Cookies and Sessions: A Study of what they are, how they can be Stolen and a Discussion on Security

Abstract

Cookies and sessions are common and vital to a person’s experience on the Internet. The use of cookies was originally used to overcome a memoryless protocol while using a tiny amount of the system’s resources. Cookies make for a cohesive experience when shopping online, enjoying customized content, and even receiving personalized advertisements when casually surfing the Web. However, by design, cookies lack security. Our research begins by giving a background of cookies and sessions. It then introduces what session hijacking is, and a lab was constructed to test and show how a cookie can be stolen and replayed to gain authenticated access. Finally, the paper presents various countermeasures for common attacks and tools checking for authentication cookies vulnerabilities.

Authors and Affiliations

Young B. Choi, Yin L. Loo, Kenneth LaCroix

Keywords

Related Articles

Efficient Page Collection Scheme for QLC NAND Flash Memory using Cache

Recently, semiconductor companies such as Samsung, Hynix, and Micron, have focused on quad-level cell (QLC) NAND flash memory chips, because of the increase in the capacity of storage systems. The QLC NAND flash memory c...

Classification of People who Suffer Schizophrenia and Healthy People by EEG Signals using Deep Learning

More than 21 million people worldwide suffer from schizophrenia. This serious mental disorder exposes people to stigmatization, discrimination, and violation of their human rights. Different works on classification and d...

Multicast Routing with Load Balancing in Multi-Channel Multi-Radio Wireless Mesh Networks

By an increasing expansion of multimedia services and group communication applications, the need for multicast routing to respond to multicast requests in wireless mesh networks is felt more than before. One of the main...

Intelligent Scheduling of Bag-of-Tasks Applications in the Cloud

The need of efficient provision resources in cloud computing is imperative in meeting the performance requirements. The design of any resource allocation algorithm is dependent on the type of workload. BoT (Bag-of-Task...

Texture Analysis on Image Motif of Endek Bali using K-Nearest Neighbor Classification Method

Endek fabric Bali is one form of craft woven fabric of Balinese society. Endek fabric has a variety of motifs or designs, a lot of people does not know that Endek have the type based on the design motif. In this research...

Download PDF file
  • EP ID EP448665
  • DOI 10.14569/IJACSA.2019.0100104
  • Views 77
  • Downloads 0

How To Cite

Young B. Choi, Yin L. Loo, Kenneth LaCroix (2019). Cookies and Sessions: A Study of what they are, how they can be Stolen and a Discussion on Security. International Journal of Advanced Computer Science & Applications, 10(1), 32-36. https://europub.co.uk./articles/-A-448665