Selvamani et al., 2010 - Google Patents
Protection of web applications from cross-site scripting attacks in browser sideSelvamani et al., 2010
View PDF- Document ID
- 9795333176390362192
- Author
- Selvamani K
- Duraisamy A
- Kannan A
- Publication year
- Publication venue
- arXiv preprint arXiv:1004.1769
External Links
Snippet
Cross Site Scripting (XSS) Flaws are currently the most popular security problems in modern web applications. These Flaws make use of vulnerabilities in the code of web-applications, resulting in serious consequences, such as theft of cookies, passwords and other personal …
- 235000014510 cooky 0 abstract description 21
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/168—Implementing security features at a particular protocol layer above the transport layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/083—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Nikiforakis et al. | SessionShield: Lightweight protection against session hijacking | |
Kirda et al. | Noxes: a client-side solution for mitigating cross-site scripting attacks | |
Kirda et al. | Client-side cross-site scripting protection | |
Nithya et al. | A survey on detection and prevention of cross-site scripting attack | |
US8413239B2 (en) | Web security via response injection | |
Lala et al. | Secure web development using owasp guidelines | |
Johns | On JavaScript Malware and related threats: Web page based attacks revisited | |
Nagpal et al. | SECSIX: security engine for CSRF, SQL injection and XSS attacks | |
Dabbour et al. | Efficient assessment and evaluation for websites vulnerabilities using SNORT | |
Falana et al. | Detection of cross-site scripting attacks using dynamic analysis and fuzzy inference system | |
Meyer et al. | Detecting attacks on web applications from log files | |
Kollepalli et al. | An Experimental Study on Detecting and Mitigating Vulnerabilities in Web Applications. | |
Jayamsakthi Shanmugam | Cross Site Scripting-Latest developments and solutions: A survey | |
Duraisamy et al. | A server side solution for protection of web applications from cross-site scripting attacks | |
Selvamani et al. | Protection of web applications from cross-site scripting attacks in browser side | |
Avramescu et al. | Guidelines for discovering and improving application security | |
Wibowo et al. | Apache web server security with security hardening | |
Kour | A Study On Cross-Site Request Forgery Attack And Its Prevention Measures | |
Hadpawat et al. | Analysis of prevention of XSS attacks at client side | |
Riesch et al. | Audit based privacy preservation for the OpenID authentication protocol | |
Almi | Web Server Security and Survey on Web Application Security | |
Pantoulas | Description, analysis and implementation of a Web Application Firewall (WAF). Creation of attack scenarios and threats prevention | |
Sentamilselvan et al. | Survey on cross site request forgery | |
Pevnev et al. | Web application protection technologies | |
Rao et al. | A Three-Pronged Approach to Mitigate Web Attacks |