XSS Worm Propagation and Detection in Online Social Network
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 3 Issue 7, July 2014

XSS Worm Propagation and Detection in Online Social Network

Kolanoori Pravallika, B. Srinivas Reddy

Cross-site scripting (XSS) vulnerabilities make it possible for worm to spread quickly to a broad range of users on popular web sites. Today, the detection of XSS worm has been largely UN explored. This paper proposes the first purely client-side solution to detect XSS worms. Our sight is that an XSS worm must spread from one user to another by reconstructing and propagating its payload. Our approach prevents the propagation of XSS worms by monitoring out going request that sends self-replicating pay loads. We intercept all HTTP request on the client side and compare them with currently embedded scripts. We have implemented a cross-platform Firefox extension that is able to detect all existing self-replicating XSS worms that propagate on the client side. Our test results show that it incurs low performance overhead and reports no false positive when tested on popular web-sites.

Keywords: Security, Social Networks worms, Propagation dynamics, Modeling, Malware

Edition: Volume 3 Issue 7, July 2014

Pages: 458 - 460

Share this Article

How to Cite this Article?

Kolanoori Pravallika, B. Srinivas Reddy, "XSS Worm Propagation and Detection in Online Social Network", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=20141018, Volume 3 Issue 7, July 2014, 458 - 460

78 PDF Views | 60 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Security'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1486 - 1489

Mobile Based Marketing System Using Privacy and Security Aware Location Based Rewarding System

Digvijay A. Patil, Yogesh B. Gurav

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1330 - 1335

Efficient Image Encryption EIE - Compression System Using Haar Wavelets Using Matlab

Kavita, Anil Vadhwa

Share this Article

Similar Articles with Keyword 'Propagation dynamics'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1402 - 1405

SII Model for Self-Start Detection on the Propagation Dynamics of Modern Email Malware

Preetha S M, Suryapriya S

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 458 - 460

XSS Worm Propagation and Detection in Online Social Network

Kolanoori Pravallika, B. Srinivas Reddy

Share this Article

Similar Articles with Keyword 'Modeling'

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016

Pages: 1652 - 1658

Multiple Instruction Multiple Data (MIMD) Implementation on Clusters of Terminals

Sudhir Kumar Meesala, Dr. Pabitra Mohan Khilar, Dr. A. K. Shrivastava

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2035 - 2040

A Framework for Enhancing Source Location Privacy in Wireless Sensor Networks

Parthasaradhi M, B Nagalakshmi, D Venkatesh

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2365 - 2368

Adaptive Reinforcement Learning Method for Sequential Decision Task: A Review

Pramod Patil, Ankur Verma

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1750 - 1751

Automatic Emotion Generation and Summarization form Perceptual Text ? A Survey

Sayalee Sandeep Raut, Kavita P. Shirsat

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 2021 - 2023

Survey on Temporal Patterns in Physiological Sensor Data

Nilam

Share this Article

Similar Articles with Keyword 'Malware'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2302 - 2306

VILEEAR: Detection of Drive by Download attack on Malicious Web Pages

Chirag R. Desai, Dr. Narendra M. Shekokar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1779 - 1783

Malware Detection and Tracer Approach for Operating System

Dokuparthi Prasanthi, V. Rama Krishna

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1391 - 1393

A Survey on Integrity Protection Mechanisms for Open Mobile Platform

Alankrita Ladage, Prof. T. H. Gurav

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1846 - 1849

An Innovative Technique to Detect Malicious Applications in Android

Sharvari Prakash Chorghe, Dr. Narendra Shekokar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2832 - 2834

A Novel Game-Theoretic Method for Detecting Malware in Delay-Tolerant Networks

Jayalekshmi. S, Jebakumari. M

Share this Article
Top