Algoritmos de seguridad para aplicaciones web: un mapeo sistemático
Palabras clave:
algoritmos; confidencialidad; integridad; disponibilidad; seguridad webResumen
En la actualidad, el número de usuarios en la red ha ido incrementándose de manera progresiva; como consecuencia, las amenazas y vulnerabilidades a las que se enfrentan los sistemas han aumentado considerablemente, poniendo en riesgo la confidencialidad, integridad y disponibilidad de los datos que se manejan. La implementación de algoritmos de protección en el desarrollo de sitios web es crucial para garantizar la seguridad e integridad de la información y hacer frente a las posibles amenazas informáticas. Se utilizará el método deductivo, la observación e investigación exploratoria para el análisis de la información primaria. Como resultado se presenta un mapeo sistemático sobre los algoritmos de seguridad más empleados en aplicaciones web. El impacto de esta investigación podría tener un efecto directo o indirecto para todas las aplicaciones web, que presenten problemas de seguridad.
Palabras clave: algoritmos; confidencialidad; integridad; disponibilidad; seguridad web.
Abstract
At present the number of network users has been progressively increasing; as a consequence, the treats and vulnerabilities faced by the system have also increased considerably. Putting the confidentiality, integrity and availability of the handled data at risk. The implementation of algorithms protection in the development of websites is crucial to guarantee the security and integrity of information and to face possible computer treats. The deductive method, observation and exploratory research will be used for the analysis of primary information. As a result, a systematic mapping of the most used security algorithms in web applications is presented. The impact of this research could have a direct or indirect effect for all web applications, which present security problems.
Keywords: Algorithms, confidentiality, integrity, availability, web security.
Información del manuscrito:
Fecha de recepción: 16 de marzo de 2023.
Fecha de aceptación: 02 de junio de 2023.
Fecha de publicación: 20 de junio de 2023.
Citas
Abhishek, G., & Asha, A. (2020). Development of “RSA” Encryption Algorithm for Secure Data Transmission. Research Journal of Computer and Information Technology Sciences, 8(1), 9-12, e-ISSN: 2320-6527. https://doi.org/http://www.isca.me/COM_IT_SCI/Archive/v8/i1/2.ISCA-RJCITS-2019-009.pdf
Abood, O., & Guirguis, S. (2018). A Survey on Cryptography Algorithms. International Journal of Scientific and Research Publications, 8(7), 495-516, e-ISSN: 2250-3153. https://doi.org/http://dx.doi.org/10.29322/IJSRP.8.7.2018.p7978
Ajitha, P. (2021). Responsive Design in Web Development with Security Using Optimization Algorithms. International Journal of Research in Engineering and Science, 9(1), 16-22, e-ISSN: 2320-9364. https://doi.org/https://www.ijres.org/papers/Volume-9/Issue-1/2/C0901021622.pdf
Avelino, M. (2021). Buenos algoritmos con malas implementaciones. Revista Española de Ciberseguridad, Privacidad y Digitalización, 19-24. https://doi.org/http://www.recsi2020.udl.cat/static/site/files/Avelino-XVI-RECSI.pdf
Chavan, S., & Tamane, S. (2020). Enhancement in Cloud Security for Web Application Attacks. IEEE, 91-95. https://doi.org/10.1109/ICSIDEMPC49020.2020.9299629
Chen, C., Zhong, J., & Chen, W. (2021). Machine Learning-based web security intrusion detection system. IEEE, 173-177. https://doi.org/10.1109/IAECST54258.2021.9695557
Gitanjali, A., Kadlag, & Dhotre, P. S. (2020). Detection and prevention of data modification attack based on MD5 algorithm. International Journal of Current Engineering and Technology, 7(8), 1005-1008, e-ISSN: 2277-4106. https://doi.org/https://inpressco.com/wp-content/uploads/2021/02/Paper2101005-1008.pdf
Gondaliya, J., Savani , S., Dhaduvai, V. S., & Hossain, G. (2018). Hybrid Security RSA Algorithm in Application of Web Service. IEEE, 149-152. https://doi.org/10.1109/ICDIS.2018.00032
Naidu, S., Krishna, R., & Kumari, G. (2019). A Trusted New Method for Authentication and Security for Web Applications in Cloud Using RSA Algorithm. International Journal of Emerging Technologies and Innovative Research, 6(4), 1-8, e-ISSN: 2349-5162. https://doi.org/https://ssrn.com/abstract=3708131
Pittalia, P. (2019). A Comparative Study of Hash Algorithms in Cryptography. International Journal of Computer Science and Mobile Computing, 8(6), 147-152, e-ISSN: 2320-088X. https://doi.org/https://ijcsmc.com/docs/papers/June2019/V8I6201928.pdf
Sa’idu , S., Taneja, P., & Kalta, S. (2022). A Comparative Analysis of Cryptographic Algorithms: AES & RSA and Hybrid Algorithmfor Encryption and Decryption. International Journal of Innovative Science and Research Technology, 7, 1725-1732, e-ISSN: 2456-2165. https://doi.org/https://ijisrt.com/assets/upload/files/IJISRT22AUG773.pdf
Sholikhatin, S., Kuncoro, A., Munawaroh, A., & Gilang , S. (2022). Comparative Study of RSA Asymmetric Algorithm and AES Algorithm for Data Security. Edu Komputika Journal, 9(1), 60-67, e-ISSN: 2252-6811. https://doi.org/https://doi.org/10.15294/edukomputika.v9i1.57389
Simarmata, J., Limbong, T., Misalina , G., Damanik, R., Padli Nasution, M. I., Halim Hasugian, A., . . . Sinambela, M. (2018). Implementation of AES Algorithm for Information Security of Web-Based Application. International Journal of Engineering & Technology, 7(4), 318-320. https://doi.org/https://doi.org/10.14419/ijet.v7i3.4.20124
Singh, P., Tripathi, V., Gangodkar, D., & Bordolo, D. (2021). A DES, AES, DSS, and RSA-Based Security System for Protecting Sensitive Information During Communication and Providing Fast, Reliable File Identification. Webology, 18(5), 3218-3227, e-ISSN: 1735-188X. https://doi.org/https://www.webology.org/data-cms/articles/20221014114355amPaper%2057.pdf
Turnip, T. N., Aruan, H., Siagian, A. L., & Siagian, L. (2022). Web Browser Extension Development of Structured Query Language Injection Vulnerability Detection Using Long Short-Term Memory Algorithm. IEEE, 1-5. doi: https://doi.org/10.1109/ICOSNIKOM56551.2022.10034905
Publicado
Cómo citar
Número
Sección
Licencia
Derechos de autor 2023 Revista Científica INGENIAR: Ingeniería, Tecnología e Investigación. ISSN: 2737-6249.

Esta obra está bajo una licencia internacional Creative Commons Atribución-NoComercial-CompartirIgual 4.0.