Selvamani et al., 2010 - Google Patents
Protection of web applications from cross-site scripting attacks in browser sideSelvamani et al., 2010
View PDF- Document ID
- 9795333176390362192
- Author
- Selvamani K
- Duraisamy A
- Kannan A
- Publication year
- Publication venue
- arXiv preprint arXiv:1004.1769
External Links
Snippet
Cross Site Scripting (XSS) Flaws are currently the most popular security problems in modern web applications. These Flaws make use of vulnerabilities in the code of web-applications, resulting in serious consequences, such as theft of cookies, passwords and other personal …
- 235000014510 cooky 0 abstract description 21
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/168—Implementing security features at a particular protocol layer above the transport layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/083—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Nikiforakis et al. | SessionShield: Lightweight protection against session hijacking | |
Kirda et al. | Noxes: a client-side solution for mitigating cross-site scripting attacks | |
Nithya et al. | A survey on detection and prevention of cross-site scripting attack | |
Kirda et al. | Client-side cross-site scripting protection | |
US8413239B2 (en) | Web security via response injection | |
Lala et al. | Secure web development using owasp guidelines | |
Johns | On JavaScript Malware and related threats: Web page based attacks revisited | |
Nagpal et al. | SECSIX: security engine for CSRF, SQL injection and XSS attacks | |
Dabbour et al. | Efficient assessment and evaluation for websites vulnerabilities using SNORT | |
Falana et al. | Detection of cross-site scripting attacks using dynamic analysis and fuzzy inference system | |
Meyer et al. | Detecting attacks on web applications from log files | |
Kollepalli et al. | An Experimental Study on Detecting and Mitigating Vulnerabilities in Web Applications. | |
Jayamsakthi Shanmugam | Cross Site Scripting-Latest developments and solutions: A survey | |
Duraisamy et al. | A server side solution for protection of web applications from cross-site scripting attacks | |
Selvamani et al. | Protection of web applications from cross-site scripting attacks in browser side | |
Avramescu et al. | Guidelines for discovering and improving application security | |
Hadpawat et al. | Analysis of prevention of XSS attacks at client side | |
Riesch et al. | Audit based privacy preservation for the OpenID authentication protocol | |
Wibowo et al. | Apache web server security with security hardening | |
Almi | Web Server Security and Survey on Web Application Security | |
Pevnev et al. | Web application protection technologies | |
Rao et al. | A Three-Pronged Approach to Mitigate Web Attacks | |
Alanda et al. | Cross-Site Scripting (XSS) Vulnerabilities in Modern Web Applications | |
Ponnavaikko et al. | Risk mitigation for cross site scripting attacks using signature based model on the server side | |
Gedam et al. | Proposed Secure Hypertext Model in Web Engineering |