2014
DOI: 10.7753/ijcatr0310.1001
|View full text |Cite
|
Sign up to set email alerts
|

Study of Cross-Site Scripting Attacks and Their Countermeasures

Abstract: -In present-day time, most of the associations are making use of web services for improved services to their clients. With the upturn in count of web users, there is a considerable hike in the web attacks. Thus, security becomes the dominant matter in web applications. The disparate kind of vulnerabilities resulted in the disparate types of attacks. The attackers may take benefit of these vulnerabilities and can misuse the data in the database. Study indicates that more than 80% of the web applications are vul… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 66 publications
0
2
0
Order By: Relevance
“…HTML and JavaScript form the major backbone in causing the XSS attacks [9]. There are many HTML and JavaScript tags the hackers come up with to attack web applications [10]. As cross site scripting attacks are easy to execute but difficult to prevent and trace, step by step detailed approach is proposed to avoid the attacks keeping in mind to not distort the user experience [11].…”
Section: Review Of Literaturementioning
confidence: 99%
“…HTML and JavaScript form the major backbone in causing the XSS attacks [9]. There are many HTML and JavaScript tags the hackers come up with to attack web applications [10]. As cross site scripting attacks are easy to execute but difficult to prevent and trace, step by step detailed approach is proposed to avoid the attacks keeping in mind to not distort the user experience [11].…”
Section: Review Of Literaturementioning
confidence: 99%
“…HTML and JavaScript form the main backbone for causing Web attacks [9]. There are many HTML and JavaScript tags a hacker can come up with to attack his Web application [10]. Web attacks are easy to execute but hard to prevent and track, so a detailed step-by-step approach to avoiding them is suggested, keeping in mind that the user experience is not compromised.…”
Section: Review Of Literaturementioning
confidence: 99%