使用安全开发生命周期实践减少与类型1跨站点脚本攻击相对应的攻击面

Syed Nisar Bukhari, Muneer Ahmad Dar, Ummer Iqbal
{"title":"使用安全开发生命周期实践减少与类型1跨站点脚本攻击相对应的攻击面","authors":"Syed Nisar Bukhari, Muneer Ahmad Dar, Ummer Iqbal","doi":"10.1109/AEEICB.2018.8480945","DOIUrl":null,"url":null,"abstract":"While because the range of web users have increased exponentially, thus has the quantity of attacks that decide to use it for malicious functions. The vulnerability that has become usually exploited is thought as cross-site scripting (XSS). Cross-site Scripting (XSS) refers to client-side code injection attack whereby a malicious user will execute malicious scripts (also usually stated as a malicious payload) into a legitimate web site or web based application. XSS is amongst the foremost rampant of web based application vulnerabilities and happens once an internet based application makes use of un-validated or un-encoded user input at intervals the output it generates. In such instances, the victim is unaware that their data is being transferred from a website that he/she trusts to a different site controlled by the malicious user. In this paper we shall focus on type 1 or \"non-persistent cross-site scripting\". With non-persistent cross-site scripting, malicious code or script is embedded in a Web request, and then partially or entirely echoed (or \"reflected\") by the Web server without encoding or validation in the Web response. The malicious code or script is then executed in the client’s Web browser which could lead to several negative outcomes, such as the theft of session data and accessing sensitive data within cookies. In order for this type of cross-site scripting to be successful, a malicious user must coerce a user into clicking a link that triggers the non-persistent cross-site scripting attack. This is usually done through an email that encourages the user to click on a provided malicious link, or to visit a web site that is fraught with malicious links. In this paper it will be discussed and elaborated as to how attack surfaces related to type 1 or \"non-persistent cross-site scripting\" attack shall be reduced using secure development life cycle practices and techniques","PeriodicalId":423671,"journal":{"name":"2018 Fourth International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB)","volume":"348 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"14","resultStr":"{\"title\":\"Reducing attack surface corresponding to Type 1 cross-site scripting attacks using secure development life cycle practices\",\"authors\":\"Syed Nisar Bukhari, Muneer Ahmad Dar, Ummer Iqbal\",\"doi\":\"10.1109/AEEICB.2018.8480945\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"While because the range of web users have increased exponentially, thus has the quantity of attacks that decide to use it for malicious functions. The vulnerability that has become usually exploited is thought as cross-site scripting (XSS). Cross-site Scripting (XSS) refers to client-side code injection attack whereby a malicious user will execute malicious scripts (also usually stated as a malicious payload) into a legitimate web site or web based application. XSS is amongst the foremost rampant of web based application vulnerabilities and happens once an internet based application makes use of un-validated or un-encoded user input at intervals the output it generates. In such instances, the victim is unaware that their data is being transferred from a website that he/she trusts to a different site controlled by the malicious user. In this paper we shall focus on type 1 or \\\"non-persistent cross-site scripting\\\". With non-persistent cross-site scripting, malicious code or script is embedded in a Web request, and then partially or entirely echoed (or \\\"reflected\\\") by the Web server without encoding or validation in the Web response. The malicious code or script is then executed in the client’s Web browser which could lead to several negative outcomes, such as the theft of session data and accessing sensitive data within cookies. In order for this type of cross-site scripting to be successful, a malicious user must coerce a user into clicking a link that triggers the non-persistent cross-site scripting attack. This is usually done through an email that encourages the user to click on a provided malicious link, or to visit a web site that is fraught with malicious links. In this paper it will be discussed and elaborated as to how attack surfaces related to type 1 or \\\"non-persistent cross-site scripting\\\" attack shall be reduced using secure development life cycle practices and techniques\",\"PeriodicalId\":423671,\"journal\":{\"name\":\"2018 Fourth International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB)\",\"volume\":\"348 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"14\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 Fourth International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/AEEICB.2018.8480945\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 Fourth International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AEEICB.2018.8480945","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 14

摘要

而由于网络用户的范围呈指数级增长,因此有数量的攻击决定使用它的恶意功能。通常被利用的漏洞被认为是跨站点脚本(XSS)。跨站脚本(XSS)指的是客户端代码注入攻击,恶意用户将在合法网站或基于web的应用程序中执行恶意脚本(通常也称为恶意负载)。XSS是最猖獗的基于web的应用程序漏洞之一,一旦基于internet的应用程序使用未经验证或未编码的用户输入,它就会产生输出。在这种情况下,受害者不知道他们的数据正从他/她信任的网站转移到恶意用户控制的另一个网站。在本文中,我们将关注类型1或“非持久性跨站点脚本”。使用非持久性跨站点脚本,恶意代码或脚本被嵌入到Web请求中,然后由Web服务器部分或全部回显(或“反射”),而无需在Web响应中进行编码或验证。然后在客户端的Web浏览器中执行恶意代码或脚本,这可能导致几个负面结果,例如窃取会话数据和访问cookie中的敏感数据。为了使这种类型的跨站点脚本成功,恶意用户必须强迫用户单击触发非持久性跨站点脚本攻击的链接。这通常是通过一封电子邮件,鼓励用户点击提供的恶意链接,或访问充满恶意链接的网站来实现的。本文将讨论和阐述如何使用安全开发生命周期实践和技术减少与类型1或“非持久性跨站点脚本”攻击相关的攻击面
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Reducing attack surface corresponding to Type 1 cross-site scripting attacks using secure development life cycle practices
While because the range of web users have increased exponentially, thus has the quantity of attacks that decide to use it for malicious functions. The vulnerability that has become usually exploited is thought as cross-site scripting (XSS). Cross-site Scripting (XSS) refers to client-side code injection attack whereby a malicious user will execute malicious scripts (also usually stated as a malicious payload) into a legitimate web site or web based application. XSS is amongst the foremost rampant of web based application vulnerabilities and happens once an internet based application makes use of un-validated or un-encoded user input at intervals the output it generates. In such instances, the victim is unaware that their data is being transferred from a website that he/she trusts to a different site controlled by the malicious user. In this paper we shall focus on type 1 or "non-persistent cross-site scripting". With non-persistent cross-site scripting, malicious code or script is embedded in a Web request, and then partially or entirely echoed (or "reflected") by the Web server without encoding or validation in the Web response. The malicious code or script is then executed in the client’s Web browser which could lead to several negative outcomes, such as the theft of session data and accessing sensitive data within cookies. In order for this type of cross-site scripting to be successful, a malicious user must coerce a user into clicking a link that triggers the non-persistent cross-site scripting attack. This is usually done through an email that encourages the user to click on a provided malicious link, or to visit a web site that is fraught with malicious links. In this paper it will be discussed and elaborated as to how attack surfaces related to type 1 or "non-persistent cross-site scripting" attack shall be reduced using secure development life cycle practices and techniques
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信