Published August 26, 2017 | Version v1
Journal article Open

Protecting Web Applications from Cross-Site Scripting Attacks

  • 1. Computer Engineering Department, Ahlia University, Bahrain
  • 2. Information Technology Department, Ahlia University, Bahrain

Description

Existence of cross-site scripting (XSS) vulnerability can be traced back to 1995 during early days of Internet penetration. JavaScript, a programming language developed by Netscape, came into being around the same time. The noble intention of this programming language was for designing web applications to be more interactive. However, cyber criminals also learned how to trick users to load malicious scripts into websites, thus allowing them to access confidential data or compromise services. The enormity of such attacks promoted some organizations to engage in monitoring of XSS attacks and researching on new ways to defeat attacks that are similar to XSS worm on MySpace.com social networking site in 2005. The primary Focus in this aper is to try to avoid execution of XSS attacks by providing proper validations and methods to clean the user input from any script tags. XSS attacks can be minimized by proper handling of user input in a web application, which means that’s validating the input provided by the user and stripping it of any of harmful code or tags.

Files

Files (1.6 MB)

Name Size Download all
md5:0abf5802e2db367ad4373cb53fe59f6a
1.6 MB Download