“…During the software development process, majority of the security attacks are possible due to implementation flaws such as improper input validation [105], improper authentication and authorization mechanisms [106], improper session management [107], and other vulnerabilities such as Session-Id vulnerable or theft, incorrectly implemented logouts, lock failed attempts per browser session, peer-user session restriction, and log replay feature. All these mishaps compromise the application's intended functionality [11], [48], [108]. However, spoofing [109], tampering, repudiation [110], information disclosure, denial of services [111], elevation of privilege and failure to restrict uniform resource locator (URL) access are some of the most common security issues that hamper the process of secure authorization and authentication [76], [112], [113], [114], [115], [116], [117].…”