Downloads: 136 | Views: 314
Survey Paper | Computer Science & Engineering | India | Volume 5 Issue 1, January 2016 | Popularity: 6.9 / 10
Survey on Preventing Cross Web Site Request Forgery Attacks with Activation Link
Kadambari Pradip Chaudhari, Manisha Tijare
Abstract: The web has become an important a part of our lives. Unfortunately, as our dependency on the online increases, so does the bury Eastern Time of attackers in exploiting internet applications and web-based info systems. Previous add the field of internet application security has primarily cantered on the mitigation of Cross web site Scripting (XSS) and SQL injection attacks. In distinction, Cross web site Request Forgery (XSRF) attacks haven't received a lot of attention. In AN XSRF attack, the trust of an internet application in its documented users is exploited by lease the assaulter build discretionary protocol requests on behalf of a victim user. The matter is that internet applications generally work such requests while not edificatory that the performed actions area unit so intentional. Because XSRF may be a comparatively new security downside, it is largely unknown by internet application developers. As a result, there exist several internet applications that area unit vulnerable to XSRF. Sadly, existing mitigation approaches area unit time-consuming and error-Pr one, as they need manual effort to integrate defense techniques into existing systems. In this paper, we tend to gift an answer that has a totally automatic protection From XSRF attacks. A lot of exactly, our approach relies on a server-side proxy that detects and prevents XSRF attacks during an approach that's clear to users furthermore on the online application itself. We give experimental results that demonstrate that we are able to use our prototype to secure variety of common ASCII text file internet applications, while not negatively touching their behavior.
Keywords: Detection, Modification, Prevention, SQL injection attacks, strategies, Vulnerabilities, Web application security
Edition: Volume 5 Issue 1, January 2016
Pages: 94 - 98
DOI: https://www.doi.org/10.21275/26121501
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 12, December 2024
Pages: 448 - 453Safeguarding IoT Devices Against Emerging Security Threats: Challenges and Mitigation Strategies
Dr. A. Lavanya
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, United States of America, Volume 13 Issue 12, December 2024
Pages: 1250 - 1253Serverless Architectures: Implications for Distributed System Design and Implementation
Akaash Vishal Hazarika, Mahak Shah
Downloads: 2 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2
Student Project, Computer Science & Engineering, India, Volume 12 Issue 9, September 2023
Pages: 2161 - 2165A Survey on the Application of Machine Learning in Predicting the Accuracy of Terrorist Attacks
Swathi R, Karthikeyan T
Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 8, August 2024
Pages: 832 - 839Leveraging Artificial Intelligence for Enhanced Cybersecurity: A Systematic Approach
Mohammed Saleem Sultan, Mohammed Shahid Sultan
Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Study Papers, Computer Science & Engineering, India, Volume 12 Issue 7, July 2023
Pages: 168 - 174Understanding the Dynamics of Cybercrime in India a Comprehensive Study and Recommendations
V. Thenmozhi, A. Karunamurthy, V. Vigneshwar