首页> 外文期刊>International Journal on Computer Science and Engineering >Justified Cross-Site Scripting Attacks Prevention from Client-Side
【24h】

Justified Cross-Site Scripting Attacks Prevention from Client-Side

机译:从客户端防御正当的跨站点脚本攻击

获取原文
           

摘要

Web apps are fetching towards the overriding way to offer access to web services. In parallel, vulnerabilities of web application are being revealed and unveiled at an frightening rate. Web apps frequently make JavaScript code utilization that is entrenched into web pages to defend client-side behavior which is dynamic. This script code is accomplished in the circumstance of the client?s web browser. From malicious JavaScript code to shield the client?s environment, a mechanism known as sandboxing is utilized that confines a program to admittance only resources connected with its origin website. Regrettably, these protection mechanisms not succeed if a client can be attracted into malicious JavaScript code downloading from an in-between, faithful site. In this situation, the wicked script is approved complete entr?e to each and every resource (for example cookies and authentication tokens) that be in the right place to the trusted/faithful site. Those types of attacks are described as XSS (cross-site scripting) attacks. Commonly, cross-site scripting attacks are simple to perform, but complicated to identify and stop. One cause is the far above the ground HTML encoding methods flexibility, presenting the attacker a lot of chances for circumventing input filters on the server-side that must put off malicious scripts from entering into trusted/faithful sites. Also, developing a client-side way out is not simple cause of the complicatedness of recognizing JavaScript code as formatted as malicious. This theory shows that noxes is the finest of our understanding the initial client-side resolution to moderate cross-site scripting attacks. Noxes works as a web proxy and utilizes both automatically and manual produced rules to moderate possible cross-site scripting efforts. Noxes efficiently defends against data outflow from the client?s environment while needs least client communication and customization attempt.
机译:Web应用程序正朝着提供对Web服务的访问的最主要方式。同时,Web应用程序的漏洞正以惊人的速度被揭示和揭露。 Web应用程序经常利用植根于网页中的JavaScript代码来捍卫动态的客户端行为。该脚本代码是在客户端的Web浏览器情况下完成的。从恶意JavaScript代码到屏蔽客户端环境,利用了一种称为沙盒的机制,该机制将程序限制为仅允许与其原始网站连接的资源进入。遗憾的是,如果可以将客户端吸引到从真实站点之间进行的恶意JavaScript代码下载中,那么这些保护机制将不会成功。在这种情况下,邪恶脚本被批准完整输入到位于受信任/忠实站点正确位置的每个资源(例如cookie和身份验证令牌)。这些攻击类型称为XSS(跨站点脚本)攻击。通常,跨站点脚本攻击易于执行,但识别和阻止却很复杂。原因之一是HTML编码方法的灵活性远远超出地面,这为攻击者提供了很多机会来规避服务器端的输入过滤器,这些过滤器必须阻止恶意脚本进入可信/忠实的站点。同样,开发出客户端的出路并不是将JavaScript代码识别为恶意代码的复杂性的简单原因。该理论表明,对于我们了解中度跨站点脚本攻击的初始客户端解决方案而言,noxes是最好的。 Noxes充当Web代理,并利用自动和手动生成的规则来缓和可能的跨站点脚本编写工作。 Noxes有效地防御了来自客户端环境的数据流出,同时需要最少的客户端通信和自定义尝试。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号