Full Paper View Go Back

Automated Detection of Legitimate Java Script Code from a Malicious Injected Code and Improvising the Time Efficiency

R. Saliha Bathool1 , K.Vijayalakshmi 2

1 Dept. of MCA, Ethiraj College for Women, Chennai, India.
2 Dept. of MCA, Ethiraj College for Women, Chennai, India.

Correspondence should be addressed to: salihabathool_salihabathool15@gmail.com.


Section:Research Paper, Product Type: Journal
Vol.5 , Issue.4 , pp.26-30, Aug-2017

Online published on Aug 30, 2017


Copyright © R. Saliha Bathool, K.Vijayalakshmi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: R. Saliha Bathool, K.Vijayalakshmi, “Automated Detection of Legitimate Java Script Code from a Malicious Injected Code and Improvising the Time Efficiency,” International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.4, pp.26-30, 2017.

MLA Style Citation: R. Saliha Bathool, K.Vijayalakshmi "Automated Detection of Legitimate Java Script Code from a Malicious Injected Code and Improvising the Time Efficiency." International Journal of Scientific Research in Network Security and Communication 5.4 (2017): 26-30.

APA Style Citation: R. Saliha Bathool, K.Vijayalakshmi, (2017). Automated Detection of Legitimate Java Script Code from a Malicious Injected Code and Improvising the Time Efficiency. International Journal of Scientific Research in Network Security and Communication, 5(4), 26-30.

BibTex Style Citation:
@article{Bathool_2017,
author = {R. Saliha Bathool, K.Vijayalakshmi},
title = {Automated Detection of Legitimate Java Script Code from a Malicious Injected Code and Improvising the Time Efficiency},
journal = {International Journal of Scientific Research in Network Security and Communication},
issue_date = {8 2017},
volume = {5},
Issue = {4},
month = {8},
year = {2017},
issn = {2347-2693},
pages = {26-30},
url = {https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=299},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=299
TI - Automated Detection of Legitimate Java Script Code from a Malicious Injected Code and Improvising the Time Efficiency
T2 - International Journal of Scientific Research in Network Security and Communication
AU - R. Saliha Bathool, K.Vijayalakshmi
PY - 2017
DA - 2017/08/30
PB - IJCSE, Indore, INDIA
SP - 26-30
IS - 4
VL - 5
SN - 2347-2693
ER -

1514 Views    494 Downloads    356 Downloads
  
  

Abstract :
Automated detection of legitimate java script code from a malicious injected code helps in distinguish between malicious and non-malicious script In order to prevent the users from XSS attack, many client- side solutions have been materialize; most of them being used are the filters that refines the malicious input. Moreover, many of these filters do not provide prevention to the newly designed sophisticated attacks such as multiple points of injection, injection into script etc. This paper proposes and implements an approach based on conceal XSS detection mechanism which bestow JSP detector that scours the vulnerability in the web page that perform automated process to differentiate between java script codes from a malicious injected code and also improvise the efficiency of fast policy check to optimize the speed of XSS attack detection process. It ensures that the file modifications should not entertained by any unauthorized user, if anybody tries to modify it automatically notify the authorized admin but it will contain any changes. Merely, this mechanism is very efficient for detection and security concern.

Key-Words / Index Term :
Fast Policy Check, Speed Efficiency, JSP Detection, File Detection Speed

References :
[1]. Neha Gupta, “XSS Defense: An Approach for Detecting and Preventing Cross Site Scripting Attacks”, International journal of advanced computer technology, Vol.4, Issue.3, 2015.
[2]. Shashank Gupta, BB Gupta. “Cross-Site Scripting attacks and defense mechanisms”, classification and state-of-the-art,Int J Syst Assur Eng Manag- DOI 10.1007/s13198-015-0376-0.
[3]. Kanpata Sudhakara Rao, Naman Jain, Nikhil Limaje, Abhilash Gupta, Mridul Jain, Bernard Menezes, “Two for the price of one: A combined browser defense against XSS and click jacking”, IEEE Publication Department of Computer Science and Engineering, IIT Bombay, Mumbai, India, 2016.
[4]. Shashank Gupta, B.B.Gupta, “Enhanced XSS Defensive Framework for Web Applications Deployed in the Virtual Machines of Cloud Computing Environment”, International Conference on Emerging Trends in Engineering Science and Technology 2015.
[5]. V.Nithya1,S.Lakshmana,Pandian,e “A Survey on Detection and Prevention in Cross Site Scripting Attack”, International Journal of Security and Its Applications, Vol. 9, No.3 (2015).
[6]. D. K. Patil K. R. Patil, “Client side Automated Sanitizer for XSS Vulnerabilities”, International Journal of Computer Applications, Vol.121 - No.20, July 2016.
[7]. Monika Rohilla, Rakesh Kumar, Girdhar Gopal, “XSS attack analysis, Detection and prevention”, International journal of advanced research in computer science, Vol.6, Issue.6, June 2016.
[8]. Manisha S. Mahindrakar, “Prevention to Cross site Scripting Attacks: A Survey”, IJSR, Volume 3 Issue 7, July 2014.
[9]. ChokhawalaKirit I., Dr. Vinit Kumar Chuabay, Dr. A. R. Patel, “Secure Web Application: Preventing Application Injections”, IJSRSET,Vol.2, Issue.1, 2016.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at ijsrnsc@gmail.com or view contact page for more details.

Impact Factor

Journals Contents

Information

Downloads

Digital Certificate

Go to Navigation