Visible to the public Reducing attack surface corresponding to Type 1 cross-site scripting attacks using secure development life cycle practices

TitleReducing attack surface corresponding to Type 1 cross-site scripting attacks using secure development life cycle practices
Publication TypeConference Paper
Year of Publication2018
AuthorsBukhari, Syed Nisar, Ahmad Dar, Muneer, Iqbal, Ummer
Conference Name2018 Fourth International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB)
KeywordsAttack, attack surface, Browsers, client-side code injection attack, clients Web browser, Cross Site Scripting, cross-site scripting, encoding, Human Behavior, Internet, Internet based application, legitimate Web site, Libraries, malicious functions, malicious links, Malware, non-persistent, nonpersistent cross-site scripting attack, online front-ends, pubcrawl, resilience, Scalability, secure development life cycle practices, Uniform resource locators, Web based application vulnerabilities, Web request, Web response, Web server, Web sites, Web users, XSS
Abstract

While because the range of web users have increased exponentially, thus has the quantity of attacks that decide to use it for malicious functions. The vulnerability that has become usually exploited is thought as cross-site scripting (XSS). Cross-site Scripting (XSS) refers to client-side code injection attack whereby a malicious user will execute malicious scripts (also usually stated as a malicious payload) into a legitimate web site or web based application. XSS is amongst the foremost rampant of web based application vulnerabilities and happens once an internet based application makes use of un-validated or un-encoded user input at intervals the output it generates. In such instances, the victim is unaware that their data is being transferred from a website that he/she trusts to a different site controlled by the malicious user. In this paper we shall focus on type 1 or "non-persistent cross-site scripting". With non-persistent cross-site scripting, malicious code or script is embedded in a Web request, and then partially or entirely echoed (or "reflected") by the Web server without encoding or validation in the Web response. The malicious code or script is then executed in the client's Web browser which could lead to several negative outcomes, such as the theft of session data and accessing sensitive data within cookies. In order for this type of cross-site scripting to be successful, a malicious user must coerce a user into clicking a link that triggers the non-persistent cross-site scripting attack. This is usually done through an email that encourages the user to click on a provided malicious link, or to visit a web site that is fraught with malicious links. In this paper it will be discussed and elaborated as to how attack surfaces related to type 1 or "non-persistent cross-site scripting" attack shall be reduced using secure development life cycle practices and techniques.

DOI10.1109/AEEICB.2018.8480945
Citation Keybukhari_reducing_2018