[go: up one dir, main page]

Selvamani et al., 2010 - Google Patents

Protection of web applications from cross-site scripting attacks in browser side

Selvamani et al., 2010

View PDF
Document ID
9795333176390362192
Author
Selvamani K
Duraisamy A
Kannan A
Publication year
Publication venue
arXiv preprint arXiv:1004.1769

External Links

Snippet

Cross Site Scripting (XSS) Flaws are currently the most popular security problems in modern web applications. These Flaws make use of vulnerabilities in the code of web-applications, resulting in serious consequences, such as theft of cookies, passwords and other personal …
Continue reading at arxiv.org (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/168Implementing security features at a particular protocol layer above the transport layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls

Similar Documents

Publication Publication Date Title
Nikiforakis et al. SessionShield: Lightweight protection against session hijacking
Kirda et al. Noxes: a client-side solution for mitigating cross-site scripting attacks
Nithya et al. A survey on detection and prevention of cross-site scripting attack
Kirda et al. Client-side cross-site scripting protection
US8413239B2 (en) Web security via response injection
Lala et al. Secure web development using owasp guidelines
Johns On JavaScript Malware and related threats: Web page based attacks revisited
Nagpal et al. SECSIX: security engine for CSRF, SQL injection and XSS attacks
Dabbour et al. Efficient assessment and evaluation for websites vulnerabilities using SNORT
Falana et al. Detection of cross-site scripting attacks using dynamic analysis and fuzzy inference system
Meyer et al. Detecting attacks on web applications from log files
Kollepalli et al. An Experimental Study on Detecting and Mitigating Vulnerabilities in Web Applications.
Jayamsakthi Shanmugam Cross Site Scripting-Latest developments and solutions: A survey
Duraisamy et al. A server side solution for protection of web applications from cross-site scripting attacks
Selvamani et al. Protection of web applications from cross-site scripting attacks in browser side
Avramescu et al. Guidelines for discovering and improving application security
Hadpawat et al. Analysis of prevention of XSS attacks at client side
Riesch et al. Audit based privacy preservation for the OpenID authentication protocol
Wibowo et al. Apache web server security with security hardening
Almi Web Server Security and Survey on Web Application Security
Pevnev et al. Web application protection technologies
Rao et al. A Three-Pronged Approach to Mitigate Web Attacks
Alanda et al. Cross-Site Scripting (XSS) Vulnerabilities in Modern Web Applications
Ponnavaikko et al. Risk mitigation for cross site scripting attacks using signature based model on the server side
Gedam et al. Proposed Secure Hypertext Model in Web Engineering