ACCENTS Transactions on Information Security, Vol 4(15) ISSN (Online): 2455-7196 http://dx.doi.org/10.19101/TIS.2019.414001 17 Computation analysis and review based on cross-site scripting attack Manish Agrawal 1* , Kailash Patidar 2 , Rishi Kushwah 3 and Sudesh Chouhan 3 M.Tech Scholar, Department of Computer Science, School of Engineering, Sri Satya Sai University of Technology & Medical Sciences, Sehore, Madhya Pradesh, India 1 Professor and HOD, Department of Computer Science, School of Engineering, Sri Satya Sai University of Technology & Medical Sciences, Sehore, Madhya Pradesh, India 2 Assistant Professor, Department of Computer Science, School of Engineering, Sri Satya Sai University of Technology & Medical Sciences, Sehore, Madhya Pradesh, India 3 ©2019 Manish Agrawal et al. This is an open access article distributed under the Creative Commons Attribution (CC BY) License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. 1.Introduction The security directions in different arena are increasing and the security standards have been increased in several aspects. But the vulnerabilities are also increasing with different style. In terms of web application cross-site scripting (XSS) attack is the most common attack type [1−5]. In different application JavaScript and PHP framework have been used. The client-side code has generally embedded in HTML pages. The complexity and the security increase parallel in the way that it allow the vulnerabilities also. It follows the different mechanism to adopt and prevent the vulnerabilities in different possible way. XSS are a security issue that occurs in web applications. Different customers with different intensions can achieve SQL Injection strike in the unmistakable course in the web world [6−9]. The disobedient and most skillfully threating strike is SQL Injection alteration. In this Modify the hawkish supporting completions the affirmation, by sincere register with segments, for the course of action for of permit in-help and to execute self-self-assured code [10]. *Author for correspondence As to four frameworks and estimation are proposed in [11, 12], yet there is need of progress in the said field. The main objective of this paper is to computationally analysis and review based on cross- site scripting attack. 2.Literature review In 2018, Madhusudhan and Shashidhara [15] discussed about cross channel scripting (XCS). They have suggested this as the dangerous web application vulnerability. They have suggested that it is performed through network protocols. It is the variant of XSS. They have analyzed and discussed XCS attack in detail prospective. In 2018, Kaur et al. [16] suggested an offline and online based model for the malicious XSS attack detection on in online social network. They have tested their approach on five online social network for the XSS attack. Their result shows the little false positives and promising attack vulnerability detection. In 2018, Bukhari et al. [17] discussed the malicious functions. They have suggested XSS as the client- side code injection attack. They have focused on type Review Article Abstract In cross site scripting (XSS) attacks malicious scripts are inserted in the web files for accessing the information or degrade the performance of the website. Now day’s hackers are prominently using the scripts for malfunction scripting. In this paper a study has been presented for the prevention and detection of XSS attacks. This study provides a detail exploration of the methods used for detection, their impact and problem identification. It provides a systematic review for the exploration of the good methods in the direction of better detection of XSS attacks. Based on the analysis some future suggestions have been suggested. Keywords XSS, SQL injection attack, attack detection, PHP, J2EE, JSP.