Web application firewall using XSS

Authors

  • M Surekha

  • K Kiran Kumar

  • M V.S.Prasanth

  • P S.G.Aruna Sri

How to Cite

Surekha, M., Kiran Kumar, K., V.S.Prasanth, M., & S.G.Aruna Sri, P. (2018). Web application firewall using XSS. International Journal of Engineering and Technology, 7(2.7), 941-943. https://doi.org/10.14419/ijet.v7i2.7.11429

Received date: April 12, 2018

Accepted date: April 12, 2018

Published date: March 18, 2018

DOI:

https://doi.org/10.14419/ijet.v7i2.7.11429

Keywords:

Web Application, Firewall, XSSME, SQLMAP, HTTP.

Abstract

Web Applications security has turned out to be logically more essential nowadays. Tremendous quantities of assaults are being sent on the web application layer. Because of emotional increment in Web applications, security gets helpless against assortment of dangers. The ma-jority of these assaults are focused towards the web application layer and system firewall alone can't keep these sorts of assaults. The essen-tial explanation for achievement of these assaults is the numbness of utilization designers while composing the web applications and the vulnerabilities in the current advancements. Web application assaults are the most recent pattern and programmers are attempting to abuse the web application utilizing diverse strategies. Different arrangements are accessible as open source and in business showcase. Be that as it may, the choice of appropriate answer for the security of the authoritative frameworks is a noteworthy issue. This overview paper looked at the Web Application Firewall (WAF) arrangements with critical highlights essential for the security at application layer. Basic examination on WAF arrangements is useful for the clients to choose the most appropriate answer for their surroundings.

 

 

References

  1. [1] Security Compass (2010) Retrieved from the link https://addons. Mozil la.org/enUS/firefox/addon/xss-me/.

    [2] Damele, B., & Stampar, M. (2011). Sqlmaps's user manual. Re-trieved from http://sqlmap.sourceforge.net/doc/ README.pdf.

    [3] Hansen, R. (2008). Xss cheat sheet. Retrieved from http://ha.ckers. Org/xss.html.

    [4] HP DVlabs, (2010). 2010 full year top cyber security risks report Retrieved from http://dvlabs.tippingpoint.com/img/FullYear2010 Risk Report.pdf.

    [5] Ivey, T. (2010). Damn vulnerable web application official documentation Retrieved from https://dvwa_svn_sourceforge.net/svnro ot/dvwa/docs/DVWA_ vl 3.pdf.

    [6] Phongthiproek, p. (2011). Beyond sqli: Obfuscatedandbypass. Retrieved from http://www.exploit-db.com/papers/17934/.

    [7] vela,E.,& Lindsay, D.(2009).Our favorite xss filters/ids.Retrieved from http://www.blackhat.com/presentations/bhusa09/VELANAVA/BHUSA09-VelaNava-FavoriteXSSSLIDES.pdf.

Downloads

How to Cite

Surekha, M., Kiran Kumar, K., V.S.Prasanth, M., & S.G.Aruna Sri, P. (2018). Web application firewall using XSS. International Journal of Engineering and Technology, 7(2.7), 941-943. https://doi.org/10.14419/ijet.v7i2.7.11429

Received date: April 12, 2018

Accepted date: April 12, 2018

Published date: March 18, 2018