Web application firewall using XSS

  • Authors

    • M Surekha
    • K Kiran Kumar
    • M V.S.Prasanth
    • P S.G.Aruna Sri
    2018-03-18
    https://doi.org/10.14419/ijet.v7i2.7.11429
  • Web Application, Firewall, XSSME, SQLMAP, HTTP.
  • Web Applications security has turned out to be logically more essential nowadays. Tremendous quantities of assaults are being sent on the web application layer. Because of emotional increment in Web applications, security gets helpless against assortment of dangers. The ma-jority of these assaults are focused towards the web application layer and system firewall alone can't keep these sorts of assaults. The essen-tial explanation for achievement of these assaults is the numbness of utilization designers while composing the web applications and the vulnerabilities in the current advancements. Web application assaults are the most recent pattern and programmers are attempting to abuse the web application utilizing diverse strategies. Different arrangements are accessible as open source and in business showcase. Be that as it may, the choice of appropriate answer for the security of the authoritative frameworks is a noteworthy issue. This overview paper looked at the Web Application Firewall (WAF) arrangements with critical highlights essential for the security at application layer. Basic examination on WAF arrangements is useful for the clients to choose the most appropriate answer for their surroundings.

     

     

  • References

    1. [1] Security Compass (2010) Retrieved from the link https://addons. Mozil la.org/enUS/firefox/addon/xss-me/.

      [2] Damele, B., & Stampar, M. (2011). Sqlmaps's user manual. Re-trieved from http://sqlmap.sourceforge.net/doc/ README.pdf.

      [3] Hansen, R. (2008). Xss cheat sheet. Retrieved from http://ha.ckers. Org/xss.html.

      [4] HP DVlabs, (2010). 2010 full year top cyber security risks report Retrieved from http://dvlabs.tippingpoint.com/img/FullYear2010 Risk Report.pdf.

      [5] Ivey, T. (2010). Damn vulnerable web application official documentation Retrieved from https://dvwa_svn_sourceforge.net/svnro ot/dvwa/docs/DVWA_ vl 3.pdf.

      [6] Phongthiproek, p. (2011). Beyond sqli: Obfuscatedandbypass. Retrieved from http://www.exploit-db.com/papers/17934/.

      [7] vela,E.,& Lindsay, D.(2009).Our favorite xss filters/ids.Retrieved from http://www.blackhat.com/presentations/bhusa09/VELANAVA/BHUSA09-VelaNava-FavoriteXSSSLIDES.pdf.

  • Downloads

  • How to Cite

    Surekha, M., Kiran Kumar, K., V.S.Prasanth, M., & S.G.Aruna Sri, P. (2018). Web application firewall using XSS. International Journal of Engineering & Technology, 7(2.7), 941-943. https://doi.org/10.14419/ijet.v7i2.7.11429