Cross Site Scripting: Detection Approaches in Web Application
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 10
Abstract
Web applications have become one of the standard platforms for service releases and representing information and data over the World Wide Web. Thus, security vulnerabilities headed to various type of attacks in web applications. Amongst those is Cross Site Scripting also known as XSS. XSS can be considered as one of the most popular type of threat in web security application. XSS occurs by injecting the malicious scripts into web application, and it can lead to significant violations at the site or for the user. This paper highlights the issues (i.e. security and vulnerability) in web application specifically in regards to XSS. In addition, the future direction of research within this domain is highlighted.
Authors and Affiliations
Abdalla Marashdih, Zarul Zaaba
A New Approach for Time Series Forecasting: Bayesian Enhanced by Fractional Brownian Motion with Application to Rainfall Series
A new predictor algorithm based on Bayesian enhanced approach (BEA) for long-term chaotic time series using artificial neural networks (ANN) is presented. The technique based on stochastic models uses Bayesian inference...
Medical Image De-Noising Schemes using Wavelet Transform with Fixed form Thresholding
Medical Imaging is currently a hot area of bio-medical engineers, researchers and medical doctors as it is extensively used in diagnosing of human health and by health care institutes. The imaging equipment is the device...
An Approach to Finding Similarity Between Two Community Graphs Using Graph Mining Techniques
Graph similarity has studied in the fields of shape retrieval, object recognition, face recognition and many more areas. Sometimes it is important to compare two community graphs for similarity which makes easier for min...
A Novel Approach to Rank Text-based Essays using Pagerank Method Towards Student’s Motivational Element
Learning outcomes is one of the important factors to measure student achievement during the learning process. Today’s learning is more focused on problem-solving and reasoning to existing problems than an ordinary proble...
RC4 stream cipher and possible attacks on WEP
In this paper we analyze and present some weaknesses and possible attacks on the RC4 stream cipher which were published in many journals. We review some advantages and disadvantages which come from several authors,...