Justified Cross-Site Scripting Attacks Prevention from Client-Side
Journal Title: International Journal on Computer Science and Engineering - Year 2014, Vol 6, Issue 7
Abstract
Web apps are fetching towards the overriding way to offer access to web services. In parallel, vulnerabilities of web application are being revealed and unveiled at an frightening rate. Web apps frequently make JavaScript code utilization that is entrenched into web pages to defend client-side behavior which is dynamic. This script code is accomplished in the circumstance of the client’s web browser. From malicious JavaScript code to shield the client’s environment, a mechanism known as sandboxing is utilized that confines a program to admittance only resources connected with its origin website. Regrettably, these protection mechanisms not succeed if a client can be attracted into malicious JavaScript code downloading from an in-between, faithful site. In this situation, the wicked script is approved complete entrée to each and every resource (for example cookies and authentication tokens) that be in the right place to the trusted/faithful site. Those types of attacks are described as XSS (crosssite scripting) attacks. Commonly, cross-site scripting attacks are simple to perform, but complicated to identify and stop. One cause is the far above the ground HTML encoding methods flexibility, presenting the attacker a lot of chances for circumventing input filters on the server-side that must put off malicious scripts from entering into trusted/faithful sites. Also, developing a client-side way out is not simple cause of the complicatedness of recognizing JavaScript code as formatted as malicious. This theory shows that noxes is the finest of our understanding the initial client-side resolution to moderate cross-site scripting attacks. Noxes works as a web proxy and utilizes both automatically and manual produced rules to moderate possible cross-site scripting efforts. Noxes efficiently defends against data outflow from the client’s environment while needs least client communication and customization attempt.
Authors and Affiliations
A. MONIKA , D. RAMAN
Email Spam Filtering using Supervised Machine Learning Techniques
E-mail spam, known as unsolicited bulk Email (UBE), junk mail, or unsolicited commercial email (UCE), is the practice of sending unwanted e-mail messages, requently with commercial content, in large quantities to an ind...
Discovering suffixes: A Case Study for Marathi Language
Suffix stripping is a pre-processing step required in a number of natural language processing applications. Stemmer is a tool used to perform this step. This paper presents and evaluates a rule-based and an unsupervised...
Next Generation High Speed Computing Using Photonic Based Technology
In the present era of technology computer has facilitated the human life up to a great extent. The speed of computation has raised to astonish level but the pace of development of other technologies which have core depen...
Comparison of Pre-fetched Pages Before and After Path Completion
In this study we uses an approach for increasing web performance by analyzing and predicting the user behavior from user access log , identifying the missing paths in the logs and completing the same using a web structur...
Robust Algorithm for Impulse Noise Reduction
This Paper presents highly efficient two phase schema for removing impulse noise. In the first phase, robust algorithm for noise detection is used to identify noisy pixels. In the second phase, the image is restored usin...