ACCENTS Transactions on Information Security, Vol 4(15)
ISSN (Online): 2455-7196
http://dx.doi.org/10.19101/TIS.2019.414001
17
Computation analysis and review based on cross-site scripting attack
Manish Agrawal
1*
, Kailash Patidar
2
, Rishi Kushwah
3
and Sudesh Chouhan
3
M.Tech Scholar, Department of Computer Science, School of Engineering, Sri Satya Sai University of Technology
& Medical Sciences, Sehore, Madhya Pradesh, India
1
Professor and HOD, Department of Computer Science, School of Engineering, Sri Satya Sai University of
Technology & Medical Sciences, Sehore, Madhya Pradesh, India
2
Assistant Professor, Department of Computer Science, School of Engineering, Sri Satya Sai University of
Technology & Medical Sciences, Sehore, Madhya Pradesh, India
3
©2019 Manish Agrawal et al. This is an open access article distributed under the Creative Commons Attribution (CC BY)
License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly
cited.
1.Introduction
The security directions in different arena are
increasing and the security standards have been
increased in several aspects. But the vulnerabilities
are also increasing with different style. In terms of
web application cross-site scripting (XSS) attack is
the most common attack type [1−5]. In different
application JavaScript and PHP framework have been
used. The client-side code has generally embedded in
HTML pages. The complexity and the security
increase parallel in the way that it allow the
vulnerabilities also. It follows the different
mechanism to adopt and prevent the vulnerabilities in
different possible way. XSS are a security issue that
occurs in web applications. Different customers with
different intensions can achieve SQL Injection strike
in the unmistakable course in the web world [6−9].
The disobedient and most skillfully threating strike is
SQL Injection alteration. In this Modify the hawkish
supporting completions the affirmation, by sincere
register with segments, for the course of action for of
permit in-help and to execute self-self-assured code
[10].
*Author for correspondence
As to four frameworks and estimation are proposed
in [11, 12], yet there is need of progress in the said
field. The main objective of this paper is to
computationally analysis and review based on cross-
site scripting attack.
2.Literature review
In 2018, Madhusudhan and Shashidhara [15]
discussed about cross channel scripting (XCS). They
have suggested this as the dangerous web application
vulnerability. They have suggested that it is
performed through network protocols. It is the variant
of XSS. They have analyzed and discussed XCS
attack in detail prospective.
In 2018, Kaur et al. [16] suggested an offline and
online based model for the malicious XSS attack
detection on in online social network. They have
tested their approach on five online social network
for the XSS attack. Their result shows the little false
positives and promising attack vulnerability
detection.
In 2018, Bukhari et al. [17] discussed the malicious
functions. They have suggested XSS as the client-
side code injection attack. They have focused on type
Review Article
Abstract
In cross site scripting (XSS) attacks malicious scripts are inserted in the web files for accessing the information or
degrade the performance of the website. Now day’s hackers are prominently using the scripts for malfunction scripting.
In this paper a study has been presented for the prevention and detection of XSS attacks. This study provides a detail
exploration of the methods used for detection, their impact and problem identification. It provides a systematic review for
the exploration of the good methods in the direction of better detection of XSS attacks. Based on the analysis some future
suggestions have been suggested.
Keywords
XSS, SQL injection attack, attack detection, PHP, J2EE, JSP.