International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 136 | Views: 314

Survey Paper | Computer Science & Engineering | India | Volume 5 Issue 1, January 2016 | Popularity: 6.9 / 10


     

Survey on Preventing Cross Web Site Request Forgery Attacks with Activation Link

Kadambari Pradip Chaudhari, Manisha Tijare


Abstract: The web has become an important a part of our lives. Unfortunately, as our dependency on the online increases, so does the bury Eastern Time of attackers in exploiting internet applications and web-based info systems. Previous add the field of internet application security has primarily cantered on the mitigation of Cross web site Scripting (XSS) and SQL injection attacks. In distinction, Cross web site Request Forgery (XSRF) attacks haven't received a lot of attention. In AN XSRF attack, the trust of an internet application in its documented users is exploited by lease the assaulter build discretionary protocol requests on behalf of a victim user. The matter is that internet applications generally work such requests while not edificatory that the performed actions area unit so intentional. Because XSRF may be a comparatively new security downside, it is largely unknown by internet application developers. As a result, there exist several internet applications that area unit vulnerable to XSRF. Sadly, existing mitigation approaches area unit time-consuming and error-Pr one, as they need manual effort to integrate defense techniques into existing systems. In this paper, we tend to gift an answer that has a totally automatic protection From XSRF attacks. A lot of exactly, our approach relies on a server-side proxy that detects and prevents XSRF attacks during an approach that's clear to users furthermore on the online application itself. We give experimental results that demonstrate that we are able to use our prototype to secure variety of common ASCII text file internet applications, while not negatively touching their behavior.


Keywords: Detection, Modification, Prevention, SQL injection attacks, strategies, Vulnerabilities, Web application security


Edition: Volume 5 Issue 1, January 2016


Pages: 94 - 98


DOI: https://www.doi.org/10.21275/26121501



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Kadambari Pradip Chaudhari, Manisha Tijare, "Survey on Preventing Cross Web Site Request Forgery Attacks with Activation Link", International Journal of Science and Research (IJSR), Volume 5 Issue 1, January 2016, pp. 94-98, https://www.ijsr.net/getabstract.php?paperid=26121501, DOI: https://www.doi.org/10.21275/26121501



Similar Articles

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 12, December 2024

Pages: 448 - 453

Safeguarding IoT Devices Against Emerging Security Threats: Challenges and Mitigation Strategies

Dr. A. Lavanya

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, United States of America, Volume 13 Issue 12, December 2024

Pages: 1250 - 1253

Serverless Architectures: Implications for Distributed System Design and Implementation

Akaash Vishal Hazarika, Mahak Shah

Share this Article

Downloads: 2 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Student Project, Computer Science & Engineering, India, Volume 12 Issue 9, September 2023

Pages: 2161 - 2165

A Survey on the Application of Machine Learning in Predicting the Accuracy of Terrorist Attacks

Swathi R, Karthikeyan T

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 8, August 2024

Pages: 832 - 839

Leveraging Artificial Intelligence for Enhanced Cybersecurity: A Systematic Approach

Mohammed Saleem Sultan, Mohammed Shahid Sultan

Share this Article

Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Study Papers, Computer Science & Engineering, India, Volume 12 Issue 7, July 2023

Pages: 168 - 174

Understanding the Dynamics of Cybercrime in India a Comprehensive Study and Recommendations

V. Thenmozhi, A. Karunamurthy, V. Vigneshwar

Share this Article
Top