested where web applications need to be fixed;
Reporting was found to be sufficient. The reports are clean, easy to read.
In this paper we present a comprehensive survey of cloud-based Web application in the
literature.The aim of this paper is to provide a comparative study between the various previous
proposed methods in the literature, and compared between Python and other programming languages
used. This paper is organized as follows: Section 2 introduces the related works. Section 3 presents
Comparison Python to other languages, conclusions and future works are presented in section 4.
2. RELATED WORK
In this section we introduced a briefly comparison between the related work as shown in table
(1), according to the attack, algorithm, language, technique model, analysis study, and testes case no
web, for more information see,
[2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,3
7,38,39,40,41.42.43.44.45.46.47.48.49.50.51.52.53].
Table 1: Comparison of related works
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME
443
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME
444
3. COMPARING PYTHON TO OTHER LANGUAGES
In this section we introduced a briefly comparison for the used programming language, as
shown in Table (2), between Python,PHP, and RUBY according to Version, Purpose, Creator And
Year Release, Influenced By, Site Built Using It, Usability, and Ease Of Learning. This comparison
concentrates on language issues only. In practice, the choice of a programming language is often
dictated by other realworld constraints such as cost, availability, training, and prior investment, or
even emotional attachment. Since these aspects are highly variable, it seems a waste of time to
consider them much for this comparison.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME
445
Table 2: Compare Python to other languages
CONCLUSIONS
There is a demand need, to presents a solution that allows users to test their Website for
vulnerabilities, and conduct quick assessments entirely in the cloud by works as a black box, scan
for vulnerability alsotests for web applications and all the security test cases, and to obtain reliable
results of those tests. In this paper we present two tables one for comparison of the previous works
and the other for comparison Python to the other used programming language.
PHP RUBY PYTHON
Current
Version
PHP: 5.3.8 AUGUST 23,
2011
RUBY: 1.9.3
OCTOBER 31, 2011
python 3.2.2
September 4,2011
Purpose Php was designed for
web development to
produce dynamic web
pages
Ruby design to make
programming fun and
flexible for the
programmer
Python was design to
emphasize
productivity and
code readability
Creator
And Year
Release
1995 RASMUS
LERDORF
1995 YUKIHIRO
“MATZ”
MATSUMOTO
1991 GUIDO VAN
ROSSUM
Influenced
By
C/TCL/PERL/JAVA/C++ ADA/C++/CLU/
DYLAN/EIFFEL/
LISP/PERL/PYTHON
ABC/
ALGOL68/
C/C++/ICON/
JAVA/LISP/PERL
Site Built
Using It
WIKIPEDIA
UDEMY
FACEBOOK
TWITTER
HULU
GROUPON
YOUTUBE/GOOGLE
Usability PHP FOLLOWS A
Classic approach and is
extensively documented
Programmers describe
ruby code as elegant,
powerful and
expressive.
It is highly usable
because
of its principle of
least
astonishment
,enforced to
minimize for users
Python uses strict
indentation
enforcements .python
is arguably the most
readable programming
language
Ease Of
Learning
Php is easy to learn for
former c programmers
Ruby is better for
programmer who
already knows a
language or two
Python is great for
beginners ,often
recommended by
programmers due to
the simplicity of its
syntax
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME
446
REFERENCES
1. M. Auxilia and D. Tamilselvan, “Anomaly Detection Using Negative Security Model in Web
Application”, IEEE International Conference onComputer Information Systems and Industrial
Management Applications (CISIM) , pp. 481-486, 8-10 Oct. 2010.
2. Adam Barth, Collin Jackson, John C. Mitchell, “Robust Defenses for Cross-Site Request
Forgery”,Stanford University, 2008.
3. Dwen-Ren Tsai, Allen Y. Chang ,Peichi Liu, Hsuan-Chang Chen, “Optimum Tuning of
Defense Settings for Common Attacks on the Web applications”,IEEE,2009.
4. PuleiXiong, Liam Peyton, “A Model-Driven Penetration Test Framework for Web
Applications”, IEEE Eighth Annual International Conference on Privacy, Security and
Trust,2010.
5. Takanobu Watanabe,, Zixue Cheng, MizuoKansen, and Masayuki Hisada, “A New Security
Testing Method for Detecting Flash Vulnerabilities by Generating Test Patterns”,IEEE 13th
International Conference on Network-Based Information Systems,2010.
6. Jan-Min Chen,Chia-Lun Wu, “An Automated Vulnerability Scanner for Injection Attack Based
on Injection Point”,IEEE,2010.
7. DU Jing-Nong ,LU Yan-Sheng, “An Effect Evaluation Model for Vulnerability Testing of Web
Application”,IEEE,Second International Conference on Networks Security, Wireless
Communications and Trusted Computing,2010
8. Rihong Wang, Ying Xu, Ying Xiang, “Research and Realization of WEB Security auto-Testing
Tool Based on AHP”,IEEE,2010.
9. Jason Bau, ElieBursztein, Divij Gupta, John Mitchell, “State of the Art Automated Black-Box
Web Application Vulnerability Testing”,IEEE Symposium on Security and Privacy,2010.
10. José Fonseca,Marco Vieira, Henrique Madeira, “The Web Attacker Perspective – A Field
Study”,IEEE 21st International Symposium on Software Reliability Engineering, 2010.
11. SushilaMadan ,SupriyaMadan, “Security Standards Perspective to Fortify Web Database
Applications From Code Injection Attacks”,IEEE International Conference on Intelligent
Systems, Modeling and Simulation,2010.
12. XuRuzhi ,Guojian, Deng Liwu, “A Database Security Gateway to the Detection of SQL
Attacks”,IEEE 3rd International Conference on Advanced Computer Theory and Engineering
,2010
13. LijiuZh an g , Qin g Gu , Sh u sh e n Pen g , Xian g Ch e n , Haig an g Z h a o , Dao x u Ch en,
“A Web Application Vulnerabilities Detection Tool Using Characteristics of Web
Forms”,IEEE Fifth International Conference on Software Engineering Advances,2010
14. Ivano Alessandro Elia ,José Fonseca, Marco Vieira, “Comparing SQL Injection Detection
Tools Using Attack Injection”,IEEE 10 21st International Symposium on Software Reliability
Engineering,2010
15. Xin Wang, Luhua Wang, Gengyu Wei, Dongmei Zhang, YixianYang, “HIDDEN WEB
CRWLING FOR SQL INJECTION”,IEEE Proceedings of IC-BNMT,2010
16. Carlisle Adams, Jean-Pierre Levac and François Prevost, ”Lightweight protection against brute
force login”,Crown Eighth Annual International Conference on Privacy, Security and
Trust,2010
17. Helen Kapodistria, Sarandis Mitropoulos, Christos Douligeris, “An Advanced Web Attack
Detection And Prevention Tool”,Emerald Information Management & Computer Security,2011
18. Aileen G. Bacudio, 1Xiaohong Yuan, 2Bei-Tseng Bill Chu, 1Monique Jones, “AN
OVERVIEW OF PENETRATION TESTING”,International Journal of Network Security & Its
Applications (IJNSA),2011
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME
447
19. BirhanuEshete, Adolfo Villafiorita, KomministWeldemariam, “Early Detection of Security
Misconfiguration Vulnerabilities in Web Applications”,IEEE Sixth International Conference on
Availability, Reliability and Security,2011
20. Dominic Letarte, Franc¸ois Gauthier and Ettore Merlo, ”Security Model Evolution of PHP
Web Applications”,Fourth IEEE International Conference on Software Testing, Verification
and Validation,2011
21. Boris Rozenberg,YaronGonen, Ehud Gudes, and Nurit Gal-Oz , “Tracking End-Users in Web
Databases”,IEEE,2011
22. Ben Smith and Laurie Williams, “Using SQL Hotspots in a Prioritization Heuristic for
Detecting All Types of Web Application Vulnerabilities”,Fourth IEEE International
Conference on Software Testing, Verification 2011and Validation,2011
23. Andrea Avancini , M arianoCeccat o, “Security Testing of Web Applications a Search Based
Approach for Cross-Site Scripting Vulnerabilities”,2011 International Working Conference on
Source Code Analysis and Manipulation,2011
24. William G . J. H alfond 1 ,Shauvik Roy Choudhary and Alessandro Orso , “Improving
penetration testing through static and dynamic analysis”,John Wiley & S ons, L td.,2011
25. Lijo Thomas ,WeifengXu ,DianxiangXu, “Mutation Analysis of Magento for Evaluating Threat
Model-Based Security Testing”,35th IEEE Annual Computer Software and Applications
Conference Workshops,2011
26. Fang Yu,Muat h Alkhalaf,TevfikBult an, “Patching Vulnerabilities with Sanitization
Synthesis”,ICSE ’11,2011
27. Sven Türpe, ”Search-based Application Security Testing Towards a Structured Search
Space”,Fourth International Conference on Software Testing, Verification and Validation
Workshops,2011
28. FahadAlanazi,MohamedSarrab, “The History of Web Application Security Risks”,(IJCSIS)
International Journal of Computer Science and Information Security,2011
29. Xiaoh u Yang , Yixi Chen , Wen yu Zhang &Shuai Zhang, “Exploring injection prevention
technologies for security-aware distributed collaborative manufacturing on the Semantic
Web”,Springer Int J AdvManuf Technol,2011
30. Yi Yan, Su Zhengyuan, Dai Zucheng, “The Database Protection System Against SQL
Attacks”,IEEE,2011
31. Jeom-Goo Kim, “Injection Attack Detection using the Removal of SQL Query Attribute
Values”,IEEE,2011
32. Nikita Patel , Fahim Mohammed ,SantoshSoni ,”SQL Injection Attacks Techniques and
Protection Mechanisms”,International Journal on Computer Science and Engineering
(IJCSE),2011
33. P. Naresh Kumar et al, “The Image Level Tainting A New Approach For Preventing Sql
Injection Attacks”,International Journal of Engineering Science and Technology (IJEST),2011
34. RomilRawat ,Chandrapal Singh Dangi ,JagdishPatil, “Safe Guard Anomalies against SQL
Injection Attacks”,International Journal of Computer Applications (0975 – 8887),2011
35. IndraniBalasundaram ,E. Ramaraj, “An Authentication Mechanism to prevent SQL Injection
Attacks”,International Journal of Computer Applications (0975 – 8887),2011
36. AfonsoAraújoNeto, Marco Vieira, “Trustworthiness Benchmarking of Web Applications Using
Static Code Analysis”,Sixth International Conference on Availability, Reliability and
Security,2011
37. Yi Wang, Zhoujun Li ,Tao Guo, “Program Slicing Stored XSS Bugs in Web Application”,Fifth
IEEE International Conference on Theoretical Aspects of Software Engineering,2012
38. Vina M. Lomte 1 , Prof. D. R. Ingle 2, Prof. B. B. Meshram3, “A Secure Web Application E-
Tracking System”,International Journal of UbiComp (IJU), Vol.3, No.4,2012
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME
448
39. Ingle and B. B. Meshram, “Attacks On Web Based Software And
ModelingDefenseMechanisms”, International Journal of UbiComp (IJU), Vol.3, No.3,2012
40. SreenivasaRaoBasavala,Narendra Kumar ,AlokAgarrwal , “Finding Vulnerabilities in Rich
Internet Applications (FlexAS3) Using Static Techniques”MECS I.J. Modern Education and
Computer Science,2012
41. Katkar Anjali S., Kulkarni Raj B, “Web Vulnerability Detection and Security”,International
Journal of Soft Computing and Engineering (IJSCE),2012
42. Shakti Kundu, ”Web Testing Tool, Challenges and Methods”,IJCSI International Journal of
Computer Science Issues, Vol. 9, Issue 2, No 3,2012
43. Rajiv chopra1,Sushila Madan,Testing Websites by P3R2”,IJCSI International Journal of
Computer Science Issues, Vol. 9, Issue 4, No 2,2012
44. Yu-Chi Chu ng a ,Ming-Chuan Wu ,, Yih-Chang Chen, Wen-Kui Chang , “A Hot Query Bank
approach to improve detection performance against SQL injection attacks”,Elsevier computers
&securi ty,2012
45. InyongLeea,SoonkiJeongb,SangsooYeoc,JongsubMoond, “A novel method for SQL injecton
attack detection based on removing SQL query attribute values”,Elsevier
MathematicalandComputerModelling,2012
46. Neha Patwari1, ParvatiBhurani, “Framework of SQL Injection Attack”,IJASCSE Vol 1,2012
47. Atul S. Choudhary ,M. L. Dhore, “CIDT Detection of Malicious Code Injection Attacks on
Web Application”,International Journal of Computer Applications (0975 – 8887) Volume 52–
No.2,2012
48. AtefehTajpour , Suhaimi Ibrahim, Mohammad Sharifi , “Web Application Security by SQL
Injection DetectionTools”,IJCSI International Journal of Computer Science Issues, Vol. 9,
Issue 2, No 3,2012
49. RomilRawat, Shailendra Kumar Shrivastav, “SQL injection attack Detection using
SVM”,International Journal of Computer Applications (0975 – 8887) Volume 42– No.13,2012
50. Rupali D. Kombade, B. Meshram, “CSRF Vulnerabilities and Defensive Technique”s,
Computer Network and Information Security,2012
51. LwinKhinShar , HeeBengKuan Tan, “Automated removal of cross site scripting vulnerabilities
in web applications”,Elsevier ,Information and Software Technology,2012
52. Matthew Van Gundy, Hao Chen, “Noncespaces Using randomization to defeat cross-site
scripting attacks”, Elsevier, computers & security,2012
53. Abdul Razz,zaq, Ali Hur, H, Farooq Ahmad, Muddassar Masood , “Semantic Architecture for
Web application Security”, IJCSI International Journal of Computer Science Issues, Vol. 9,
Issue 2, No 3,2012.
54. Prof. S B Patil, Sachin Chavan, Dr. Preeti Patil and Prof. Sunita R Patil, “High Quality Design
to Enhance and Improve Performance of Large Scale Web Applications”, International Journal
of Computer Engineering & Technology (IJCET), Volume 3, Issue 1, 2012, pp. 198 - 205,
ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.
55. Sachin J.Pukale and M. K.Chavan, “A Review of Anomaly Based Intrusions Detection in
Multi-Tier Web Applications”, International Journal of Computer Engineering & Technology
(IJCET), Volume 3, Issue 3, 2012, pp. 233 - 244, ISSN Print: 0976 – 6367, ISSN Online:
0976 – 6375.
56. Dr. Hanaa M. A. Salman, “Information Hiding in Edge Location of Video using Amalgamate
FFT and Cubic Spline”, International Journal of Computer Engineering & Technology
(IJCET), Volume 4, Issue 4, 2013, pp. 240 - 247, ISSN Print: 0976 – 6367, ISSN Online:
0976 – 6375.

More Related Content

PDF
Research challenges and issues in web security
PDF
A new model for the selection of web development frameworks: application to P...
PDF
IRJET - Web Vulnerability Scanner
PDF
Routine Detection Of Web Application Defence Flaws
PDF
IRJET- Deep Web Searching (DWS)
PDF
A Review paper on Securing PHP based websites From Web Application Vulnerabil...
PDF
Analysis of XSS attack Mitigation techniques based on Platforms and Browsers
PPT
The unprecedented state of web insecurity
Research challenges and issues in web security
A new model for the selection of web development frameworks: application to P...
IRJET - Web Vulnerability Scanner
Routine Detection Of Web Application Defence Flaws
IRJET- Deep Web Searching (DWS)
A Review paper on Securing PHP based websites From Web Application Vulnerabil...
Analysis of XSS attack Mitigation techniques based on Platforms and Browsers
The unprecedented state of web insecurity

What's hot (20)

PDF
Security against Web Application Attacks Using Ontology Based Intrusion Detec...
PDF
Sqlas tool to detect and prevent attacks in php web applications
PDF
Rational Unified Treatment for Web Application Vulnerability Assessment
PDF
A26001006
PDF
PXpathV: Preventing XPath Injection Vulnerabilities in Web Applications
PDF
Turning the Tables on Cyber Attacks
PDF
Rapport X force 2014
PDF
Prevention of SQL Injection Attacks having XML Database
PDF
Web Applications Assessment Tools: Comparison and Discussion
PDF
Research Article On Web Application Security
PDF
Attacks on web services need to secure xml on web
PDF
Devoid Web Application From SQL Injection Attack
PDF
Contending Malware Threat using Hybrid Security Model
PDF
Standardizing Source Code Security Audits
PDF
Web vulnerabilities
PDF
Ijeee 51-57-preventing sql injection attacks in web application
DOCX
Digital Age Work and learning skills
PDF
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
PDF
Cloudifying threats-understanding-cloud-app-attacks-and-defenses joa-eng_0118
PDF
Detect sqli attacks in web apps using nvs
Security against Web Application Attacks Using Ontology Based Intrusion Detec...
Sqlas tool to detect and prevent attacks in php web applications
Rational Unified Treatment for Web Application Vulnerability Assessment
A26001006
PXpathV: Preventing XPath Injection Vulnerabilities in Web Applications
Turning the Tables on Cyber Attacks
Rapport X force 2014
Prevention of SQL Injection Attacks having XML Database
Web Applications Assessment Tools: Comparison and Discussion
Research Article On Web Application Security
Attacks on web services need to secure xml on web
Devoid Web Application From SQL Injection Attack
Contending Malware Threat using Hybrid Security Model
Standardizing Source Code Security Audits
Web vulnerabilities
Ijeee 51-57-preventing sql injection attacks in web application
Digital Age Work and learning skills
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
Cloudifying threats-understanding-cloud-app-attacks-and-defenses joa-eng_0118
Detect sqli attacks in web apps using nvs
Ad

Viewers also liked (8)

PPTX
PDF
Crn Tech Elite 250 List
PDF
Workshop patriotism workshop outline
PDF
A domain specific automatic text summarization using fuzzy logic
PDF
Politics of North Korean Refugees and Regional Security Implications - Englis...
PDF
Design and analysis of a frequency and pattern reconfigurable microstrip patc
PDF
Character recognition of kannada text in scene images using neural
PDF
Experimental investigation of neem and mixed pongamia coconut methyl esters a
Crn Tech Elite 250 List
Workshop patriotism workshop outline
A domain specific automatic text summarization using fuzzy logic
Politics of North Korean Refugees and Regional Security Implications - Englis...
Design and analysis of a frequency and pattern reconfigurable microstrip patc
Character recognition of kannada text in scene images using neural
Experimental investigation of neem and mixed pongamia coconut methyl esters a
Ad

Similar to A survey of cloud based secured web application (20)

PDF
Effective Information Flow Control as a Service: EIFCaaS
PDF
A Resiliency Framework For An Enterprise Cloud
PDF
Automated server-side model for recognition of security vulnerabilities in sc...
PDF
A Generic Open Source Framework for Auto Generation of Data Manipulation Comm...
PDF
D017372538
PDF
Pattern based software patent
PDF
Pattern based software patent
PDF
IRJET- Cross-Platform Supported E-Learning Mobile Application
PDF
Unveiling Advanced Persistence Techniques Through Application Shimming and Co...
PDF
Unveiling Advanced Persistence Techniques Through Application Shimming and Co...
PDF
13.2ResMilitary005651045-1058.pdf
PDF
A Web Services Based Framework For Uniform Integration Of Command-Line Bioinf...
PDF
IRJET- Underpinning the Impact of Web Application Security on Businesses ...
PDF
DEVELOPMENT OF BLAST EMAIL, CHATTING, AND SMS FEATURES ON EMPLOYEE DATA APPLI...
PDF
Ijaprr vol1-1-1-5dr tejinder
PDF
A secure cloud service deployment framework for DevOps
PDF
Security Requirements and Security Threats In Layers Cloud and Security Issue...
PDF
Ijaprr vol1-1-1-5dr tejinder
PDF
Open Source Software to Enhance the STEM Learning Environment
PPTX
Crime security.
Effective Information Flow Control as a Service: EIFCaaS
A Resiliency Framework For An Enterprise Cloud
Automated server-side model for recognition of security vulnerabilities in sc...
A Generic Open Source Framework for Auto Generation of Data Manipulation Comm...
D017372538
Pattern based software patent
Pattern based software patent
IRJET- Cross-Platform Supported E-Learning Mobile Application
Unveiling Advanced Persistence Techniques Through Application Shimming and Co...
Unveiling Advanced Persistence Techniques Through Application Shimming and Co...
13.2ResMilitary005651045-1058.pdf
A Web Services Based Framework For Uniform Integration Of Command-Line Bioinf...
IRJET- Underpinning the Impact of Web Application Security on Businesses ...
DEVELOPMENT OF BLAST EMAIL, CHATTING, AND SMS FEATURES ON EMPLOYEE DATA APPLI...
Ijaprr vol1-1-1-5dr tejinder
A secure cloud service deployment framework for DevOps
Security Requirements and Security Threats In Layers Cloud and Security Issue...
Ijaprr vol1-1-1-5dr tejinder
Open Source Software to Enhance the STEM Learning Environment
Crime security.

More from IAEME Publication (20)

PDF
IAEME_Publication_Call_for_Paper_September_2022.pdf
PDF
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
PDF
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
PDF
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
PDF
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
PDF
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
PDF
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
PDF
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
PDF
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
PDF
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
PDF
GANDHI ON NON-VIOLENT POLICE
PDF
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
PDF
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
PDF
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
PDF
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
PDF
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
PDF
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
PDF
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
PDF
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
PDF
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
IAEME_Publication_Call_for_Paper_September_2022.pdf
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
GANDHI ON NON-VIOLENT POLICE
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT

Recently uploaded (20)

PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Empathic Computing: Creating Shared Understanding
PDF
Machine learning based COVID-19 study performance prediction
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Encapsulation theory and applications.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
KodekX | Application Modernization Development
PDF
Approach and Philosophy of On baking technology
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
Encapsulation_ Review paper, used for researhc scholars
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Empathic Computing: Creating Shared Understanding
Machine learning based COVID-19 study performance prediction
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Building Integrated photovoltaic BIPV_UPV.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Encapsulation theory and applications.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
KodekX | Application Modernization Development
Approach and Philosophy of On baking technology
Diabetes mellitus diagnosis method based random forest with bat algorithm
NewMind AI Weekly Chronicles - August'25 Week I
MIND Revenue Release Quarter 2 2025 Press Release
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Dropbox Q2 2025 Financial Results & Investor Presentation
Digital-Transformation-Roadmap-for-Companies.pptx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Network Security Unit 5.pdf for BCA BBA.

A survey of cloud based secured web application

  • 1. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME 441 A SURVEY OF CLOUD BASED SECURED WEB APPLICATION 1 Ahmed Hashim Mohammed, 2 Dr. Hanaa M. A. Salman, 3 Dr. Saad K. Majeed Computer Science Department, University of Mustansiriya Computer Science Department, University of Technology Computer Science Department, University of Technology, ABSTRACT Cloud computing is a schema for allowingappropriate onrequest network access to a shared pool of configurable computing resources, that can be rapidlydelivered and released by minimal management effort or service provider.In cloud computing, you need a Web browser to access to everything needed to run your business from the required applications, services, and infrastructure. Many web developers are not security-aware. As a result, there exist many web sites on the Internet that are vulnerable. More and more Web-based enterprise applications deal with sensitive financial and medical data, which, if compromised, in addition to downtime can mean millions of dollars in damages. It is crucial to protect these applications from malicious attacks. In this paper we present a comprehensive survey of cloud based secure web application in the literature.The goal of this paper is to present a comparison of various previous methods proposed in the literature and a comparison between Python to other used programming languages. Keywords: Web Application, Cloud computing, Security, Method Taxonomy, Programming Language 1. INTRODUCTION Cloud Computing is a paradigm in which information is always stored in servers on the internet and cached temporarily on clients that include desktops, entertainment centers, table computers, notebooks, wall computers, hand-held, etc.”. These services are generally divided into three types: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a- Service (SaaS). Cloud computing model advances several web applications as of its elasticity nature. This form of computing increases the efficiency of computing anddecreases operating cost. Web applications involve of several different and interacting technologies, these connections between different technologies can cause vast security problems.Today’s combat zone for both ethical and unethical hackers is the web. Rapid growth of web sites and web applications gives way to deliver complex business applications through the web. As the web dependency increases, so do the web hacking activities. Web applications are normally written in scripting languages like JavaScript, PHP INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), pp. 441-448 © IAEME: www.iaeme.com/ijcet.asp Journal Impact Factor (2013): 6.1302 (Calculated by GISI) www.jifactor.com IJCET © I A E M E
  • 2. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME 442 embedded in HTML allowing connectivity to the databases, retrieving data and putting them in the WWW site, As many as 70% of websites have vulnerabilities that could lead to the theft of sensitive corporate data such as credit card information and customer lists, Accessible 24/7 from anywhere in the world, insecure web applications provide easy access to backend corporate databases and also allow hackers to perform illegal activities using the compromised site [1]. Cloud Web Application Security (CWAS) crawls website and automatically analyzes web applications to discover security holes in web applications that an attacker would likely abuse to gain illicit access to your systems and data. It looks for multiple vulnerabilities including SQL injection, Cross Site Scripting, Broken Authentication and Session Management, Insecure Direct Object References and Cross-Site Request Forgery. CWAS doesn't just let see how website is vulnerable. It also consider an important tool for web developers because provides concise reports for each weakness identified and can be used to increase the security of the web application being tested where web applications need to be fixed; Reporting was found to be sufficient. The reports are clean, easy to read. In this paper we present a comprehensive survey of cloud-based Web application in the literature.The aim of this paper is to provide a comparative study between the various previous proposed methods in the literature, and compared between Python and other programming languages used. This paper is organized as follows: Section 2 introduces the related works. Section 3 presents Comparison Python to other languages, conclusions and future works are presented in section 4. 2. RELATED WORK In this section we introduced a briefly comparison between the related work as shown in table (1), according to the attack, algorithm, language, technique model, analysis study, and testes case no web, for more information see, [2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,3 7,38,39,40,41.42.43.44.45.46.47.48.49.50.51.52.53]. Table 1: Comparison of related works
  • 3. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME 443
  • 4. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME 444 3. COMPARING PYTHON TO OTHER LANGUAGES In this section we introduced a briefly comparison for the used programming language, as shown in Table (2), between Python,PHP, and RUBY according to Version, Purpose, Creator And Year Release, Influenced By, Site Built Using It, Usability, and Ease Of Learning. This comparison concentrates on language issues only. In practice, the choice of a programming language is often dictated by other realworld constraints such as cost, availability, training, and prior investment, or even emotional attachment. Since these aspects are highly variable, it seems a waste of time to consider them much for this comparison.
  • 5. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME 445 Table 2: Compare Python to other languages CONCLUSIONS There is a demand need, to presents a solution that allows users to test their Website for vulnerabilities, and conduct quick assessments entirely in the cloud by works as a black box, scan for vulnerability alsotests for web applications and all the security test cases, and to obtain reliable results of those tests. In this paper we present two tables one for comparison of the previous works and the other for comparison Python to the other used programming language. PHP RUBY PYTHON Current Version PHP: 5.3.8 AUGUST 23, 2011 RUBY: 1.9.3 OCTOBER 31, 2011 python 3.2.2 September 4,2011 Purpose Php was designed for web development to produce dynamic web pages Ruby design to make programming fun and flexible for the programmer Python was design to emphasize productivity and code readability Creator And Year Release 1995 RASMUS LERDORF 1995 YUKIHIRO “MATZ” MATSUMOTO 1991 GUIDO VAN ROSSUM Influenced By C/TCL/PERL/JAVA/C++ ADA/C++/CLU/ DYLAN/EIFFEL/ LISP/PERL/PYTHON ABC/ ALGOL68/ C/C++/ICON/ JAVA/LISP/PERL Site Built Using It WIKIPEDIA UDEMY FACEBOOK TWITTER HULU GROUPON YOUTUBE/GOOGLE Usability PHP FOLLOWS A Classic approach and is extensively documented Programmers describe ruby code as elegant, powerful and expressive. It is highly usable because of its principle of least astonishment ,enforced to minimize for users Python uses strict indentation enforcements .python is arguably the most readable programming language Ease Of Learning Php is easy to learn for former c programmers Ruby is better for programmer who already knows a language or two Python is great for beginners ,often recommended by programmers due to the simplicity of its syntax
  • 6. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME 446 REFERENCES 1. M. Auxilia and D. Tamilselvan, “Anomaly Detection Using Negative Security Model in Web Application”, IEEE International Conference onComputer Information Systems and Industrial Management Applications (CISIM) , pp. 481-486, 8-10 Oct. 2010. 2. Adam Barth, Collin Jackson, John C. Mitchell, “Robust Defenses for Cross-Site Request Forgery”,Stanford University, 2008. 3. Dwen-Ren Tsai, Allen Y. Chang ,Peichi Liu, Hsuan-Chang Chen, “Optimum Tuning of Defense Settings for Common Attacks on the Web applications”,IEEE,2009. 4. PuleiXiong, Liam Peyton, “A Model-Driven Penetration Test Framework for Web Applications”, IEEE Eighth Annual International Conference on Privacy, Security and Trust,2010. 5. Takanobu Watanabe,, Zixue Cheng, MizuoKansen, and Masayuki Hisada, “A New Security Testing Method for Detecting Flash Vulnerabilities by Generating Test Patterns”,IEEE 13th International Conference on Network-Based Information Systems,2010. 6. Jan-Min Chen,Chia-Lun Wu, “An Automated Vulnerability Scanner for Injection Attack Based on Injection Point”,IEEE,2010. 7. DU Jing-Nong ,LU Yan-Sheng, “An Effect Evaluation Model for Vulnerability Testing of Web Application”,IEEE,Second International Conference on Networks Security, Wireless Communications and Trusted Computing,2010 8. Rihong Wang, Ying Xu, Ying Xiang, “Research and Realization of WEB Security auto-Testing Tool Based on AHP”,IEEE,2010. 9. Jason Bau, ElieBursztein, Divij Gupta, John Mitchell, “State of the Art Automated Black-Box Web Application Vulnerability Testing”,IEEE Symposium on Security and Privacy,2010. 10. José Fonseca,Marco Vieira, Henrique Madeira, “The Web Attacker Perspective – A Field Study”,IEEE 21st International Symposium on Software Reliability Engineering, 2010. 11. SushilaMadan ,SupriyaMadan, “Security Standards Perspective to Fortify Web Database Applications From Code Injection Attacks”,IEEE International Conference on Intelligent Systems, Modeling and Simulation,2010. 12. XuRuzhi ,Guojian, Deng Liwu, “A Database Security Gateway to the Detection of SQL Attacks”,IEEE 3rd International Conference on Advanced Computer Theory and Engineering ,2010 13. LijiuZh an g , Qin g Gu , Sh u sh e n Pen g , Xian g Ch e n , Haig an g Z h a o , Dao x u Ch en, “A Web Application Vulnerabilities Detection Tool Using Characteristics of Web Forms”,IEEE Fifth International Conference on Software Engineering Advances,2010 14. Ivano Alessandro Elia ,José Fonseca, Marco Vieira, “Comparing SQL Injection Detection Tools Using Attack Injection”,IEEE 10 21st International Symposium on Software Reliability Engineering,2010 15. Xin Wang, Luhua Wang, Gengyu Wei, Dongmei Zhang, YixianYang, “HIDDEN WEB CRWLING FOR SQL INJECTION”,IEEE Proceedings of IC-BNMT,2010 16. Carlisle Adams, Jean-Pierre Levac and François Prevost, ”Lightweight protection against brute force login”,Crown Eighth Annual International Conference on Privacy, Security and Trust,2010 17. Helen Kapodistria, Sarandis Mitropoulos, Christos Douligeris, “An Advanced Web Attack Detection And Prevention Tool”,Emerald Information Management & Computer Security,2011 18. Aileen G. Bacudio, 1Xiaohong Yuan, 2Bei-Tseng Bill Chu, 1Monique Jones, “AN OVERVIEW OF PENETRATION TESTING”,International Journal of Network Security & Its Applications (IJNSA),2011
  • 7. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME 447 19. BirhanuEshete, Adolfo Villafiorita, KomministWeldemariam, “Early Detection of Security Misconfiguration Vulnerabilities in Web Applications”,IEEE Sixth International Conference on Availability, Reliability and Security,2011 20. Dominic Letarte, Franc¸ois Gauthier and Ettore Merlo, ”Security Model Evolution of PHP Web Applications”,Fourth IEEE International Conference on Software Testing, Verification and Validation,2011 21. Boris Rozenberg,YaronGonen, Ehud Gudes, and Nurit Gal-Oz , “Tracking End-Users in Web Databases”,IEEE,2011 22. Ben Smith and Laurie Williams, “Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities”,Fourth IEEE International Conference on Software Testing, Verification 2011and Validation,2011 23. Andrea Avancini , M arianoCeccat o, “Security Testing of Web Applications a Search Based Approach for Cross-Site Scripting Vulnerabilities”,2011 International Working Conference on Source Code Analysis and Manipulation,2011 24. William G . J. H alfond 1 ,Shauvik Roy Choudhary and Alessandro Orso , “Improving penetration testing through static and dynamic analysis”,John Wiley & S ons, L td.,2011 25. Lijo Thomas ,WeifengXu ,DianxiangXu, “Mutation Analysis of Magento for Evaluating Threat Model-Based Security Testing”,35th IEEE Annual Computer Software and Applications Conference Workshops,2011 26. Fang Yu,Muat h Alkhalaf,TevfikBult an, “Patching Vulnerabilities with Sanitization Synthesis”,ICSE ’11,2011 27. Sven Türpe, ”Search-based Application Security Testing Towards a Structured Search Space”,Fourth International Conference on Software Testing, Verification and Validation Workshops,2011 28. FahadAlanazi,MohamedSarrab, “The History of Web Application Security Risks”,(IJCSIS) International Journal of Computer Science and Information Security,2011 29. Xiaoh u Yang , Yixi Chen , Wen yu Zhang &Shuai Zhang, “Exploring injection prevention technologies for security-aware distributed collaborative manufacturing on the Semantic Web”,Springer Int J AdvManuf Technol,2011 30. Yi Yan, Su Zhengyuan, Dai Zucheng, “The Database Protection System Against SQL Attacks”,IEEE,2011 31. Jeom-Goo Kim, “Injection Attack Detection using the Removal of SQL Query Attribute Values”,IEEE,2011 32. Nikita Patel , Fahim Mohammed ,SantoshSoni ,”SQL Injection Attacks Techniques and Protection Mechanisms”,International Journal on Computer Science and Engineering (IJCSE),2011 33. P. Naresh Kumar et al, “The Image Level Tainting A New Approach For Preventing Sql Injection Attacks”,International Journal of Engineering Science and Technology (IJEST),2011 34. RomilRawat ,Chandrapal Singh Dangi ,JagdishPatil, “Safe Guard Anomalies against SQL Injection Attacks”,International Journal of Computer Applications (0975 – 8887),2011 35. IndraniBalasundaram ,E. Ramaraj, “An Authentication Mechanism to prevent SQL Injection Attacks”,International Journal of Computer Applications (0975 – 8887),2011 36. AfonsoAraújoNeto, Marco Vieira, “Trustworthiness Benchmarking of Web Applications Using Static Code Analysis”,Sixth International Conference on Availability, Reliability and Security,2011 37. Yi Wang, Zhoujun Li ,Tao Guo, “Program Slicing Stored XSS Bugs in Web Application”,Fifth IEEE International Conference on Theoretical Aspects of Software Engineering,2012 38. Vina M. Lomte 1 , Prof. D. R. Ingle 2, Prof. B. B. Meshram3, “A Secure Web Application E- Tracking System”,International Journal of UbiComp (IJU), Vol.3, No.4,2012
  • 8. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME 448 39. Ingle and B. B. Meshram, “Attacks On Web Based Software And ModelingDefenseMechanisms”, International Journal of UbiComp (IJU), Vol.3, No.3,2012 40. SreenivasaRaoBasavala,Narendra Kumar ,AlokAgarrwal , “Finding Vulnerabilities in Rich Internet Applications (FlexAS3) Using Static Techniques”MECS I.J. Modern Education and Computer Science,2012 41. Katkar Anjali S., Kulkarni Raj B, “Web Vulnerability Detection and Security”,International Journal of Soft Computing and Engineering (IJSCE),2012 42. Shakti Kundu, ”Web Testing Tool, Challenges and Methods”,IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 2, No 3,2012 43. Rajiv chopra1,Sushila Madan,Testing Websites by P3R2”,IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 4, No 2,2012 44. Yu-Chi Chu ng a ,Ming-Chuan Wu ,, Yih-Chang Chen, Wen-Kui Chang , “A Hot Query Bank approach to improve detection performance against SQL injection attacks”,Elsevier computers &securi ty,2012 45. InyongLeea,SoonkiJeongb,SangsooYeoc,JongsubMoond, “A novel method for SQL injecton attack detection based on removing SQL query attribute values”,Elsevier MathematicalandComputerModelling,2012 46. Neha Patwari1, ParvatiBhurani, “Framework of SQL Injection Attack”,IJASCSE Vol 1,2012 47. Atul S. Choudhary ,M. L. Dhore, “CIDT Detection of Malicious Code Injection Attacks on Web Application”,International Journal of Computer Applications (0975 – 8887) Volume 52– No.2,2012 48. AtefehTajpour , Suhaimi Ibrahim, Mohammad Sharifi , “Web Application Security by SQL Injection DetectionTools”,IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 2, No 3,2012 49. RomilRawat, Shailendra Kumar Shrivastav, “SQL injection attack Detection using SVM”,International Journal of Computer Applications (0975 – 8887) Volume 42– No.13,2012 50. Rupali D. Kombade, B. Meshram, “CSRF Vulnerabilities and Defensive Technique”s, Computer Network and Information Security,2012 51. LwinKhinShar , HeeBengKuan Tan, “Automated removal of cross site scripting vulnerabilities in web applications”,Elsevier ,Information and Software Technology,2012 52. Matthew Van Gundy, Hao Chen, “Noncespaces Using randomization to defeat cross-site scripting attacks”, Elsevier, computers & security,2012 53. Abdul Razz,zaq, Ali Hur, H, Farooq Ahmad, Muddassar Masood , “Semantic Architecture for Web application Security”, IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 2, No 3,2012. 54. Prof. S B Patil, Sachin Chavan, Dr. Preeti Patil and Prof. Sunita R Patil, “High Quality Design to Enhance and Improve Performance of Large Scale Web Applications”, International Journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 1, 2012, pp. 198 - 205, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. 55. Sachin J.Pukale and M. K.Chavan, “A Review of Anomaly Based Intrusions Detection in Multi-Tier Web Applications”, International Journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 3, 2012, pp. 233 - 244, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. 56. Dr. Hanaa M. A. Salman, “Information Hiding in Edge Location of Video using Amalgamate FFT and Cubic Spline”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 4, 2013, pp. 240 - 247, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.