Session Hijacking-Protection

Session hijacking isn't new to computer security. The term is most commonly used to describe the process of a TCP connection taken over by a sequence prediction attack. In such an attack, the attacker gains control of an already established TCP connection. When applied to Web application security, session hijacking refers to the takeover of a Web application session.

HTTP is a stateless protocol with its origins in information dissemination. Clients request a particular resource, which eventually is delivered by the server hosting that particular resource. The goal of the World Wide Web in its early days was to provide a uniform medium of information dissemination via HTTP and rendering of the information via HTML. The information could also be cross-referenced by using hyperlinks. As time went by, servers were developed with the ability to handle dynamically generated content and execute programs that generated HTML. Soon enough, the need for interactivity increased. Because of its ability to handle text and graphics, the browser took the place of a universal client. Small-scale applications began to be hosted on Web servers with the use of CGI scripting, which extended the ability of universal participation to all Internet users who had a browser. No longer was an underlying operating system an issue. So long as you had a browser, you could use the application. Application development went from a central mainframe–terminal based concept to the client-server model, and back to the central Web server–browser based concept again.

These days, Web application servers host complex applications, such as an entire office productivity suite. Microsoft Outlook for the Web is an example of delivering a fully featured e-mail client over a Web browser. Lotus Domino servers provide a Web interface that lets users perform more or less the same tasks as can be performed via a Lotus Notes client.

All multiuser applications embody the concept of a user session. Each user interacts with the application via a separate user session. The application keeps track of all who are currently using the application via sessions. This capability is essential for segregating user activity.

Despite rapid changes in Web server technology, the HTTP protocol remained the same. Currently, HTTP 1.1 is still the most widely used HTTP protocol. The greatest hurdle in designing and hosting Web-based applications is to get around the statelessness of HTTP. There are no standards governing how a Web-based application should provide its own state-maintaining mechanism over HTTP. Developers tackle state preservation in different ways. There are poor and good ways of approaching this problem, although both approaches result in a workable application. The poor ways of implementing session states lead to attacks such as session hijacking.

Related Posts:
  • website domain names Web Hosting - UK Website Hosting and Domain Names - LCN.com Buy reliable UK web hosting packages, powerful server solutions, and great value domain names from LCN.com. UK based technical support on hand 7 days a week. Domai… Read More
  • purchase domains Domain Names | Register Your Domain Name In India - GoDaddy in.godaddy.com/ GoDaddy makes registering Domain Names fast, simple, and affordable. Find out why so many business owners chose GoDaddy to be their … Read More
  • EMAIL BULK SERVICE Email marketing is a powerful channel but also one that presents many questions and difficulties. In their 2012 Email marketing benchmark, marketingsherpa surveyed 2,735 companies and asked them to rank the significance o… Read More
  • How to make a website with traffic How to make a website with traffic 1. Keep it Simple - Make sure the design is simple, clear and pleasing to the eyes. Don't overcrowd it. 2. Multiple Pages - If possible, divide the website into several pages and access … Read More
  • Web and Database Port Listing Table A-1. HTTP/1.1 Methods and Field Definitions Web and Database Port Listing Port Server 66 Oracle SQL*Net 80 Hyper Text Transfer Protocol (HTTP) 81 HTTP Proxy, Alternativ… Read More
  • Server-Based Anti-Spam (adsbygoogle = window.adsbygoogle || []).push({}); The single biggest hurdle when hosting your own e-mail addresses is filtering spam. If you have an account with Gmail, Yahoo! Mail, or one of the other many free e-… Read More
  • Securing FTP-How  Securing FTP You can make your FTP uploads and downloads more secure in one of two ways: through Secure File Transfer Protocol SFTP or Transport Layer Security TLS. SFTPSFTP is a more secure way of uploading and downlo… Read More
  • voip test VoIP Speed, Bandwidth, and Jitter Test | WhichVoIP.com Free VoIP speed test tool that performs a bandwidth test, jitter test, and a packet loss  test on your Internet connection to determine VoIP compatibility. Intern… Read More
  • hosting server Web Hosting free web hosting-free hosting 12:15 Web hosting Awardspace is a free web hosting provider with no ads, paid web hosting, vpshosting, reseller hosting, domain nam… Read More
  • How to make Web filenames How to make Web filenames When you tell a Windows program and hosting to save your file as a text document, it saves just the actual text characters that you see onscreen, without any formatting commands. The Windows progra… Read More
  • Web Hosting or DNS It is common sense that if a web site is down it cannot get spidered, but we’ll state it regardless:When a site is down, it cannot get spidered.And when your domain’s designated DNS is down, yoursite cannot get spidered ei… Read More
  • What is Internet domain? Internet Domains  In database design and management, the set of valid values for a given attribute. For example, the domain for the attribute AREA-CODE might be the list of all valid three-digit numeric telephone are… Read More
  • Session Hijacking-Protection Session hijacking isn't new to computer security. The term is most commonly used to describe the process of a TCP connection taken over by a sequence prediction attack. In such an attack, the attacker gains control of … Read More
  • Top website design tips website programmers should be to make the website experience as easy and pleasant for the user as possible. Clearly, well-designed pages with easily navigable layout are central to this, but they're not the whole story.… Read More
  • What Is IP Filtering? IP filtering is simply a mechanism that decides which types of IP packets will be processed normally and which will be dropped or rejected. By dropped we mean that the packet is deleted and completely ignored, as if it h… Read More