Enhanced Browser Defense for Reflected Cross-Site Scripting

被引:0
|
作者
Mewara, Bhawna [1 ]
Bairwa, Sheetal [1 ]
Gajrani, Jyoti [1 ]
Jain, Vinesh [1 ]
机构
[1] Govt Engn Coll, Dept Informat Technol & Comp Engn, Ajmer, India
关键词
XSS; defense; special characters; attack vectors; filter;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cross-Site Scripting (XSS) is a common attack technique that lets attackers insert the code in the output application of web page which is referred to the web browser of visitor and then the inserted code executes automatically and steals the sensitive information. In order to prevent the users from XSS attack, many client-side solutions have been implemented; most of them being used are the filters that sanitize the malicious input. However, many of these filters do not provide prevention to the newly designed sophisticated attacks such as multiple points of injection, injection into script etc. This paper proposes and implements an approach based on encoding unfiltered reflections for detecting vulnerable web applications which can be exploited using above mentioned sophisticated attacks. Results prove that the proposed approach provides accurate higher detection rate of exploits. In addition to this, an implementation of blocking the execution of malicious scripts have contributed to XSS-Me: an open source Mozilla Firefox security extension that detects for reflected XSS vulnerabilities which can be considered as an effective solution if it is integrated inside the browser rather than being enforced as an extension.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Browser's Defenses Against Reflected Cross-Site Scripting Attacks
    Mewara, Bhawna
    Bairwa, Sheetal
    Gajrani, Jyoti
    [J]. 2014 INTERNATIONAL CONFERENCE ON SIGNAL PROPAGATION AND COMPUTER TECHNOLOGY (ICSPCT 2014), 2014, : 662 - 667
  • [2] Protecting the Augmented Browser Extension from Mutation Cross-Site Scripting
    Remya, S.
    Praveen, K.
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION TECHNOLOGIES, IC3T 2015, VOL 1, 2016, 379 : 215 - 223
  • [3] Detecting DOM-Sourced Cross-Site Scripting in Browser Extensions
    Pan, Jinkun
    Mao, Xiaoguang
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME), 2017, : 24 - 34
  • [4] Caught in the cross-site scripting fire
    Mason, Andrew
    [J]. Network Security, 2012, 2012 (05) : 5 - 9
  • [5] Cross-site Scripting Research: A Review
    Nagarjun, P. M. D.
    Ahamad, Shaik Shakeel
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (04) : 626 - 632
  • [6] Moving Target Defense Against Cross-Site Scripting Attacks (Position Paper)
    Portner, Joe
    Kerr, Joel
    Chu, Bill
    [J]. FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2014), 2015, 8930 : 85 - 91
  • [7] WebMTD: Defeating Cross-Site Scripting Attacks Using Moving Target Defense
    Niakanlahiji, Amirreza
    Jafarian, Jafar Haadi
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [8] Discovering reflected cross-site scripting vulnerabilities using a multiobjective reinforcement learning environment
    Caturano, Francesco
    Perrone, Gaetano
    Romano, Simon Pietro
    [J]. COMPUTERS & SECURITY, 2021, 103
  • [9] Research and Implementation of Cross-site Scripting Defense Method Based on Moving Target Defense Technology
    Chen, Ping
    Yu, Han
    Zhao, Min
    Wang, Jinshuang
    [J]. 2018 5TH INTERNATIONAL CONFERENCE ON SYSTEMS AND INFORMATICS (ICSAI), 2018, : 818 - 822
  • [10] Development of web browser prototype with embedded classification capability for mitigating Cross-Site Scripting attacks
    Malviya, Vikas K.
    Rai, Sawan
    Gupta, Atul
    [J]. APPLIED SOFT COMPUTING, 2021, 102