ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Web Request Level Protection of Cyber Applications against Threats and Attacks

Journal: International Journal of Scientific Engineering and Science (Vol.2, No. 1)

Publication Date:

Authors : ;

Page : 52-56

Keywords : Espionage; Blocker; Cybercrime; RSA; and Cyberattack;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

One of the risks of cyber technology is the threat that comes along its benefits: by the very nature of the opportunities it presents it becomes a target for cyberattacks, industrial espionage, and cybercrime. Therefore, this paper intended to advance its protection as a paramount priority by devising aggressive techniques that can prevent and militate against its threats and attacks. This is achieved by designing defence architecture with security check point to detect the web-request-level attacks by employing request blocker and Rivest, Shamir, and Adleman (RSA) algorithm. The results in this paper showed that the cyber application which is made up of web controls the access over its functions by checking session variables indicating the user privilege before its restrictive functions can be executed. If the application is not at the required state, the web will redirect the user to the login page, authorization page or an error page. Sensitive and security information about the activities of cyber threats was revealed and prevented.

Last modified: 2018-03-10 16:54:54