z-logo
open-access-imgOpen Access
A Survey on an Investigation of Detection & Prevention Methods for Cross-Site Scripting (XSS) Attacks
Author(s) -
Pradeepa. P. K
Publication year - 2022
Publication title -
international journal of advanced research in science, communication and technology
Language(s) - English
Resource type - Journals
ISSN - 2581-9429
DOI - 10.48175/ijarsct-2553
Subject(s) - cross site scripting , computer science , computer security , web application , web application security , scripting language , world wide web , password , javascript , the internet , web service , web development , operating system
Currently, web applications are utilized for constituting data along with service discharges over the World Wide Web. While these are dynamically used for security-primary services, thus they have ended up being a popular and valuable objective for the web-related vulnerabilities. Despite the fact that few suspicious systems have been developing to fortify the cutting edge web applications and improve the impelled against them. Numerous techniques are available to emphasize very serious vulnerability in the advanced web applications. Along with the multiplicity of protection vulnerabilities, Cross site scripting attack is the most probable vulnerability found in the present web applications on SNS condition which to be a infection for the cutting edge web applications. As of late, practically 70% of all vulnerabilities on the web were sorted as XSS-related vulnerabilities. Cross site scripting attacks grant an aggressor to implement the malicious contents on the individual's internet browser to bringing different indications, for example, data conciliation, taking of cookies, credit card numbers, and passwords and so on. This review paper centers on the different identification and remedial strategies utilized in the existing works for XSS attacks, alongside discussion about advantages and disadvantages of every technique. It has additionally discussed about an eminent level of technical categorization of XSS attacks.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here