Justified Cross-Site Scripting Attacks Prevention from Client-Side

Journal Title: International Journal on Computer Science and Engineering - Year 2014, Vol 6, Issue 7

Abstract

Web apps are fetching towards the overriding way to offer access to web services. In parallel, vulnerabilities of web application are being revealed and unveiled at an frightening rate. Web apps frequently make JavaScript code utilization that is entrenched into web pages to defend client-side behavior which is dynamic. This script code is accomplished in the circumstance of the client’s web browser. From malicious JavaScript code to shield the client’s environment, a mechanism known as sandboxing is utilized that confines a program to admittance only resources connected with its origin website. Regrettably, these protection mechanisms not succeed if a client can be attracted into malicious JavaScript code downloading from an in-between, faithful site. In this situation, the wicked script is approved complete entrée to each and every resource (for example cookies and authentication tokens) that be in the right place to the trusted/faithful site. Those types of attacks are described as XSS (crosssite scripting) attacks. Commonly, cross-site scripting attacks are simple to perform, but complicated to identify and stop. One cause is the far above the ground HTML encoding methods flexibility, presenting the attacker a lot of chances for circumventing input filters on the server-side that must put off malicious scripts from entering into trusted/faithful sites. Also, developing a client-side way out is not simple cause of the complicatedness of recognizing JavaScript code as formatted as malicious. This theory shows that noxes is the finest of our understanding the initial client-side resolution to moderate cross-site scripting attacks. Noxes works as a web proxy and utilizes both automatically and manual produced rules to moderate possible cross-site scripting efforts. Noxes efficiently defends against data outflow from the client’s environment while needs least client communication and customization attempt.

Authors and Affiliations

A. MONIKA , D. RAMAN

Keywords

Related Articles

Biometric Template Security Using Invisible Watermarking With Minimum Degradation in Quality of Template

In this paper, we present an approach to enhance the Biometric Template Security by using Invisible Watermarking. For embedding the watermark in the Biometric Template, we used Parity Checker Method [2]. The use of Parit...

ROLE OF DATA MINING IN RETAIL SECTOR

Data mining is proved to be one of the important tools for identifying useful information from very large amount of data bases in almost all the industries. Industries are using data mining to increase revenues and reduc...

A Modified Ant-based Clustering for Medical Data

Ant-based techniques, in the computer sciences, are designed for those who take biological inspirations on the behavior of the social insects. Data-clustering techniques are classification algorithms that have a wide ran...

CRM System Using UI-AKD Approach of D3M

Customer Relationship Management has entered the mainstream. Despite the uncertainty of the economy, CRM is being thrust into corporate budgets and talked about as a critical initiative by numerous of companies. It has g...

Fuzzy time series forecasting of wheat production

The present study provides a foundation for the development and application of fuzzy time series model for short term agricultural production forecasting. The present study can provide an advantageous basis to Farm admin...

Download PDF file
  • EP ID EP131846
  • DOI -
  • Views 82
  • Downloads 0

How To Cite

A. MONIKA, D. RAMAN (2014). Justified Cross-Site Scripting Attacks Prevention from Client-Side. International Journal on Computer Science and Engineering, 6(7), 267-270. https://europub.co.uk/articles/-A-131846