z-logo
open-access-imgOpen Access
Presentation of a Pattern to Counteract the Attacks of XSS Malware
Author(s) -
Abbas Ali,
Nasser Modiri
Publication year - 2016
Publication title -
international journal of computer applications
Language(s) - English
Resource type - Journals
ISSN - 0975-8887
DOI - 10.5120/ijca2016910014
Subject(s) - computer science , presentation (obstetrics) , malware , cross site scripting , computer security , world wide web , medicine , the internet , web development , web application security , radiology
Cross Site programming (XSS) is the script attack in web pages, and it is accounted as one of the most dangerous problems of web applications. The researchers of security have investigated on different problems and they have found that the XSS vulnerability exists in many of known websites. The vulnerability is applied when an attacker reaches to an authorized user’s web explorer optionally and he/she might do cookie theft, develop destructive software, thieve the session and change the path of destruction. The validation of the user’s input is the first obstacle to protect the web applications against this vulnerability. The main aim of improving the security of web applications is improvement in the quality of user’s input validation. Unfortunately, the web application developers usually forget the user’s input validation and/or implement a weak validation. In this paper, it is attempted to present a pattern to validate the user’s input correctly in the web applications, and the obtained results are compared with the tools of scanning the existing vulnerability.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom