2019
DOI: 10.1155/2019/2156906
|View full text |Cite
|
Sign up to set email alerts
|

WebMTD: Defeating Cross-Site Scripting Attacks Using Moving Target Defense

Abstract: Existing mitigation techniques for cross-site scripting attacks have not been widely adopted, primarily due to imposing impractical overheads on developers, Web servers, or Web browsers. They either enforce restrictive coding practices on developers, fail to support legacy Web applications, demand browser code modification, or fail to provide browser backward compatibility. Moving target defense (MTD) is a novel proactive class of techniques that aim to defeat attacks by imposing uncertainty in attack reconnai… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 13 publications
(27 reference statements)
0
4
0
1
Order By: Relevance
“…Niakanlahiji and Jafarian [12] present WebMTD, a proactive moving target defense mechanism that thwarts a broad class of code injection attacks on web applications, including XSS, HTML code injection, and server-side code injection attacks. Relying on built-in features of current web browsers, WebMTD randomizes certain attributes of web elements to differentiate the application code from the injected code and prevent the execution.…”
Section: Salas and Martinsmentioning
confidence: 99%
“…Niakanlahiji and Jafarian [12] present WebMTD, a proactive moving target defense mechanism that thwarts a broad class of code injection attacks on web applications, including XSS, HTML code injection, and server-side code injection attacks. Relying on built-in features of current web browsers, WebMTD randomizes certain attributes of web elements to differentiate the application code from the injected code and prevent the execution.…”
Section: Salas and Martinsmentioning
confidence: 99%
“…Niakanlahiji and Jafarian [129] proposed a different MTD technique. They modify web applications by adding a new attribute named runtimeID to suspicious tags with randomly generated hex value.…”
Section: Moving Target Defense (Mtd)mentioning
confidence: 99%
“…Double-spending attacks are one of the most popularly used threats by hackers in PoW algorithms. This type of attack occurs when the user controls more than 50% of the computing power [33]. Therefore, they can send a fraudulent transaction log to the network, enabling them to perform the same transaction multiple times by removing the record of previous transactions.…”
Section: Related Workmentioning
confidence: 99%