CFP last date
20 May 2024
Reseach Article

Prevention of Cross Site Scripting with E-Guard Algorithm

by M. James Stephen, P.V.G.D. Prasad Reddy, Ch. Demudu Naidu, Ch. Rajesh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 22 - Number 5
Year of Publication: 2011
Authors: M. James Stephen, P.V.G.D. Prasad Reddy, Ch. Demudu Naidu, Ch. Rajesh
10.5120/2577-3557

M. James Stephen, P.V.G.D. Prasad Reddy, Ch. Demudu Naidu, Ch. Rajesh . Prevention of Cross Site Scripting with E-Guard Algorithm. International Journal of Computer Applications. 22, 5 ( May 2011), 30-34. DOI=10.5120/2577-3557

@article{ 10.5120/2577-3557,
author = { M. James Stephen, P.V.G.D. Prasad Reddy, Ch. Demudu Naidu, Ch. Rajesh },
title = { Prevention of Cross Site Scripting with E-Guard Algorithm },
journal = { International Journal of Computer Applications },
issue_date = { May 2011 },
volume = { 22 },
number = { 5 },
month = { May },
year = { 2011 },
issn = { 0975-8887 },
pages = { 30-34 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume22/number5/2577-3557/ },
doi = { 10.5120/2577-3557 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:08:39.406485+05:30
%A M. James Stephen
%A P.V.G.D. Prasad Reddy
%A Ch. Demudu Naidu
%A Ch. Rajesh
%T Prevention of Cross Site Scripting with E-Guard Algorithm
%J International Journal of Computer Applications
%@ 0975-8887
%V 22
%N 5
%P 30-34
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this world of networking where people around the globe are connected, Cross-site Scripting (XSS) has emerged to one of the most prevalent growing threat. XSS attacks are those in which attackers inject malicious codes, most often client-side scripts, into web applications from outside sources. Because of the number of possible injection location and techniques, many applications are vulnerable to this attack method. Even though the main reason for the vulnerability primarily lies on the server side, the actual exploitation is within the victim’s web browser on the client side.

References
  1. S. Christey and R.A Martin. vulnerability type distributions in cve, version 1.1. [online], http://cwe.mitre. Org/documents/vuln-trends/index.html,(09/11/07), may 2007.
  2. A. Klien. Cross site scripting explained. White paper, sanctum security group, http:// crypto.stanford.edu/cs155/css.pdf, june 2002.
  3. Cross site scripting techniques and mitigation by CESG revision 1.0, October 2007.
  4. Blwood. Multiple xss vulnerabilities in tikiwiki 1.9.x.mailing list BUgtraq, http://www.security focus.com/archive/1/435137/30/120/threaded, may 2006.\
  5. SC magazine on the article Redditt Succumbs then cleans up from XSS Attack by Dan Kaplan dated September 28,2009.
  6. False Positive defined at Virus list.com .
  7. How serious are XSS threats http://doteduguru.com/id3067.
Index Terms

Computer Science
Information Sciences

Keywords

XSS attack Enhanced XSS Guard algorithm E-Guard Server-side detection Client-side detection