Preview

Cross Site Scripting

Good Essays
Open Document
Open Document
923 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cross Site Scripting
A Survey Paper on
Methods for Robust Detection and Prevention of XSS Attacks

Abstract- This survey aims to list out the major XSS vulnerabilities exposed in the web environment and various preventive measures currently in use against them. We will also try to compare them and establish the best out of them and also to set up a base to visualize a better method in the upcoming future.
Index terms -XSS (Cross Site Scripting), Vulnerabilities, Prevention Methods, Existing Technologies, Web Application, Web Application Security

I. Introduction
A web application is an application software that is hosted on web and runs on a web browser. Web application security is a branch of information security that deals specifically with security of websites, web applications and web services.
Cross-site scripting (XSS) is an attack against web applications in which scripting code is injected into the output of an application that is then sent to a user’s web browser. In the browser, this scripting code is executed and used to transfer sensitive data to a third party (i.e., the attacker).Currently, most approaches attempt to prevent XSS on the server side by inspecting and modifying the data that is exchanged between the web application and the user. Unfortunately, it is often the case that vulnerable applications are not fixed for a considerable amount of time, leaving the users vulnerable to attacks. The solution presented in this paper stops XSS attacks on the client side by tracking the flow of sensitive information inside the web browser. If sensitive information is about to be transferred to a third party, the user can decide if this should be permitted or not. As a result, the user has an additional protection layer when surfing the web, without solely depending on the security of the web application.

Nowadays, many web sites make extensive use of clientside scripts (mostly written in JavaScript) to enhance user experience. Unfortunately, this trend has also

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 1 Case Study

    • 776 Words
    • 4 Pages

    Security: Web applications are typically deployed on dedicated servers, which are monitored and maintained by experienced server…

    • 776 Words
    • 4 Pages
    Good Essays
  • Good Essays

    A reflective cross-site scripting attack is a non-persistent attack in which all input shows output on the user’s/attacker’s screen and does not modify data stored on the server.…

    • 575 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Web application design and coding defects are the main reasons to create a secure coding policy and guidelines. The policy/guidelines are to provide awareness and ensure security when developing code.…

    • 813 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Web application is an application that is accessed by users using a web browser. Some of the web applications are Microsoft internet explorer, Google chrome, Mozilla firefox, Apple safari, Netscape Navigator.…

    • 485 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Information Technology is advancing and growing by the minute. Without encryption, credentials sent can be easily intercepted and read by hackers, causing "irreparable damage" to the user and the website owner 's reputation (Eugene Teo, senior manager of security response at security software firm Symantec Singapore, 2014). Security will include monitoring internet behavior, login and log on password rules, software update, and privacy of information.…

    • 688 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    planned expansion into the east coast. One of the threats identified was the vulnerability of the…

    • 2750 Words
    • 15 Pages
    Powerful Essays
  • Good Essays

    Pt1420 Unit 7 Analysis

    • 737 Words
    • 3 Pages

    Before I have examined to answer why do we think most web pages today require server side programming? Particularly meaningful to me toward defense entirely regarding the server side programming Characteristics, since there is a few common component of server side programming besides the technology we practiced which perform by:-…

    • 737 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    6. Perform SQL injection attacks against sample vulnerable Web applications with e-commerce data 
entry fields…

    • 1544 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 1&2 Discussion

    • 379 Words
    • 2 Pages

    Security of web applications first begins with configuring the server itself with strict security in mind. Many will often deploy various layers such as a WAF, IDS, or Mod Security to react in real time to various hacking and threats for HTTP requests. However, securing the entire server and any running services with a high level of security in mind is the first fundamental step to avoid the risk of being hacked or compromised.…

    • 379 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Websites are routinely collecting information about customers and visitors to understand and serve their customers better. Personal information is collected and administrated with integrity, responsibility, and security.…

    • 423 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Cross-site scripting is a type of computer security exposure found in web function such as XSS which attacker attach to the client side of a script.…

    • 488 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Van der Walt, Charl. (2002). "Assessing Internet Security Risk, Part 1: What is Risk Assessment?" SecurityFocus.com [www.securityfocus.com/infocus/1263] c…

    • 1974 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    The last few years have been marked by numerous malicious applications that have increasingly targeted online activities. As the number of online activities continues to grow strong, ease of Internet use and increasing use base has perfected the criminal targets. Therefore, attacks on numerous users can be achieved at a single click. The methods utilized in breaching Internet security vary. However, these methods have increasingly become complicated and sophisticated over time. With the increase in threat levels, stronger legislations are being increasingly issued to prevent further attacks.…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    The internet is approximately 40 years old and is continuing to grow at a rapid pace. This rapid growth and use of the internet for practically everything you can do in life has also cause a major increase in threats. Cyber-criminals are often breaking into security on many major websites and making the news. Information Security is turning into an important part in protect a business’s information.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    IS 4560 Week 1

    • 309 Words
    • 2 Pages

    Web-based attacks – the increasing pervasiveness of Web browser applications along with increasingly common, easily exploited Web browser application security vulnerabilities has resulted in the widespread growth of Web-based threats. Attackers wanting to take advantage of client-side vulnerabilities no longer need to actively compromise specific networks to gain access to those computers. Instead, they can focus on attacking and compromising websites to mount additional, client-side attacks.…

    • 309 Words
    • 2 Pages
    Satisfactory Essays