Justified Cross-Site Scripting Attacks Prevention from Client-Side

Journal Title: International Journal on Computer Science and Engineering - Year 2014, Vol 6, Issue 7

Abstract

Web apps are fetching towards the overriding way to offer access to web services. In parallel, vulnerabilities of web application are being revealed and unveiled at an frightening rate. Web apps frequently make JavaScript code utilization that is entrenched into web pages to defend client-side behavior which is dynamic. This script code is accomplished in the circumstance of the client’s web browser. From malicious JavaScript code to shield the client’s environment, a mechanism known as sandboxing is utilized that confines a program to admittance only resources connected with its origin website. Regrettably, these protection mechanisms not succeed if a client can be attracted into malicious JavaScript code downloading from an in-between, faithful site. In this situation, the wicked script is approved complete entrée to each and every resource (for example cookies and authentication tokens) that be in the right place to the trusted/faithful site. Those types of attacks are described as XSS (crosssite scripting) attacks. Commonly, cross-site scripting attacks are simple to perform, but complicated to identify and stop. One cause is the far above the ground HTML encoding methods flexibility, presenting the attacker a lot of chances for circumventing input filters on the server-side that must put off malicious scripts from entering into trusted/faithful sites. Also, developing a client-side way out is not simple cause of the complicatedness of recognizing JavaScript code as formatted as malicious. This theory shows that noxes is the finest of our understanding the initial client-side resolution to moderate cross-site scripting attacks. Noxes works as a web proxy and utilizes both automatically and manual produced rules to moderate possible cross-site scripting efforts. Noxes efficiently defends against data outflow from the client’s environment while needs least client communication and customization attempt.

Authors and Affiliations

A. MONIKA , D. RAMAN

Keywords

Related Articles

PERFORMANCE EVALUATION OF THREEPHASE INDUCTION MOTOR DRIVE FED FROM Z-SOURCE INVERTER

This paper presents a Z-source inverter which has been proposed as an alternative power conversion concept for adjustable speed AC drives. It is having both voltages buck and boost capabilities as they allow inverters to...

SEMU - An Adaptive Policy - Control Based Routing Approach to Provide Effective QoS over Wireless Sensor Networks

Error control mechanism carries vital importance in research aspects of Wireless Sensor Networks (WSNs) due to its limited energy constraints and minimal support for power communication. The survey and analysis provides...

Role Oriented Test Case Generation for Agent Based System

Agent Oriented Software Engineering (AOSE) is a rapidly developing area of research. Current research and development primarily focuses on the analysis, design and implementation of agent based software whereas testing i...

A Novel Approach for Text Categorization of Unorganized data based with Information Extraction

Internet has made a profound change in the lives of many enthusiastic innovators and researchers. The information available on the web has knocked the doors of Knowledge Discovery leading to a new Information era. Unfort...

Intrusion Detection using unsupervised learning

Clustering is the one of the efficient datamining techniques for intrusion detection. In clustering algorithm kmean clustering is widely used for intrusion detection. Because it gives efficient results incase of huge dat...

Download PDF file
  • EP ID EP131846
  • DOI -
  • Views 136
  • Downloads 0

How To Cite

A. MONIKA, D. RAMAN (2014). Justified Cross-Site Scripting Attacks Prevention from Client-Side. International Journal on Computer Science and Engineering, 6(7), 267-270. https://europub.co.uk/articles/-A-131846