Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Session Hijacking

Handbook of Research on Securing Cloud-Based Databases with Biometric Applications
It is a form of attack in which an attacker seizes the valid session token from the network and thus acquiring the access to the confidential resources of the web application. This attack can result in man-in-middle-attacks etc.
Published in Chapter:
BDS: Browser Dependent XSS Sanitizer
Shashank Gupta (National Institute of Technology Kurukshtra, India) and B. B. Gupta (National Institute of Technology Kurukshtra, India)
DOI: 10.4018/978-1-4666-6559-0.ch008
Cross-Site Scripting (XSS) attack is a vulnerability on the client-side browser that is caused by the improper sanitization of the user input embedded in the Web pages. Researchers in the past had proposed various types of defensive strategies, vulnerability scanners, etc., but still XSS flaws remains in the Web applications due to inadequate understanding and implementation of various defensive tools and strategies. Therefore, in this chapter, the authors propose a security model called Browser Dependent XSS Sanitizer (BDS) on the client-side Web browser for eliminating the effect of XSS vulnerability. Various earlier client-side solutions degrade the performance on the Web browser side. But in this chapter, the authors use a three-step approach to bypass the XSS attack without degrading much of the user's Web browsing experience. While auditing the experiments, this approach is capable of preventing the XSS attacks on various modern Web browsers.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
An Efficient Approach for Sending Identification Bit With the Help of Blowfish-RC6
The web session control mechanism, normally handled by a session token, is the target of attacks known as “session hijacking.
Full Text Chapter Download: US $37.50 Add to Cart
Auditing Defense against XSS Worms in Online Social Network-Based Web Applications
It occurs when attacker exploits the Web application session management vulnerability to take control of some user’s credentials to control the corresponding session. It may lead to man-in-middle attack.
Full Text Chapter Download: US $37.50 Add to Cart
Online Phishing and Solutions
Using a spoofed IP address or Man-in-the Middle techniques to impersonate a legitimate host to eavesdrop or redirect network communication.
Full Text Chapter Download: US $37.50 Add to Cart
Hacking: Evolution, Conceptualization, and the Perpetrators
It consists of the exploitation of a computer session, also called a session key. Allowing to gain unauthorized access to information or services on a computer system ( Baitha & Vinod, 2018 ).
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR