首页> 外文会议>Computer and Computational Sciences (IMSCCS), 2007 Second International Multisymposium on >Risk Mitigation for Cross Site Scripting Attacks Using SignatureBased Model on the Server Side
【24h】

Risk Mitigation for Cross Site Scripting Attacks Using SignatureBased Model on the Server Side

机译:使用服务器端基于签名的模型缓解跨站点脚本攻击的风险

获取原文

摘要

Researchers and industry experts state that the Cross-site Scripting (XSS) is the top most vulnerability in the web applications. Attacks on web applications are increasing with the implementation of newer technologies, new html tags and new JavaScript functions. This demands an efficient approach on the server side to protect the users of the application. The proposed Signature based misuse detection approach introduces a security layer on top of the web application, so that the existing web application remain unchanged whenever a new threat is introduced that demands new security mechanisms. The web pages that are newly introduced in the web application need not be changed to incorporate the security mechanisms as the solution is implemented on top of the web application. To test the effectiveness of this approach, the vulnerable web inputs listed in research sites, black-hat hacker sites and in the black hat hacker sites are considered. The proposed security system was run on JBoss server and tested on those vulnerable inputs collected from the above sites. There are around 100 variants of XSS attacks found during the testing. It has been found that the approach is very effective as it addresses the vulnerabilities at a granular level of tags and attributes, in addition to addressing the XSS vulnerabilities. Keywords: Application-level web Security, cross-site scripting, security vulnerabilities.
机译:研究人员和行业专家指出,跨站点脚本(XSS)是Web应用程序中最严重的漏洞。随着新技术,新html标签和新JavaScript功能的实施,对Web应用程序的攻击越来越多。这要求在服务器端采用一种有效的方法来保护应用程序的用户。所提出的基于签名的滥用检测方法在Web应用程序的顶部引入了安全层,因此,只要引入了需要新安全机制的新威胁,现有的Web应用程序便保持不变。由于该解决方案是在Web应用程序之上实现的,因此无需更改Web应用程序中新引入的Web页面以合并安全机制。为了测试这种方法的有效性,考虑了研究站点,黑帽黑客站点和黑帽黑客站点中列出的易受攻击的Web输入。提议的安全系统在JBoss服务器上运行,并且对从上述站点收集的那些易受攻击的输入进行了测试。测试期间发现了大约100种XSS攻击变体。已经发现,该方法非常有效,因为它除了解决XSS漏洞外,还在标签和属性的粒度级别解决了漏洞。关键字:应用程序级Web安全性,跨站点脚本,安全漏洞。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号