000 -LEADER |
fixed length control field |
a |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OSt |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20210210144144.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
210210b xxu||||| |||| 00| 0 eng d |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
AIKTC-KRRC |
Transcribing agency |
AIKTC-KRRC |
100 ## - MAIN ENTRY--PERSONAL NAME |
9 (RLIN) |
13261 |
Author |
Mohd, Umar John |
245 ## - TITLE STATEMENT |
Title |
Web Abuse Using Cross Site Scripting (XSS) Attacks |
250 ## - EDITION STATEMENT |
Volume, Issue number |
Vol 6 (1), Jan-Apr |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
New Delhi |
Name of publisher, distributor, etc. |
STM Journals |
Year |
2019 |
300 ## - PHYSICAL DESCRIPTION |
Pagination |
69-75p. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
modern world, most of the applications are using World Wide Web (www) for information processing and transaction management. The popularity of web has eased out global outreach and accessibility to different users around the globe. Although web traffic has scaled up, it has also increased the abuse of applications by malicious html-based attacks by users; one such attack being the cross-site scripting (XSS). This attack poses a serious threat to web applications and e-databases that may include sensitive user data. Although other web attacks like SQL Injection, CSRF, phishing and session hijacking are also common, XSS tops the list of preferred technique for hackers to capitalize web resources for malicious activities. In this paper, we draw an overview of XSS attacks and its different types. We also discuss certain code prevention techniques possible including robust defense mechanisms. The paper also explicates discussion over the related work that has been concluded by researchers for mitigation scenario and techniques possible for prevention. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
9 (RLIN) |
4622 |
Topical term or geographic name entry element |
Computer Engineering |
700 ## - ADDED ENTRY--PERSONAL NAME |
9 (RLIN) |
13262 |
Co-Author |
Shah, Junaid Latief |
773 0# - HOST ITEM ENTRY |
Place, publisher, and date of publication |
Noida STM Journals |
Title |
Journal of artificial intelligence research and advances (JoAIRA) |
856 ## - ELECTRONIC LOCATION AND ACCESS |
URL |
http://computers.stmjournals.com/index.php?journal=JoAIRA&page=article&op=view&path%5B%5D=1781 |
Link text |
Click Here |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Koha item type |
Articles Abstract Database |