z-logo
open-access-imgOpen Access
ImageSubXSS: an image substitute technique to prevent Cross-Site Scripting attacks
Author(s) -
Pmd Nagarjun,
Shaik Shakeel Ahamad
Publication year - 2019
Publication title -
international journal of electrical and computer engineering
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.277
H-Index - 22
ISSN - 2088-8708
DOI - 10.11591/ijece.v9i2.pp1393-1398
Subject(s) - cross site scripting , computer science , javascript , scripting language , computer security , web application , hacker , world wide web , web application security , client side scripting , web server , web page , operating system , the internet , web development , web api
Cross-Site Scripting (XSS) is one of serious web application attack. Web applications are involved in every activity of human life. JavaScript plays a major role in these web applications. In XSS attacks hacker inject malicious JavaScript into a trusted web application, execution of that malicious script may steal sensitive information from the user. Previous solutions to prevent XSS attacks require a lot of effort to integrate into existing web applications, some solutions works at client-side and some solutions works based on filter list which needs to be updated regularly. In this paper, we propose an Image Substitute technique (ImageSubXSS) to prevent Cross-Site Scripting attacks which works at the server-side. The proposed solution is implemented and evaluated on a number of XSS attacks. With a single line, developers can integrate ImageSubXSS into their applications and the proposed solution is able to prevent XSS attacks effectively.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here