Justified Cross-Site Scripting Attacks Prevention from Client-Side

Journal Title: International Journal on Computer Science and Engineering - Year 2014, Vol 6, Issue 7

Abstract

Web apps are fetching towards the overriding way to offer access to web services. In parallel, vulnerabilities of web application are being revealed and unveiled at an frightening rate. Web apps frequently make JavaScript code utilization that is entrenched into web pages to defend client-side behavior which is dynamic. This script code is accomplished in the circumstance of the client’s web browser. From malicious JavaScript code to shield the client’s environment, a mechanism known as sandboxing is utilized that confines a program to admittance only resources connected with its origin website. Regrettably, these protection mechanisms not succeed if a client can be attracted into malicious JavaScript code downloading from an in-between, faithful site. In this situation, the wicked script is approved complete entrée to each and every resource (for example cookies and authentication tokens) that be in the right place to the trusted/faithful site. Those types of attacks are described as XSS (crosssite scripting) attacks. Commonly, cross-site scripting attacks are simple to perform, but complicated to identify and stop. One cause is the far above the ground HTML encoding methods flexibility, presenting the attacker a lot of chances for circumventing input filters on the server-side that must put off malicious scripts from entering into trusted/faithful sites. Also, developing a client-side way out is not simple cause of the complicatedness of recognizing JavaScript code as formatted as malicious. This theory shows that noxes is the finest of our understanding the initial client-side resolution to moderate cross-site scripting attacks. Noxes works as a web proxy and utilizes both automatically and manual produced rules to moderate possible cross-site scripting efforts. Noxes efficiently defends against data outflow from the client’s environment while needs least client communication and customization attempt.

Authors and Affiliations

A. MONIKA , D. RAMAN

Keywords

Related Articles

IP Address Blocking System

Hosting a site on the Internet makes it available everywhere. There are certain sites that are just meant for local use like local shopping marts that do not provide products for purchase in other countries. Also, there...

Adaptive Background subtraction in Dynamic Environments Using Fuzzy Logic

Abstract— Extracting a background from an image is the enabling step for many high-level vision processing tasks, such as object tracking and activity analysis. Although there are a number of object extraction algorithms...

Analyzing Motivation of Private Engineering College Students: A Fuzzy Logic Approach (A case study of private Engineering ollege)

A method for analyzing and comparing group of students motivation using fuzzy logic is proposed. A fuzzy inference system is designed and implemented using Simulink in Matlab[19] with fuzzy statistical analysis to includ...

A Voice Priority Queue (VPQ) Fair Scheduler for the VoIP over WLANs

Transmission of VoIP over packet switching networks is one of the rapidly emerging real-time Internet Protocol. The real-time application of the Voice over Internet Protocol (VoIP) is growing rapidly for it is more flexi...

Scalability Performance of MANET Routing Protocols with Reference to Variable Pause Time

As mobile networking continues to experience increasing popularity, the need to connect large numbers of wireless devices will become more prevalent. Many recent proposals for ad hoc routing have certain characteristics....

Download PDF file
  • EP ID EP131846
  • DOI -
  • Views 129
  • Downloads 0

How To Cite

A. MONIKA, D. RAMAN (2014). Justified Cross-Site Scripting Attacks Prevention from Client-Side. International Journal on Computer Science and Engineering, 6(7), 267-270. https://europub.co.uk/articles/-A-131846