• Login
    View Item 
    •   Repository Home
    • Theses and Dissertations
    • Master's - Theses
    • School of Computing and Informatics
    • View Item
    •   Repository Home
    • Theses and Dissertations
    • Master's - Theses
    • School of Computing and Informatics
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    A Stateful Firewall Packet Analysis Framework for Mitigating Session Fixation Attacks

    Thumbnail
    View/Open
    Full text (2.052Mb)
    Date
    2025
    Author
    Kailanya, Eunice
    Metadata
    Show full item record
    Abstract
    Protecting the networks against web attacks has become increasingly critical. As network attacks continue to evolve in complexity and sophistication, stateful firewall solutions have proven to be insufficient in defending against session fixation attacks. Session fixation attacks pose a significant threat to web security by exploiting vulnerabilities in session management to hijack authenticated user sessions. Existing stateful firewall models can filter attacks such as denial of service, distributed denial of service, man-in-the-middle, malware, ransomware and spamming. However, they are unable to filter session fixation attacks due to their filtering mechanisms. The aim of this study was to develop a stateful firewall packet analysis model that operates in network layer to detect and filter session fixation attack. By maintaining state information across network sessions, the model analyzed packet sequences and patterns to identify anomalies indicative of session fixation attempts. Gradient booster classifier algorithm was incorporated into the model to enhance accuracy in analyzing the packet. Virtual machine simulation experiment was performed to evaluate the accuracy of the model using Cross-Site Scripting (XSS) datasets vulnerable to session fixation attacks alongside normal user traffic. The model detection rate, false positive and false negative metrics was measured to assess the accuracy of the model. The experimental results demonstrated that the model effectively detected and mitigated session fixation attacks by analyzing session parameters and maintaining session state consistency. Experimental evaluation validated the high model detection accuracy level of 98.5 % with minimal false positives. By tracking the state of each session and analyzing packet-level data the model is capable of detecting suspicious patterns associated with session fixation attempts. The adoption and integration of the model into the network security framework not only strengthens protection at the application layer but also reduces the risk of session hijacking
    URI
    http://repository.must.ac.ke/handle/123456789/1596
    Collections
    • School of Computing and Informatics [6]

    MUST Repository copyright © 2002-2016  MUST Repository
    Contact Us | Send Feedback
    Theme by 
    MUST Repository
     

     

    Browse

    All of the RepositoryCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

    My Account

    LoginRegister

    MUST Repository copyright © 2002-2016  MUST Repository
    Contact Us | Send Feedback
    Theme by 
    MUST Repository