Reducing attack surface corresponding to Type 1 cross-site scripting attacks using secure development life cycle practices
Title | Reducing attack surface corresponding to Type 1 cross-site scripting attacks using secure development life cycle practices |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Bukhari, Syed Nisar, Ahmad Dar, Muneer, Iqbal, Ummer |
Conference Name | 2018 Fourth International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB) |
Keywords | Attack, attack surface, Browsers, client-side code injection attack, clients Web browser, Cross Site Scripting, cross-site scripting, encoding, Human Behavior, Internet, Internet based application, legitimate Web site, Libraries, malicious functions, malicious links, Malware, non-persistent, nonpersistent cross-site scripting attack, online front-ends, pubcrawl, resilience, Scalability, secure development life cycle practices, Uniform resource locators, Web based application vulnerabilities, Web request, Web response, Web server, Web sites, Web users, XSS |
Abstract | While because the range of web users have increased exponentially, thus has the quantity of attacks that decide to use it for malicious functions. The vulnerability that has become usually exploited is thought as cross-site scripting (XSS). Cross-site Scripting (XSS) refers to client-side code injection attack whereby a malicious user will execute malicious scripts (also usually stated as a malicious payload) into a legitimate web site or web based application. XSS is amongst the foremost rampant of web based application vulnerabilities and happens once an internet based application makes use of un-validated or un-encoded user input at intervals the output it generates. In such instances, the victim is unaware that their data is being transferred from a website that he/she trusts to a different site controlled by the malicious user. In this paper we shall focus on type 1 or "non-persistent cross-site scripting". With non-persistent cross-site scripting, malicious code or script is embedded in a Web request, and then partially or entirely echoed (or "reflected") by the Web server without encoding or validation in the Web response. The malicious code or script is then executed in the client's Web browser which could lead to several negative outcomes, such as the theft of session data and accessing sensitive data within cookies. In order for this type of cross-site scripting to be successful, a malicious user must coerce a user into clicking a link that triggers the non-persistent cross-site scripting attack. This is usually done through an email that encourages the user to click on a provided malicious link, or to visit a web site that is fraught with malicious links. In this paper it will be discussed and elaborated as to how attack surfaces related to type 1 or "non-persistent cross-site scripting" attack shall be reduced using secure development life cycle practices and techniques. |
DOI | 10.1109/AEEICB.2018.8480945 |
Citation Key | bukhari_reducing_2018 |
- malware
- XSS
- Web users
- Web sites
- Web server
- Web response
- Web request
- Web based application vulnerabilities
- Uniform resource locators
- secure development life cycle practices
- Scalability
- resilience
- pubcrawl
- online front-ends
- nonpersistent cross-site scripting attack
- non-persistent
- attack
- malicious links
- malicious functions
- Libraries
- legitimate Web site
- Internet based application
- internet
- Human behavior
- encoding
- cross-site scripting
- Cross Site Scripting
- clients Web browser
- client-side code injection attack
- Browsers
- attack surface