Downloads: 125 | Views: 293 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 7, July 2014 | Popularity: 6.8 / 10
Prevention to Cross-site Scripting Attacks: A Survey
Manisha S Mahindrakar
Abstract: With Internet becoming ubiquitous in every aspect of our life, there is an increase in the web applications providing day to day services like banking, shopping, mailing services, news updates, etc. But most of these applications have vulnerabilities or security loopholes like Cross site scripting (XSS), Cross-site request forgery (CSRF), SQL Injection which are being exploited by the hackers for malicious purposes. Hence there is a need for APIs/automated security tools to identify and/or prevent these vulnerabilities before the application goes live. This survey paper focuses on various security tools and prevention methodologies available to mitigate attacks due to Cross-site Scripting (XSS) and Cross-site request forgery (CSRF) vulnerabilities.
Keywords: Web Applications, Cross-site Scripting XSS, Cross-site Request forgery CSRF/XSRF
Edition: Volume 3 Issue 7, July 2014
Pages: 414 - 418
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2
Analysis Study Research Paper, Computer Science & Engineering, India, Volume 9 Issue 2, February 2020
Pages: 1921 - 1930Secure Web: Integrating AI Driven Vulnerability Management and Anomaly Detection in AWS Based E - Commerce Platforms
Sai Tarun Kaniganti
Downloads: 6 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2
Informative Article, Computer Science & Engineering, India, Volume 13 Issue 3, March 2024
Pages: 1918 - 1923Integrating Web Applications with Azure OpenAI Services: A Focus on Semantic Kernel
Mounika Kothapalli
Downloads: 6 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2
Analysis Study Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021
Pages: 1825 - 1834Architecting Resilient REST APIs: Leveraging AWS, AI, and Microservices for Scalable Data Science Applications
Sai Tarun Kaniganti, Venkata Naga Sai Kiran Challa
Downloads: 103
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015
Pages: 1565 - 1567A Region Boundaries Algorithm for Ear Authentication Based on Plots
G. Harsha Vardhan, K. Jeeva
Downloads: 104
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 1362 - 1364Application Research and Penetration Testing on WebSocket Technology
Priyali Mishra, J. Jeysree