A Comprehensive Study of Web Application Security, Vulnerabilities and Modern Defence Mechanisms

Authors

  • Nishchay Bansal School of Computer Science Engineering and Technology, Bennett University, India Author
  • Garvit Kanojia School of Computer Science Engineering and Technology, Bennett University, India Author

Keywords:

Web Application Security, SQL Injection, Cross-Site Scripting, API Security, Cloud Misconfiguration, Broken Access Control, Deep Learning, Runtime Application Self-Protection, Web Application Firewall, DevSecOps, Zero Trust Architecture, Access-Control Testing, Cross-Channel Scripting

Abstract

Web applications are the backbone of the current digital ecosystem, supporting key services in e-commerce, banking, health care, education, cloud computing, and public administration. The continued rise of web-based platforms, with their shift towards distributed, API-driven, and microservices-oriented architectures, is significantly increasing the attack surface area. Traditional vulnerabilities, such as SQL Injection and Cross-Site Scripting, persist due to legacy code, improper validation, and insecure programming practices. However, in modern architectures, newer threats have come into the fore as major contributors to real-world breaches, such as Broken Access Control, Broken Object-Level Authorization, API-layer weaknesses, dependency-supply-chain vulnerabilities, cloud misconfigurations, and Cross-Channel Scripting. Academic research published in Springer, MDPI, IEEE, ACM, and arXiv shows significant advances in attack strategies and defence mechanisms. Some promising techniques include automated black-box access-control testing, deep-learning injection-attack detectors, semantic analysis engines, fuzzing-driven vulnerability discovery, and runtime protection systems (WAF, RASP). This study synthesizes the outcome of more than twenty recent scholarly works, offering a necessary holistic overview of the current stage of web application security. It examines how vulnerabilities have evolved over time, critically assesses state-of-the-art mechanisms for detection and mitigation, and identifies research challenges in cloud-native architectures, DevSecOps, and Zero Trust environments. The findings highlight that effective protection depends on layered and adaptive defences, supported by continuous automated testing, ML-powered anomaly detection, secure engineering methodologies, and robust runtime governance.

Downloads

Published

13-03-2026

How to Cite

Bansal, N. ., & Kanojia, G. . (2026). A Comprehensive Study of Web Application Security, Vulnerabilities and Modern Defence Mechanisms. DMPedia Lecture Notes in Multidisciplinary Research, IMPACT26, 1128-1142. https://digitalmanuscriptpedia.com/conferences/index.php/DMP-LNMR/article/view/114