Cross Site Scripting: Detection Approaches in Web Application
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 10
Abstract
Web applications have become one of the standard platforms for service releases and representing information and data over the World Wide Web. Thus, security vulnerabilities headed to various type of attacks in web applications. Amongst those is Cross Site Scripting also known as XSS. XSS can be considered as one of the most popular type of threat in web security application. XSS occurs by injecting the malicious scripts into web application, and it can lead to significant violations at the site or for the user. This paper highlights the issues (i.e. security and vulnerability) in web application specifically in regards to XSS. In addition, the future direction of research within this domain is highlighted.
Authors and Affiliations
Abdalla Marashdih, Zarul Zaaba
Comparative study of Authorship Identification Techniques for Cyber Forensics Analysis
Authorship Identification techniques are used to identify the most appropriate author from group of potential suspects of online messages and find evidences to support the conclusion. Cybercriminals make misuse of online...
Data Flows Management and Control in Computer Networks
In computer networks, loss of data packets is inevitable, because of the buffer memory overflow of at least one of the nodes located on the path from the source to the receiver, including the latter. Such losses associat...
Strategic Framework and Maturity Index for Measuring Knowledge Management Practices in Government Organizations
Knowledge is considered as an intellectual asset of any Organization through which performance of the Organization could be enhanced exponentially. Harnessing of the Organization’s Tacit and Explicit knowledge and its Ma...
A High-Performing Similarity Measure for Categorical Dataset with SF-Tree Clustering Algorithm
Tasks such as clustering and classification assume the existence of a similarity measure to assess the similarity (or dissimilarity) of a pair of observations or clusters. The key difference between most clustering metho...
Conceptual Modeling of Inventory Management Processes as a Thinging Machine
A control model is typically classified into three forms: conceptual, mathematical and simulation (computer). This paper analyzes a conceptual modeling application with respect to an inventory management system. Today, m...