Open Access   Article Go Back

Evaluation of India’s Most Visited Websites in Aspects of Security & Structure

Irshad Alam1 , Satwinder Singh2 , Gurpreet Kaur3

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-5 , Page no. 985-991, May-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i5.985991

Online published on May 31, 2019

Copyright © Irshad Alam, Satwinder Singh, Gurpreet Kaur . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Irshad Alam, Satwinder Singh, Gurpreet Kaur, “Evaluation of India’s Most Visited Websites in Aspects of Security & Structure,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.985-991, 2019.

MLA Style Citation: Irshad Alam, Satwinder Singh, Gurpreet Kaur "Evaluation of India’s Most Visited Websites in Aspects of Security & Structure." International Journal of Computer Sciences and Engineering 7.5 (2019): 985-991.

APA Style Citation: Irshad Alam, Satwinder Singh, Gurpreet Kaur, (2019). Evaluation of India’s Most Visited Websites in Aspects of Security & Structure. International Journal of Computer Sciences and Engineering, 7(5), 985-991.

BibTex Style Citation:
@article{Alam_2019,
author = {Irshad Alam, Satwinder Singh, Gurpreet Kaur},
title = {Evaluation of India’s Most Visited Websites in Aspects of Security & Structure},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {7},
Issue = {5},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {985-991},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4350},
doi = {https://doi.org/10.26438/ijcse/v7i5.985991}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i5.985991}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4350
TI - Evaluation of India’s Most Visited Websites in Aspects of Security & Structure
T2 - International Journal of Computer Sciences and Engineering
AU - Irshad Alam, Satwinder Singh, Gurpreet Kaur
PY - 2019
DA - 2019/05/31
PB - IJCSE, Indore, INDIA
SP - 985-991
IS - 5
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
324 397 downloads 215 downloads
  
  
           

Abstract

Web applications play a significant role in today’s digital age. Their uses in our lives have become indispensable. It has made web applications a favorite target for attackers and has increased web security risk. This study focuses on finding structural aspects and vulnerabilities present in India’s 50 websites which were categorized into five categories of 10 most visited sites, i.e., e-commerce, news, entertainment, education, and other scanned as an ordinary user to consider safety assessment of these websites. The knowledge about these sites, such as technologies used and infrastructure they have, the vulnerabilities they possess, has been investigated using penetration tests in this study. As a result of this research, web server information and operating system information from 86% to 66% respectively of the reviewed websites are identified. Medium and low degree vulnerabilities have been present in all scanned websites. Some of them even have High vulnerabilities also. With the vulnerability screening tests, their degree of vulnerabilities graph revealed, and information about the most identified weaknesses was given.

Key-Words / Index Term

Web Applications, Penetration Testing, Penetration Testing Tools, Weakness Analysis, Web Security

References

[1] P. Fung, Mitigations of web applications security risks, hong kong: Ph.D dissertation, 2014.
[2] N. Kochare, S. Chalurkar, B.B. Meshram,, “Web Application Vulnerabilities Detection Techniques Survey,” IJCSNS International Journal of Computer Science and Network Security, vol. 13, no. 6, p. 7177, 2013.
[3] C. Polat, Penetration Tests and Security Solutions for Corporate Networks, Dokuz Eylul University Izmir, 2016, pp. 1-182.
[4] Ruse, M.E, Model Checking Techniques for Vulnerability Analysis of Web Applications, Iowa: Iowa State University, 2013.
[5] C. Huang, J. Liu, Y. Fang, Z. Zuo, “A study on Web Security incidents in China by Analyzing Vulnerability disclosure Platforms,” Computer and Security, vol. 58, pp. 47-62, 2016.
[6] D. Stiawan, M. Idris, A. Abdullah, F. Aljaber and R. Budiarto, “Cyber-Attack Penetration Test and Vulnerability Analysis,” International Journal of Online Engineering, vol. 13, no. 1, pp. 125-132, 2017.
[7] S. Sandhya, S. Purkayastha, E. Joshua, A. Deep, “Assessment of website security by penetration testing using Wireshark,” in 4th International Conference on Advanced Computing and Communication Systems (ICACCS), Coimbatore, India, 2017.
[8] S. Nixon, Y. Haile, “Analyzing vulnerabilities on WLAN security protocols and enhance its security by using pseudo random MAC address,” International Journal of Emerging Trends & Technology in Computer Science (IJETTCS’2017), 2017.
[9] J.H. Bullee, L. Montoya, W. Pieters, M. Junger, P. Hartel, “On the anatomy of social engineering attacks—A literature-based dissection of successful attacks,” Journal of investigative psychology and offender profiling, vol. 15, no. 1, pp. 20-45, 2017.
[10] Y. Wu, G. Feng, R.Y.K Fung, “Comparison of information security decisions under different security and business environments,” Journal of the Operational Research Society, vol. 69, no. 5, pp. 747-761, 2018.
[11] P. Cisar, S.M. Maravi, I. Furstner, “Security Assessment with Kali Linux,” Banki Kozlemenyekl, vol. 1, no. 1, pp. 49-52, 2018.