SlideShare a Scribd company logo
1 of 11
Download to read offline
David C. Wyld, et al. (Eds): CCSEA, SEA, CLOUD, DKMP, CS & IT 05, pp. 395–405, 2012.
© CS & IT-CSCP 2012 DOI : 10.5121/csit.2012.2240
Analysis of XSS attack Mitigation techniques
based on Platforms and Browsers
Ravi Kanth Kotha, Gaurav Prasad and Dinesh Naik
Department of Information Technology
National Institute of Technology, Karnataka
ravikanth1027@gmail.com,chgauravprasad@gmail.com,
dinnaik@gmail.com
ABSTRACT:
In the recent years, everything is in web. It may be Organization’s administration software,
Custom ERP application, Employee portals or Real estate portals. The Social networking sites
like Face book, Twitter, MySpace which is a web application is been used by millions of users
around the world. So web applications have become very popular among users. Hence they are
observed and may be exploited by hackers. Researchers and industry experts state that the
Cross-site Scripting (XSS) is the one of the top most vulnerabilities in the web application. The
cross-site scripting has become a common vulnerability of many web sites and web
applications. XSS consists in the exploitation of input validation flaws, with the purpose of
injecting arbitrary script code which is later executed at the web browser of the victim.
According to OSWAP, Cross-site scripting attacks on web applications have experienced an
important rise in recent year. This demands an efficient approach on the server side to protect
the users of the application as the reason for the vulnerability primarily lies on the server side.
The actual exploitation is within the victim’s web browser on the client-side. Therefore, an
operator of a web application has only very limited evidence of XSS issues. However, there are
many solutions for this vulnerability. But such techniques may degrade the performance of the
system. In such scenarios challenge is to decide which method, platform, browser and
middleware can be used to overcome the vulnerabilities, with reasonable performance over
head to the system.
Inspired by this problem, we present performance comparison of two mitigation techniques for
Cross-site Scripting (XSS) at the server side based on the parameters like application’s
platform, middleware technology and browser used by the end user. We implemented Mitigation
parsing technique using database and replace technique in different platforms, middleware and
checked its performance. We calculated the time taken by different browsers to render the pages
using two techniques under different platform and middleware. In this paper we proposed the
best combination of development platform, browser and the middleware for the two mitigation
technique with respect to developer and end users.
KEYWORDS
Parsing mitigation technique, replace technique, XSS attack, platform, middleware, browser,
JAVA,C#.
396 Computer Science & Information Technology (CS & IT)
1. INTRODUCTION
Today everything is in internet. It has become part of every individual’s daily activity. It may be
related to information gathering or any other work. Web application is considered the backbone
of every activity in internet. Almost all information are available in internet through web
applications .The business applications (e-commerce, banking, transportation, web mail, blogs,
etc) are now available as web-based applications. The demand for web applications also attracts
adversaries that want to exploit the vulnerabilities. A survey conducted in 2007 estimated that
70% of the web applications are at risk of being hacked [1] and the fact that these applications
can be accessed from everywhere in the globe, makes them even more interesting for attackers .
Attacker is an individual whose main interest or aim is to obtain confidential data by performing
malicious activities. He finds the vulnerabilities in the system and exploits it to gain information
of the victim .There are many vulnerabilities in dynamic web applications. One such vulnerability
is Cross Site Scripting [2][3]. According to Open Web Application Security Project (OWASP) ,
web application level vulnerabilities have a major part in getting attacked by any hacker.. Mainly
the attacks are of injection type. Cross-Site Scripting is one of the main and important attack to be
focused on as mentioned by OWASP[4].
The Cross Site Scripting attack is performed by changing the logic, semantics or syntax of a
HTML tag [11] by inserting new keywords or operators. XSS Attack is a class of code injection
attacks that happens when there is no proper input validation. Attacker can shape their
illegitimate input as parts of formal script string which is operated by databases. Many web
applications like social networking sites or any web applications could be the victims of this
attack. Attacker by exploiting this vulnerability will be a threat to security attributes like
confidentiality, integrity and authorization.
XSS can also escape traditional tools such as firewalls and Intrusion Detection Systems (IDS)
because they perform through ports used for regular web traffic which usually are open in
firewalls. On the other hand, most IDS focus on the network and IP layers whereas XSS work at
application layer. Researchers have proposed a range of techniques and tools to help developers
to compensate the shortcoming of the defensive coding. Developers have to undergo some
defensive coding practices to eliminate such vulnerabilities. The problem is that some current
techniques and tools are impractical in reality because they could not address all types of attacks
or have not been implemented yet. These techniques require modification in the original code or
addition of some modules into the application. However these methods will not be full proof and
result in performance degradation. So, there is a need to find the best combination of platform,
browser and mitigation.
The structure of the paper is as follows. Section 2 presents some background and discusses about
XSS attack. Section 3 describes in details the two mitigation methods implemented and compared
the performance based on different factors. Section 4 presents the implementation details and
discusses the results .Finally section 5 concludes the paper.
2. Xss ATTACK
Web application attacks are of greater impact than any other kind of applications and software.
Since it is open to all and has wider attack surface .Even Attackers only need a web browser to
access them and perform attack on them. If we are taking DREAD [6] as a mechanism or a tool to
evaluate the severity of the systems then it is very high. The main reason is the attack can be
reproduced easily and even can be performed using a web browser. If the attack is performed
many user will be affected by it. Additionally, such vulnerabilities can serve as launching pads
for other, more severe attacks on web users’ local systems. Cross-site scripting (XSS) is the class
Computer Science & Information Technology (CS & IT) 397
of web application vulnerabilities in which an attack is caused by a victim’s browser to execute
malicious script from the attacker. In 2006, 21.5% of all newly reported vulnerabilities were XSS,
making it the most frequently reported vulnerability of the year [7,8,9].In the year 2010 it still
maintains the same place or ranking.
There are two basic techniques to accomplish an XSS attack .The first technique is to store
malicious code in database and when accessed by client will be executed by the browser at the
client side. The second technique requires that the victim without the knowledge of malicious link
clicks on the link resulting in execution of malicious code.
Figure1: Code for accessing cookie
Figure 2: Malicious inserted into the tag
2.1. CAUSES OF XSS VULNERABILITIES
In the category of common vulnerabilities , XSS in the internet community from several years
XSS is vulnerability of a web application caused by the failure of the application in checking
upon user input before returning it to client’s web browser. Several factors contribute to the
prevalence of XSS vulnerabilities. First, the system requirements for XSS are minimal: XSS
afflicts web applications that display untrusted input. Secondly most web application
programming languages provide an unsafe default for passing un trusted input to the client.
Typically, printing the entrusted input directly to the output page is the most straightforward way
of displaying such data. The third factor is proper validation for untrusted input is difficult to get
right, primarily because of the many, often browser-specific, ways of invoking the JavaScript
interpreter.
3. MITIGATION TECHNIQUES
There are various methods and techniques for preventing XSS attack. The mitigation techniques
for the cross site scripting attack can be implemented at two sides server side and client side. The
client side mitigation technique is implemented on the browser. Usually in this type of mitigation
technique which is done at client side the main idea is to parse the incoming script and do proper
validation. The browser which validates the scripts and then executes provided script is free from
malicious code or results in malicious activity. And thus the client side mitigation helps to reduce
the overhead of the web server by doing validation at browser side.
Though the client side mitigation technique seems to be good enough there are some limitations.
The client side mitigation can be done using scripting languages, thus making the attacker to view
and gives a chance to the attacker to try different attack vectors. In the client side every user has
to undergo the overhead of making changes to the validation techniques where as in server side it
is done only once. Hence the client side mitigations are not recommended.
398 Computer Science & Information Technology (CS & IT)
There are many server side mitigation techniques available. Sever before sending the script to the
intended client performs the mitigation.
Here, two server side mitigations are discussed and compared using different parameters.
3.1. MITIGATION WITH SUPPORT OF DATABASE
The proposed system [10] in figure 3 is to have the features like, Configurable black listed tags,
its attributes and object implementation procedure for misuse detection at the server side, and
hence the existing web pages need not be modified for new threats.
Whenever a new web page is introduced there is no need to modify the web page, since the
security mechanism is separated from page level implementation and is placed at the top most
layer of the web application.
Security administrators need not know the entry points of individual web pages as there is a clear
demarcation between the web application and security mechanisms implemented in this approach.
The Implemented solution (Mitigation) comprises of four components namely Blocker, parser,
verifier and black listed tag cluster (Database). The Research paper Authors used XML to store
the Black listed tag clusters but it is again difficult to add some more black listed (TAG,
ATTRIBUTE) sets when compared to Database. The remaining Procedures are followed as the
paper proposed and the implementation of NOTIFICATION procedure is developed and added to
notify the details of attacker and attack to the victim user (user to be attacked if mitigation is not
present).
Figure 3 : Flow of input through the components
Blocker: When HTTP Request is received by the SERVER, those requests will redirected to this
procedure, If any charecters like { '<', '>', '%', '&', '', '#', '/'} are present in the Request,it sends
the Request to PARSER to get the TAGS and ATTRIBUTES used in the Request otherwise it
redirects again to the Application. If the Parser gives the Vulnerabilty status as true then an
ERROR page will be send to the attacker and notification sends to the victim. If the status is false
request will handled by the Application.
Computer Science & Information Technology (CS & IT) 399
Parser: This procedure creates the vector (tag, key, value) for each HTML or OTHER scripts in
the request and sends each Vector to the Verifier to check whether given TAG is Maliciousor not.
Verifier:This procedure uses the BlockListed Tag Cluster (Database) to check each vector given
by parser contains any vulnerable scripts or not. If any of the vector falls true for vulnerable, It
stops verifying and returns true to the Blocker.
BlockListed Tag Cluster (Database): Here a rules table which contains the data as
(TAG,KEY,CONDITION,VALUE) and it can updated by the Administrator and he can add new
BlockListed Tags as he noticed. The many Common BlockListed Tags are already inserted to the
Database .
3.2. SOLUTION BY REPLACING THE CODE
The script shown in figure 1 gives a idea of how the cookies can be stolen. It looks like a good
idea of delimiting malicious words and deleting them from the script. However the incoming
script can be carved effectively to deceive the idea. This can be viewed in figure:
Figure 4: Exploiting the delete technique
The existing system the mitigation is done by parsing the whole data and deleting the words
which may disclose the cookies or any escaping words .This process is repeated until there are no
more malicious code or words.
The technique [11] is to change those words in such a way that the pronunciation is same where
as the spelling is different, instead of deleting the words. This makes the browser to consider the
malicious code to be normal words. For example, the word “document” can be replaced with
“dokument” so that the pronunciation remains same but will not execute the script. By this
method the parsing need not to be done repeatedly because incase of deletion the algorithm
followed is Least Common Subsequence which is time consuming process leading to
performance degradation. Whereas here a REPLACE function is used such that there is no effect
on the time of execution. . Thus making the script non executable by the browser.
4. IMPLEMENTATION
The two techniques discussed are implemented in both Microsoft Visual Studio .NET 3.5
Framework and JAVA Standard Edition 6. Browser used to compare are Mozilla Firefox 3.6,
Google Chrome and Internet Explorer. Here MYSQL is used as storage database.
400 Computer Science & Information Technology (CS & IT)
4.1. COMPARISON OF THE TWO TECHNIQUES
The two proposed mitigation techniques are compared by taking the execution time of the both
techniques. The result related to the implementation of mitigation in java platform is shown in the
figure
Figure 5: The comparison between Mitigation using database and REPLACE Function
From the results it is infer that mitigation using database(M1) takes much time in execution than
the replacement mitigation(M2). The execution time can be explained by databases connectivity
and the time parsing the script. And a small part is even contributed by the housekeeping work
done at the time of function calls. Here the backend database used is MYSQL which is connected
using JDBC connector.
In mitigation with replacement technique the main share of the execution time is the FIND and
REPLACE functions. For implementation built-in functions are used .
From the results it shown that mitigation with replacement is performing better than the earlier.
But the drawback of this technique can be explained as it won’t allow any normal script that is
the scripts used to display images and some links .
4.2. COMPARISON OF JAVA AND C#
The two techniques which were been in discussion are implemented in JAVA and check for the
execution time.
Figure 6: Platform Comparisons for REPLACE method.
The above graph is the execution time of the mitigation technique with REPLACE function. The t
problem with REPLACE in C# is that it creates more string copies each time it is called. This can
often lead to measurable performance problems in large projects. Microsoft notes that "This
method does not modify the value of the current instance. Instead, it returns a new string in which
all occurrences of old Value are replaced by new Value." Following picture from the MSDN
Computer Science & Information Technology (CS & IT) 401
benchmark shows the result of execution of REPLACE function for short(20 characters) and long
(1000 characters)[12].
Figure 7: The Time of execution for replace methods
In Java the REPLACE function is implemented is different manner. Here the REPLACE function
creates only one new string with replacing all the occurrences of the source string. And hence
the performance of the function is better than in C#.
4.3. COMPARISON OF MITIGATION USING DATABASE
The discussed mitigation technique which uses database is compared with the JAVA and C#
implementation. Here the BACK END database is MYSQL which is an open source database
available. By making the database as fixed the techniques are implemented and compared. The
below results shows that MYSQL with JAVA as the developing platform performs better than the
C# .
Figure 8: The Platform comparison for Mitigation using Database.
The graph clearly shows that time of execution for the proposed mitigation in C# is very high
when compared to java .Since In Java the connection to database is done using JDBC connectors.
The connection handling in java is implemented in an efficient method. Java uses a concept called
CONNECTION POOLING where the recently used connection for the database is stored. For a
web application which can have thousands of client requests for the database are connected using
connection threads from this pool. Hence in java the execution time for SQL connection very
low.
C# also uses concept of CONNECTION POOL but the process of creating and establishing
connection is done using a process. The major part of the execution time for connection
establishment is for the process creation and killing the process after task
4.4. COMPARISON OF BROWSERS
The same mitigation techniques were also observed using three different browsers to find the best
browser based on the platform of the application. Firefox3.6 the leading browser in the market
which uses four java engines called SPIDERMONKEY is found to be the best for java based
application. The below graph can strengthens the above statement.
402 Computer Science & Information Technology (CS & IT)
Figure 9: Mitigation Using Database In JAVA
The graph also shows that Internet Explorer and Chrome which are the considered good browsers
in market perform almost at equal level.
The performance of IE and chrome is almost similar as the support for java from both the
browsers is done by using single java engines only. From Bench Mark Battle a standard
benchmark for comparing browsers has given almost same results [13]. The chrome‘s java engine
Grease Monkey even in enhanced version also consumes same amount of time. This can be
explained by the fact that the major part of the execution time is the boot time of the chrome.
Thus performing equal to Internet Explorer which is having comparatively less boot up time.
The comparison is even carried out for the C# implementation of the mitigations. In general
notion the products from same vendor perform well. But in contrast Internet Explorer and C#
which are from same vendor MICROSOFT seems to be not well supportive to each other. The
argument can be supported from the below results.
Figure 10: Mitigation using database in ASP
From the above chart it can be infer that Google Chrome and Internet Explorer are having same
execution time for the C# implementation. This can be explained because of the chrome’s process
isolation and the add-ons. The features such as dynamic code generation, hidden class transitions,
and precise garbage collection have made the execution time near to Internet Explorer.
The mitigation technique using REPLACE function is also compared based on the factor browser.
The technique is implemented both in C# and JAVA and deployed into the three browsers.
Computer Science & Information Technology (CS & IT) 403
Figure 11: Mitigation using REPLACE function implemented in JAVA
The mitigation technique using FIND and REPLACE function is implemented using JAVA and
the compared based on the browser to be used for rendering. From the graph it is clear that the
browser Mozilla Firefox takes very less time in rendering the implementation code compared to
Google Chrome and Internet Explorer.
Figure 12: Mitigation Without using Database in C#
The same technique implemented in C# and compared for browser comparison. The result shows
the browsers Internet explorer and Google chrome takes same time in rendering the pages. This
can be justified from the chrome handling of the C# code. Firefox lags in this results showing the
huge deployment time for C# code.
5. CONCLUSION
The two server side mitigation techniques has been discussed and compared based on the
platform, browser. Our work on comparison of mitigation techniques shows that the mitigation
using REPLACE function performs better than the other. The java implementation of database
mitigation technique performs better than C#. Among the three leading browsers say Google
chrome and Internet Explorer perform almost equal either in JAVA or C#, but Fire Fox overtakes
them when these two mitigation techniques discussed are considered..From all the results
obtained we can clearly infer that an web application with mitigation technique with REPLACE
function implemented in JAVA can give a good performance in browser FIREFOX.
404 Computer Science & Information Technology (CS & IT)
REFERENCES
[1] Acunetix Ltd, Feb. 2007, http://www.acunetix.com/news/securityauditresults.htm
[2] The IT security.com Dictionary of Information Security," Cross Site Scripting (XSS, cross-site
malicious content)", http://www.itsecurity.com/dictionary/xss.html
[3] CERT Advisory CA-2000-02 Malicious HTML Tags Embedded in Client Web Requests,
http://www.cert.org/advisories/CA-2000-02.html
[4] OWASP Top 10-2010 rdc.
[5] Testing and comparing web vulnerability scanning tools for SQL injection and XSS attacks José
Fonseca Marco Vieira, Henrique Madeira 13th IEEE International Symposium on Pacific Rim
Dependable Computing
[6] Security-aware Software Development Life Cycle (SaSDLC) – Processes and Tools Asoke K
Talukder1, Vineet Kumar Maurya1, Santhosh Babu G1, Jangam Ebenezer1, Muni Sekhar V1, Jevitha
K P1, Saurabh Samanta1, Alwyn Roshan Pais
[7] S. Christey. Vulnerability type distributions in CVE, Oct. 2006. http://cwe.mitre.org/documents/vuln-
trends.html.
[8] K. J. Higgins. Cross-site scripting: Attackers‟ new favorite flaw, September 2006.
http://www.darkreading.com/ document.asp?doc_id=103774&WT.svl=news1_1.
[9] Common Vulnerabilities and Exposures, "The standard for information security vulnerability names,”
http://cve.mitre.org/,last accessed May 24, 2007
[10] Risk Mitigation for Cross Site Scripting Attacks Using Signature Based Model on the Server Side
Jayamsakthi Shanmugam, Dr.M.Ponnavaikko
[11] XSSDS: Server-side Detection of Cross-site Scripting Attacks , Martin Johns1, Bjorn Engelmann2,
and Joachim Posegga, 2008 Annual Computer Security Applications Conference
[12] CERT® Advisory CA-2200-02, “Malicious HTML Tags Embedded in Client Web Requests,”
http://www.cert.org/advisories/CA-2200-02.html, last accessed May 24, 2007.
[13] Battle of Benchmarkhttp://download.cnet.com/8301-2007_4-20047314-12.html
Computer Science & Information Technology (CS & IT) 405
AUTHORS PROFILES:
Name: RAVI KANTH KOTHA
Obtained his Bachelor of technology degree from KITS
Warangal and presently doing Master of Technology in
Department of IT at NITK Surathkal. His area of
interests are web security, network security, web
mining.
Name: GAURAV PRASAD
Working as lecturer in department of IT NITK
Surathkal. He has done his M.Tech from computer
science department NITK Surathkal with specialization
in information security .His area of interests are
Information security , cloud security, data security ,grid
security and web security.
Name: DINESH NAIK
Working as Asst Professor at Department of IT at
NITK Surathkal. Obtained Btech degree from
VBDTCE- Dawangar and M.Tech from NITTE .He
has been in the area of teaching since 2001 His area of
interests are computer network, information security,
web services, web mining

More Related Content

What's hot

A Review paper on Securing PHP based websites From Web Application Vulnerabil...
A Review paper on Securing PHP based websites From Web Application Vulnerabil...A Review paper on Securing PHP based websites From Web Application Vulnerabil...
A Review paper on Securing PHP based websites From Web Application Vulnerabil...Editor IJMTER
 
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.IRJET Journal
 
Tracing out Cross Site Scripting Vulnerabilities in Modern Scripts
Tracing out Cross Site Scripting Vulnerabilities in Modern ScriptsTracing out Cross Site Scripting Vulnerabilities in Modern Scripts
Tracing out Cross Site Scripting Vulnerabilities in Modern ScriptsEswar Publications
 
ImageSubXSS: an image substitute technique to prevent Cross-Site Scripting at...
ImageSubXSS: an image substitute technique to prevent Cross-Site Scripting at...ImageSubXSS: an image substitute technique to prevent Cross-Site Scripting at...
ImageSubXSS: an image substitute technique to prevent Cross-Site Scripting at...IJECEIAES
 
website vulnerability scanner and reporter research paper
website vulnerability scanner and reporter research paperwebsite vulnerability scanner and reporter research paper
website vulnerability scanner and reporter research paperBhagyashri Chalakh
 
vulnerability scanning and reporting tool
vulnerability scanning and reporting toolvulnerability scanning and reporting tool
vulnerability scanning and reporting toolBhagyashri Chalakh
 
Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...
Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...
Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...AM Publications
 
Study of Web Application Attacks & Their Countermeasures
Study of Web Application Attacks & Their CountermeasuresStudy of Web Application Attacks & Their Countermeasures
Study of Web Application Attacks & Their Countermeasuresidescitation
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application SecurityAbdul Wahid
 
Rational Unified Treatment for Web Application Vulnerability Assessment
Rational Unified Treatment for Web Application Vulnerability AssessmentRational Unified Treatment for Web Application Vulnerability Assessment
Rational Unified Treatment for Web Application Vulnerability AssessmentVESIT/University of Mumbai
 
Detection of Android Third Party Libraries based attacks
Detection of Android Third Party Libraries based attacksDetection of Android Third Party Libraries based attacks
Detection of Android Third Party Libraries based attacksAmina WADDIZ
 
A security note for web developers
A security note for web developersA security note for web developers
A security note for web developersJohn Ombagi
 
Security Compliance Web Application Risk Management
Security Compliance Web Application Risk ManagementSecurity Compliance Web Application Risk Management
Security Compliance Web Application Risk ManagementMarco Morana
 
Application Threat Modeling
Application Threat ModelingApplication Threat Modeling
Application Threat ModelingMarco Morana
 
Mitigating Privilege-Escalation Attacks on Android Report
Mitigating Privilege-Escalation Attacks on Android  ReportMitigating Privilege-Escalation Attacks on Android  Report
Mitigating Privilege-Escalation Attacks on Android ReportVinoth Kanna
 
Session2-Application Threat Modeling
Session2-Application Threat ModelingSession2-Application Threat Modeling
Session2-Application Threat Modelingzakieh alizadeh
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 

What's hot (20)

A Review paper on Securing PHP based websites From Web Application Vulnerabil...
A Review paper on Securing PHP based websites From Web Application Vulnerabil...A Review paper on Securing PHP based websites From Web Application Vulnerabil...
A Review paper on Securing PHP based websites From Web Application Vulnerabil...
 
web security
web securityweb security
web security
 
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
 
Tracing out Cross Site Scripting Vulnerabilities in Modern Scripts
Tracing out Cross Site Scripting Vulnerabilities in Modern ScriptsTracing out Cross Site Scripting Vulnerabilities in Modern Scripts
Tracing out Cross Site Scripting Vulnerabilities in Modern Scripts
 
ImageSubXSS: an image substitute technique to prevent Cross-Site Scripting at...
ImageSubXSS: an image substitute technique to prevent Cross-Site Scripting at...ImageSubXSS: an image substitute technique to prevent Cross-Site Scripting at...
ImageSubXSS: an image substitute technique to prevent Cross-Site Scripting at...
 
website vulnerability scanner and reporter research paper
website vulnerability scanner and reporter research paperwebsite vulnerability scanner and reporter research paper
website vulnerability scanner and reporter research paper
 
vulnerability scanning and reporting tool
vulnerability scanning and reporting toolvulnerability scanning and reporting tool
vulnerability scanning and reporting tool
 
C01461422
C01461422C01461422
C01461422
 
Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...
Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...
Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...
 
Study of Web Application Attacks & Their Countermeasures
Study of Web Application Attacks & Their CountermeasuresStudy of Web Application Attacks & Their Countermeasures
Study of Web Application Attacks & Their Countermeasures
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
 
Rapport X force 2014
Rapport X force 2014Rapport X force 2014
Rapport X force 2014
 
Rational Unified Treatment for Web Application Vulnerability Assessment
Rational Unified Treatment for Web Application Vulnerability AssessmentRational Unified Treatment for Web Application Vulnerability Assessment
Rational Unified Treatment for Web Application Vulnerability Assessment
 
Detection of Android Third Party Libraries based attacks
Detection of Android Third Party Libraries based attacksDetection of Android Third Party Libraries based attacks
Detection of Android Third Party Libraries based attacks
 
A security note for web developers
A security note for web developersA security note for web developers
A security note for web developers
 
Security Compliance Web Application Risk Management
Security Compliance Web Application Risk ManagementSecurity Compliance Web Application Risk Management
Security Compliance Web Application Risk Management
 
Application Threat Modeling
Application Threat ModelingApplication Threat Modeling
Application Threat Modeling
 
Mitigating Privilege-Escalation Attacks on Android Report
Mitigating Privilege-Escalation Attacks on Android  ReportMitigating Privilege-Escalation Attacks on Android  Report
Mitigating Privilege-Escalation Attacks on Android Report
 
Session2-Application Threat Modeling
Session2-Application Threat ModelingSession2-Application Threat Modeling
Session2-Application Threat Modeling
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 

Similar to Analysis of XSS attack Mitigation techniques based on Platforms and Browsers

Study of Cross-Site Scripting Attacks and Their Countermeasures
Study of Cross-Site Scripting Attacks and Their CountermeasuresStudy of Cross-Site Scripting Attacks and Their Countermeasures
Study of Cross-Site Scripting Attacks and Their CountermeasuresEditor IJCATR
 
13.2ResMilitary005651045-1058.pdf
13.2ResMilitary005651045-1058.pdf13.2ResMilitary005651045-1058.pdf
13.2ResMilitary005651045-1058.pdfsowmi59
 
Research challenges and issues in web security
Research challenges and issues in web securityResearch challenges and issues in web security
Research challenges and issues in web securityIAEME Publication
 
Web Vulnerabilities And Exploitation - Compromising The Web
Web Vulnerabilities And Exploitation - Compromising The WebWeb Vulnerabilities And Exploitation - Compromising The Web
Web Vulnerabilities And Exploitation - Compromising The WebZero Science Lab
 
React security vulnerabilities
React security vulnerabilitiesReact security vulnerabilities
React security vulnerabilitiesAngelinaJasper
 
A study on securing cloud environment from d do s attack to preserve data ava...
A study on securing cloud environment from d do s attack to preserve data ava...A study on securing cloud environment from d do s attack to preserve data ava...
A study on securing cloud environment from d do s attack to preserve data ava...Manimaran A
 
Factors Affecting The Threat Agent Involved
Factors Affecting The Threat Agent InvolvedFactors Affecting The Threat Agent Involved
Factors Affecting The Threat Agent InvolvedJennifer Campbell
 
Research Article On Web Application Security
Research Article On Web Application SecurityResearch Article On Web Application Security
Research Article On Web Application SecuritySaadSaif6
 
Sql Injection Attacks And A Web Application Environment
Sql Injection Attacks And A Web Application EnvironmentSql Injection Attacks And A Web Application Environment
Sql Injection Attacks And A Web Application EnvironmentSheri Elliott
 
Website hacking and prevention (All Tools,Topics & Technique )
Website hacking and prevention (All Tools,Topics & Technique )Website hacking and prevention (All Tools,Topics & Technique )
Website hacking and prevention (All Tools,Topics & Technique )Jay Nagar
 
The Web AppSec How-To: The Defender's Toolbox
The Web AppSec How-To: The Defender's ToolboxThe Web AppSec How-To: The Defender's Toolbox
The Web AppSec How-To: The Defender's ToolboxCheckmarx
 
Web Applications Assessment Tools: Comparison and Discussion
Web Applications Assessment Tools: Comparison and DiscussionWeb Applications Assessment Tools: Comparison and Discussion
Web Applications Assessment Tools: Comparison and DiscussionEECJOURNAL
 
Report on xss and do s
Report on xss and do sReport on xss and do s
Report on xss and do smehr77
 
Web app penetration testing best methods tools used
Web app penetration testing best methods tools usedWeb app penetration testing best methods tools used
Web app penetration testing best methods tools usedZoe Gilbert
 
A survey of cloud based secured web application
A survey of cloud based secured web applicationA survey of cloud based secured web application
A survey of cloud based secured web applicationIAEME Publication
 
Behavior Analysis Of Malicious Web Pages Through Client Honeypot For Detectio...
Behavior Analysis Of Malicious Web Pages Through Client Honeypot For Detectio...Behavior Analysis Of Malicious Web Pages Through Client Honeypot For Detectio...
Behavior Analysis Of Malicious Web Pages Through Client Honeypot For Detectio...IJERA Editor
 
IRJET- A Survey on Various Cross-Site Scripting Attacks and Few Prevention Ap...
IRJET- A Survey on Various Cross-Site Scripting Attacks and Few Prevention Ap...IRJET- A Survey on Various Cross-Site Scripting Attacks and Few Prevention Ap...
IRJET- A Survey on Various Cross-Site Scripting Attacks and Few Prevention Ap...IRJET Journal
 
Are you fighting_new_threats_with_old_weapons
Are you fighting_new_threats_with_old_weaponsAre you fighting_new_threats_with_old_weapons
Are you fighting_new_threats_with_old_weaponsBhargav Modi
 

Similar to Analysis of XSS attack Mitigation techniques based on Platforms and Browsers (20)

Study of Cross-Site Scripting Attacks and Their Countermeasures
Study of Cross-Site Scripting Attacks and Their CountermeasuresStudy of Cross-Site Scripting Attacks and Their Countermeasures
Study of Cross-Site Scripting Attacks and Their Countermeasures
 
13.2ResMilitary005651045-1058.pdf
13.2ResMilitary005651045-1058.pdf13.2ResMilitary005651045-1058.pdf
13.2ResMilitary005651045-1058.pdf
 
Research challenges and issues in web security
Research challenges and issues in web securityResearch challenges and issues in web security
Research challenges and issues in web security
 
Web Vulnerabilities And Exploitation - Compromising The Web
Web Vulnerabilities And Exploitation - Compromising The WebWeb Vulnerabilities And Exploitation - Compromising The Web
Web Vulnerabilities And Exploitation - Compromising The Web
 
Top Application Security Threats
Top Application Security Threats Top Application Security Threats
Top Application Security Threats
 
Research Paper
Research PaperResearch Paper
Research Paper
 
React security vulnerabilities
React security vulnerabilitiesReact security vulnerabilities
React security vulnerabilities
 
A study on securing cloud environment from d do s attack to preserve data ava...
A study on securing cloud environment from d do s attack to preserve data ava...A study on securing cloud environment from d do s attack to preserve data ava...
A study on securing cloud environment from d do s attack to preserve data ava...
 
Factors Affecting The Threat Agent Involved
Factors Affecting The Threat Agent InvolvedFactors Affecting The Threat Agent Involved
Factors Affecting The Threat Agent Involved
 
Research Article On Web Application Security
Research Article On Web Application SecurityResearch Article On Web Application Security
Research Article On Web Application Security
 
Sql Injection Attacks And A Web Application Environment
Sql Injection Attacks And A Web Application EnvironmentSql Injection Attacks And A Web Application Environment
Sql Injection Attacks And A Web Application Environment
 
Website hacking and prevention (All Tools,Topics & Technique )
Website hacking and prevention (All Tools,Topics & Technique )Website hacking and prevention (All Tools,Topics & Technique )
Website hacking and prevention (All Tools,Topics & Technique )
 
The Web AppSec How-To: The Defender's Toolbox
The Web AppSec How-To: The Defender's ToolboxThe Web AppSec How-To: The Defender's Toolbox
The Web AppSec How-To: The Defender's Toolbox
 
Web Applications Assessment Tools: Comparison and Discussion
Web Applications Assessment Tools: Comparison and DiscussionWeb Applications Assessment Tools: Comparison and Discussion
Web Applications Assessment Tools: Comparison and Discussion
 
Report on xss and do s
Report on xss and do sReport on xss and do s
Report on xss and do s
 
Web app penetration testing best methods tools used
Web app penetration testing best methods tools usedWeb app penetration testing best methods tools used
Web app penetration testing best methods tools used
 
A survey of cloud based secured web application
A survey of cloud based secured web applicationA survey of cloud based secured web application
A survey of cloud based secured web application
 
Behavior Analysis Of Malicious Web Pages Through Client Honeypot For Detectio...
Behavior Analysis Of Malicious Web Pages Through Client Honeypot For Detectio...Behavior Analysis Of Malicious Web Pages Through Client Honeypot For Detectio...
Behavior Analysis Of Malicious Web Pages Through Client Honeypot For Detectio...
 
IRJET- A Survey on Various Cross-Site Scripting Attacks and Few Prevention Ap...
IRJET- A Survey on Various Cross-Site Scripting Attacks and Few Prevention Ap...IRJET- A Survey on Various Cross-Site Scripting Attacks and Few Prevention Ap...
IRJET- A Survey on Various Cross-Site Scripting Attacks and Few Prevention Ap...
 
Are you fighting_new_threats_with_old_weapons
Are you fighting_new_threats_with_old_weaponsAre you fighting_new_threats_with_old_weapons
Are you fighting_new_threats_with_old_weapons
 

More from cscpconf

ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR cscpconf
 
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATIONcscpconf
 
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...cscpconf
 
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIESPROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIEScscpconf
 
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICA SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICcscpconf
 
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS cscpconf
 
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS cscpconf
 
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICTWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICcscpconf
 
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINDETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINcscpconf
 
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...cscpconf
 
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMIMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMcscpconf
 
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...cscpconf
 
AUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWAUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWcscpconf
 
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKCLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKcscpconf
 
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...cscpconf
 
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAPROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAcscpconf
 
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHCHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHcscpconf
 
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...cscpconf
 
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGESOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGEcscpconf
 
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTGENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTcscpconf
 

More from cscpconf (20)

ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
 
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
 
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
 
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIESPROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
 
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICA SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
 
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
 
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
 
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICTWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
 
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINDETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
 
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
 
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMIMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
 
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
 
AUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWAUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEW
 
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKCLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
 
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
 
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAPROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
 
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHCHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
 
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
 
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGESOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
 
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTGENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
 

Recently uploaded

“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 

Recently uploaded (20)

Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 

Analysis of XSS attack Mitigation techniques based on Platforms and Browsers

  • 1. David C. Wyld, et al. (Eds): CCSEA, SEA, CLOUD, DKMP, CS & IT 05, pp. 395–405, 2012. © CS & IT-CSCP 2012 DOI : 10.5121/csit.2012.2240 Analysis of XSS attack Mitigation techniques based on Platforms and Browsers Ravi Kanth Kotha, Gaurav Prasad and Dinesh Naik Department of Information Technology National Institute of Technology, Karnataka ravikanth1027@gmail.com,chgauravprasad@gmail.com, dinnaik@gmail.com ABSTRACT: In the recent years, everything is in web. It may be Organization’s administration software, Custom ERP application, Employee portals or Real estate portals. The Social networking sites like Face book, Twitter, MySpace which is a web application is been used by millions of users around the world. So web applications have become very popular among users. Hence they are observed and may be exploited by hackers. Researchers and industry experts state that the Cross-site Scripting (XSS) is the one of the top most vulnerabilities in the web application. The cross-site scripting has become a common vulnerability of many web sites and web applications. XSS consists in the exploitation of input validation flaws, with the purpose of injecting arbitrary script code which is later executed at the web browser of the victim. According to OSWAP, Cross-site scripting attacks on web applications have experienced an important rise in recent year. This demands an efficient approach on the server side to protect the users of the application as the reason for the vulnerability primarily lies on the server side. The actual exploitation is within the victim’s web browser on the client-side. Therefore, an operator of a web application has only very limited evidence of XSS issues. However, there are many solutions for this vulnerability. But such techniques may degrade the performance of the system. In such scenarios challenge is to decide which method, platform, browser and middleware can be used to overcome the vulnerabilities, with reasonable performance over head to the system. Inspired by this problem, we present performance comparison of two mitigation techniques for Cross-site Scripting (XSS) at the server side based on the parameters like application’s platform, middleware technology and browser used by the end user. We implemented Mitigation parsing technique using database and replace technique in different platforms, middleware and checked its performance. We calculated the time taken by different browsers to render the pages using two techniques under different platform and middleware. In this paper we proposed the best combination of development platform, browser and the middleware for the two mitigation technique with respect to developer and end users. KEYWORDS Parsing mitigation technique, replace technique, XSS attack, platform, middleware, browser, JAVA,C#.
  • 2. 396 Computer Science & Information Technology (CS & IT) 1. INTRODUCTION Today everything is in internet. It has become part of every individual’s daily activity. It may be related to information gathering or any other work. Web application is considered the backbone of every activity in internet. Almost all information are available in internet through web applications .The business applications (e-commerce, banking, transportation, web mail, blogs, etc) are now available as web-based applications. The demand for web applications also attracts adversaries that want to exploit the vulnerabilities. A survey conducted in 2007 estimated that 70% of the web applications are at risk of being hacked [1] and the fact that these applications can be accessed from everywhere in the globe, makes them even more interesting for attackers . Attacker is an individual whose main interest or aim is to obtain confidential data by performing malicious activities. He finds the vulnerabilities in the system and exploits it to gain information of the victim .There are many vulnerabilities in dynamic web applications. One such vulnerability is Cross Site Scripting [2][3]. According to Open Web Application Security Project (OWASP) , web application level vulnerabilities have a major part in getting attacked by any hacker.. Mainly the attacks are of injection type. Cross-Site Scripting is one of the main and important attack to be focused on as mentioned by OWASP[4]. The Cross Site Scripting attack is performed by changing the logic, semantics or syntax of a HTML tag [11] by inserting new keywords or operators. XSS Attack is a class of code injection attacks that happens when there is no proper input validation. Attacker can shape their illegitimate input as parts of formal script string which is operated by databases. Many web applications like social networking sites or any web applications could be the victims of this attack. Attacker by exploiting this vulnerability will be a threat to security attributes like confidentiality, integrity and authorization. XSS can also escape traditional tools such as firewalls and Intrusion Detection Systems (IDS) because they perform through ports used for regular web traffic which usually are open in firewalls. On the other hand, most IDS focus on the network and IP layers whereas XSS work at application layer. Researchers have proposed a range of techniques and tools to help developers to compensate the shortcoming of the defensive coding. Developers have to undergo some defensive coding practices to eliminate such vulnerabilities. The problem is that some current techniques and tools are impractical in reality because they could not address all types of attacks or have not been implemented yet. These techniques require modification in the original code or addition of some modules into the application. However these methods will not be full proof and result in performance degradation. So, there is a need to find the best combination of platform, browser and mitigation. The structure of the paper is as follows. Section 2 presents some background and discusses about XSS attack. Section 3 describes in details the two mitigation methods implemented and compared the performance based on different factors. Section 4 presents the implementation details and discusses the results .Finally section 5 concludes the paper. 2. Xss ATTACK Web application attacks are of greater impact than any other kind of applications and software. Since it is open to all and has wider attack surface .Even Attackers only need a web browser to access them and perform attack on them. If we are taking DREAD [6] as a mechanism or a tool to evaluate the severity of the systems then it is very high. The main reason is the attack can be reproduced easily and even can be performed using a web browser. If the attack is performed many user will be affected by it. Additionally, such vulnerabilities can serve as launching pads for other, more severe attacks on web users’ local systems. Cross-site scripting (XSS) is the class
  • 3. Computer Science & Information Technology (CS & IT) 397 of web application vulnerabilities in which an attack is caused by a victim’s browser to execute malicious script from the attacker. In 2006, 21.5% of all newly reported vulnerabilities were XSS, making it the most frequently reported vulnerability of the year [7,8,9].In the year 2010 it still maintains the same place or ranking. There are two basic techniques to accomplish an XSS attack .The first technique is to store malicious code in database and when accessed by client will be executed by the browser at the client side. The second technique requires that the victim without the knowledge of malicious link clicks on the link resulting in execution of malicious code. Figure1: Code for accessing cookie Figure 2: Malicious inserted into the tag 2.1. CAUSES OF XSS VULNERABILITIES In the category of common vulnerabilities , XSS in the internet community from several years XSS is vulnerability of a web application caused by the failure of the application in checking upon user input before returning it to client’s web browser. Several factors contribute to the prevalence of XSS vulnerabilities. First, the system requirements for XSS are minimal: XSS afflicts web applications that display untrusted input. Secondly most web application programming languages provide an unsafe default for passing un trusted input to the client. Typically, printing the entrusted input directly to the output page is the most straightforward way of displaying such data. The third factor is proper validation for untrusted input is difficult to get right, primarily because of the many, often browser-specific, ways of invoking the JavaScript interpreter. 3. MITIGATION TECHNIQUES There are various methods and techniques for preventing XSS attack. The mitigation techniques for the cross site scripting attack can be implemented at two sides server side and client side. The client side mitigation technique is implemented on the browser. Usually in this type of mitigation technique which is done at client side the main idea is to parse the incoming script and do proper validation. The browser which validates the scripts and then executes provided script is free from malicious code or results in malicious activity. And thus the client side mitigation helps to reduce the overhead of the web server by doing validation at browser side. Though the client side mitigation technique seems to be good enough there are some limitations. The client side mitigation can be done using scripting languages, thus making the attacker to view and gives a chance to the attacker to try different attack vectors. In the client side every user has to undergo the overhead of making changes to the validation techniques where as in server side it is done only once. Hence the client side mitigations are not recommended.
  • 4. 398 Computer Science & Information Technology (CS & IT) There are many server side mitigation techniques available. Sever before sending the script to the intended client performs the mitigation. Here, two server side mitigations are discussed and compared using different parameters. 3.1. MITIGATION WITH SUPPORT OF DATABASE The proposed system [10] in figure 3 is to have the features like, Configurable black listed tags, its attributes and object implementation procedure for misuse detection at the server side, and hence the existing web pages need not be modified for new threats. Whenever a new web page is introduced there is no need to modify the web page, since the security mechanism is separated from page level implementation and is placed at the top most layer of the web application. Security administrators need not know the entry points of individual web pages as there is a clear demarcation between the web application and security mechanisms implemented in this approach. The Implemented solution (Mitigation) comprises of four components namely Blocker, parser, verifier and black listed tag cluster (Database). The Research paper Authors used XML to store the Black listed tag clusters but it is again difficult to add some more black listed (TAG, ATTRIBUTE) sets when compared to Database. The remaining Procedures are followed as the paper proposed and the implementation of NOTIFICATION procedure is developed and added to notify the details of attacker and attack to the victim user (user to be attacked if mitigation is not present). Figure 3 : Flow of input through the components Blocker: When HTTP Request is received by the SERVER, those requests will redirected to this procedure, If any charecters like { '<', '>', '%', '&', '', '#', '/'} are present in the Request,it sends the Request to PARSER to get the TAGS and ATTRIBUTES used in the Request otherwise it redirects again to the Application. If the Parser gives the Vulnerabilty status as true then an ERROR page will be send to the attacker and notification sends to the victim. If the status is false request will handled by the Application.
  • 5. Computer Science & Information Technology (CS & IT) 399 Parser: This procedure creates the vector (tag, key, value) for each HTML or OTHER scripts in the request and sends each Vector to the Verifier to check whether given TAG is Maliciousor not. Verifier:This procedure uses the BlockListed Tag Cluster (Database) to check each vector given by parser contains any vulnerable scripts or not. If any of the vector falls true for vulnerable, It stops verifying and returns true to the Blocker. BlockListed Tag Cluster (Database): Here a rules table which contains the data as (TAG,KEY,CONDITION,VALUE) and it can updated by the Administrator and he can add new BlockListed Tags as he noticed. The many Common BlockListed Tags are already inserted to the Database . 3.2. SOLUTION BY REPLACING THE CODE The script shown in figure 1 gives a idea of how the cookies can be stolen. It looks like a good idea of delimiting malicious words and deleting them from the script. However the incoming script can be carved effectively to deceive the idea. This can be viewed in figure: Figure 4: Exploiting the delete technique The existing system the mitigation is done by parsing the whole data and deleting the words which may disclose the cookies or any escaping words .This process is repeated until there are no more malicious code or words. The technique [11] is to change those words in such a way that the pronunciation is same where as the spelling is different, instead of deleting the words. This makes the browser to consider the malicious code to be normal words. For example, the word “document” can be replaced with “dokument” so that the pronunciation remains same but will not execute the script. By this method the parsing need not to be done repeatedly because incase of deletion the algorithm followed is Least Common Subsequence which is time consuming process leading to performance degradation. Whereas here a REPLACE function is used such that there is no effect on the time of execution. . Thus making the script non executable by the browser. 4. IMPLEMENTATION The two techniques discussed are implemented in both Microsoft Visual Studio .NET 3.5 Framework and JAVA Standard Edition 6. Browser used to compare are Mozilla Firefox 3.6, Google Chrome and Internet Explorer. Here MYSQL is used as storage database.
  • 6. 400 Computer Science & Information Technology (CS & IT) 4.1. COMPARISON OF THE TWO TECHNIQUES The two proposed mitigation techniques are compared by taking the execution time of the both techniques. The result related to the implementation of mitigation in java platform is shown in the figure Figure 5: The comparison between Mitigation using database and REPLACE Function From the results it is infer that mitigation using database(M1) takes much time in execution than the replacement mitigation(M2). The execution time can be explained by databases connectivity and the time parsing the script. And a small part is even contributed by the housekeeping work done at the time of function calls. Here the backend database used is MYSQL which is connected using JDBC connector. In mitigation with replacement technique the main share of the execution time is the FIND and REPLACE functions. For implementation built-in functions are used . From the results it shown that mitigation with replacement is performing better than the earlier. But the drawback of this technique can be explained as it won’t allow any normal script that is the scripts used to display images and some links . 4.2. COMPARISON OF JAVA AND C# The two techniques which were been in discussion are implemented in JAVA and check for the execution time. Figure 6: Platform Comparisons for REPLACE method. The above graph is the execution time of the mitigation technique with REPLACE function. The t problem with REPLACE in C# is that it creates more string copies each time it is called. This can often lead to measurable performance problems in large projects. Microsoft notes that "This method does not modify the value of the current instance. Instead, it returns a new string in which all occurrences of old Value are replaced by new Value." Following picture from the MSDN
  • 7. Computer Science & Information Technology (CS & IT) 401 benchmark shows the result of execution of REPLACE function for short(20 characters) and long (1000 characters)[12]. Figure 7: The Time of execution for replace methods In Java the REPLACE function is implemented is different manner. Here the REPLACE function creates only one new string with replacing all the occurrences of the source string. And hence the performance of the function is better than in C#. 4.3. COMPARISON OF MITIGATION USING DATABASE The discussed mitigation technique which uses database is compared with the JAVA and C# implementation. Here the BACK END database is MYSQL which is an open source database available. By making the database as fixed the techniques are implemented and compared. The below results shows that MYSQL with JAVA as the developing platform performs better than the C# . Figure 8: The Platform comparison for Mitigation using Database. The graph clearly shows that time of execution for the proposed mitigation in C# is very high when compared to java .Since In Java the connection to database is done using JDBC connectors. The connection handling in java is implemented in an efficient method. Java uses a concept called CONNECTION POOLING where the recently used connection for the database is stored. For a web application which can have thousands of client requests for the database are connected using connection threads from this pool. Hence in java the execution time for SQL connection very low. C# also uses concept of CONNECTION POOL but the process of creating and establishing connection is done using a process. The major part of the execution time for connection establishment is for the process creation and killing the process after task 4.4. COMPARISON OF BROWSERS The same mitigation techniques were also observed using three different browsers to find the best browser based on the platform of the application. Firefox3.6 the leading browser in the market which uses four java engines called SPIDERMONKEY is found to be the best for java based application. The below graph can strengthens the above statement.
  • 8. 402 Computer Science & Information Technology (CS & IT) Figure 9: Mitigation Using Database In JAVA The graph also shows that Internet Explorer and Chrome which are the considered good browsers in market perform almost at equal level. The performance of IE and chrome is almost similar as the support for java from both the browsers is done by using single java engines only. From Bench Mark Battle a standard benchmark for comparing browsers has given almost same results [13]. The chrome‘s java engine Grease Monkey even in enhanced version also consumes same amount of time. This can be explained by the fact that the major part of the execution time is the boot time of the chrome. Thus performing equal to Internet Explorer which is having comparatively less boot up time. The comparison is even carried out for the C# implementation of the mitigations. In general notion the products from same vendor perform well. But in contrast Internet Explorer and C# which are from same vendor MICROSOFT seems to be not well supportive to each other. The argument can be supported from the below results. Figure 10: Mitigation using database in ASP From the above chart it can be infer that Google Chrome and Internet Explorer are having same execution time for the C# implementation. This can be explained because of the chrome’s process isolation and the add-ons. The features such as dynamic code generation, hidden class transitions, and precise garbage collection have made the execution time near to Internet Explorer. The mitigation technique using REPLACE function is also compared based on the factor browser. The technique is implemented both in C# and JAVA and deployed into the three browsers.
  • 9. Computer Science & Information Technology (CS & IT) 403 Figure 11: Mitigation using REPLACE function implemented in JAVA The mitigation technique using FIND and REPLACE function is implemented using JAVA and the compared based on the browser to be used for rendering. From the graph it is clear that the browser Mozilla Firefox takes very less time in rendering the implementation code compared to Google Chrome and Internet Explorer. Figure 12: Mitigation Without using Database in C# The same technique implemented in C# and compared for browser comparison. The result shows the browsers Internet explorer and Google chrome takes same time in rendering the pages. This can be justified from the chrome handling of the C# code. Firefox lags in this results showing the huge deployment time for C# code. 5. CONCLUSION The two server side mitigation techniques has been discussed and compared based on the platform, browser. Our work on comparison of mitigation techniques shows that the mitigation using REPLACE function performs better than the other. The java implementation of database mitigation technique performs better than C#. Among the three leading browsers say Google chrome and Internet Explorer perform almost equal either in JAVA or C#, but Fire Fox overtakes them when these two mitigation techniques discussed are considered..From all the results obtained we can clearly infer that an web application with mitigation technique with REPLACE function implemented in JAVA can give a good performance in browser FIREFOX.
  • 10. 404 Computer Science & Information Technology (CS & IT) REFERENCES [1] Acunetix Ltd, Feb. 2007, http://www.acunetix.com/news/securityauditresults.htm [2] The IT security.com Dictionary of Information Security," Cross Site Scripting (XSS, cross-site malicious content)", http://www.itsecurity.com/dictionary/xss.html [3] CERT Advisory CA-2000-02 Malicious HTML Tags Embedded in Client Web Requests, http://www.cert.org/advisories/CA-2000-02.html [4] OWASP Top 10-2010 rdc. [5] Testing and comparing web vulnerability scanning tools for SQL injection and XSS attacks José Fonseca Marco Vieira, Henrique Madeira 13th IEEE International Symposium on Pacific Rim Dependable Computing [6] Security-aware Software Development Life Cycle (SaSDLC) – Processes and Tools Asoke K Talukder1, Vineet Kumar Maurya1, Santhosh Babu G1, Jangam Ebenezer1, Muni Sekhar V1, Jevitha K P1, Saurabh Samanta1, Alwyn Roshan Pais [7] S. Christey. Vulnerability type distributions in CVE, Oct. 2006. http://cwe.mitre.org/documents/vuln- trends.html. [8] K. J. Higgins. Cross-site scripting: Attackers‟ new favorite flaw, September 2006. http://www.darkreading.com/ document.asp?doc_id=103774&WT.svl=news1_1. [9] Common Vulnerabilities and Exposures, "The standard for information security vulnerability names,” http://cve.mitre.org/,last accessed May 24, 2007 [10] Risk Mitigation for Cross Site Scripting Attacks Using Signature Based Model on the Server Side Jayamsakthi Shanmugam, Dr.M.Ponnavaikko [11] XSSDS: Server-side Detection of Cross-site Scripting Attacks , Martin Johns1, Bjorn Engelmann2, and Joachim Posegga, 2008 Annual Computer Security Applications Conference [12] CERT® Advisory CA-2200-02, “Malicious HTML Tags Embedded in Client Web Requests,” http://www.cert.org/advisories/CA-2200-02.html, last accessed May 24, 2007. [13] Battle of Benchmarkhttp://download.cnet.com/8301-2007_4-20047314-12.html
  • 11. Computer Science & Information Technology (CS & IT) 405 AUTHORS PROFILES: Name: RAVI KANTH KOTHA Obtained his Bachelor of technology degree from KITS Warangal and presently doing Master of Technology in Department of IT at NITK Surathkal. His area of interests are web security, network security, web mining. Name: GAURAV PRASAD Working as lecturer in department of IT NITK Surathkal. He has done his M.Tech from computer science department NITK Surathkal with specialization in information security .His area of interests are Information security , cloud security, data security ,grid security and web security. Name: DINESH NAIK Working as Asst Professor at Department of IT at NITK Surathkal. Obtained Btech degree from VBDTCE- Dawangar and M.Tech from NITTE .He has been in the area of teaching since 2001 His area of interests are computer network, information security, web services, web mining