CSRF Attacks and its Defence using Middleware

Abstract

A common solution to the issue of CSRF vulnerability is to restrict malicious requests from reaching the core of the application, where all the data and business logic is present. But the most challenging part is to identify when a request is malicious and when is it healthy. Implementing a simple solution would lead to more vulnerabilities and implementing too strict a solution would lead to breakages where projects depend on cross site requests like third party authentication and payment gateways etc. The solution being proposed in this paper constitutes the design and implementation of a request filtering mechanism that can precisely distinguish between malicious and healthy requests, and automatically decide to restrict them or allow them to get further deep into the system. This paper briefly explains what a Cross Site Request Forgery attack is, and then goes into a step by step explanation on the prevention of CSRF attacks using a middleware. The proposed system is very strict in filtering out HTTP requests but also has an option to exempt certain cross site requests based on their domain or URL, with which payment hooks and other third party authentication calls can be exempted from the CSRF middleware. Shubham Kumar Jha | Raghavendra R "CSRF Attacks and its Defence using Middleware" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd42476.pdf Paper URL: https://www.ijtsrd.comcomputer-science/world-wide-web/42476/csrf-attacks-and-its-defence-using-middleware/shubham-kumar-jha

Authors and Affiliations

Shubham Kumar Jha | Raghavendra R

Keywords

Related Articles

Study of Effectiveness of Various Promotional Strategies used by Honda

HONDAs key strategies are to build a sturdy product portfolio across categories. Explore growth possibilities globally, continuously improve its operational efficiency, aggressively extend its attain to customers, mainta...

Modal Analysis of a Square Plate with Reinforcement with Number of Stiffeners

This Modal analysis is a major technique to determine the vibration characteristics of engineering structures and its component's. It is a process by which the natural frequencies, mode shapes of the structure can be det...

Input Based Dynamic Reconfiguration for Low Power Image Processing and Secure Transmission

The fields of image and video encoding and compression have been put to a lot of stress with increase in the capacity of Integrated circuits. As technology shrinks, more and more transistors can be put into an I.C and th...

Waste Plastic’s Effect on the Deterioration of Bituminous Mixes in Cold Climates

The modifications in bitumen can be carried by addition of various types of additives. Polymers can be categorized as one of the types of additive. By the addition of Polymers to the bitumen, the temperature susceptibili...

Review Paper on Predicting Network Attack Patterns in SDN using ML

Software Defined Networking SDN provides several advantages like manageability, scaling, and improved performance. SDN has some security problems, especially if its controller is defense less over Distributed Denial of S...

Download PDF file
  • EP ID EP695796
  • DOI -
  • Views 308
  • Downloads 0

How To Cite

Shubham Kumar Jha (2021). CSRF Attacks and its Defence using Middleware. International Journal of Trend in Scientific Research and Development, 5(4), -. https://europub.co.uk/articles/-A-695796