International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064


Downloads: 136

Survey Paper | Computer Science & Engineering | India | Volume 5 Issue 1, January 2016


Survey on Preventing Cross Web Site Request Forgery Attacks with Activation Link

Kadambari Pradip Chaudhari, Manisha Tijare


Abstract: The web has become an important a part of our lives. Unfortunately, as our dependency on the online increases, so does the bury Eastern Time of attackers in exploiting internet applications and web-based info systems. Previous add the field of internet application security has primarily cantered on the mitigation of Cross web site Scripting (XSS) and SQL injection attacks. In distinction, Cross web site Request Forgery (XSRF) attacks haven't received a lot of attention. In AN XSRF attack, the trust of an internet application in its documented users is exploited by lease the assaulter build discretionary protocol requests on behalf of a victim user. The matter is that internet applications generally work such requests while not edificatory that the performed actions area unit so intentional. Because XSRF may be a comparatively new security downside, it is largely unknown by internet application developers. As a result, there exist several internet applications that area unit vulnerable to XSRF. Sadly, existing mitigation approaches area unit time-consuming and error-Pr one, as they need manual effort to integrate defense techniques into existing systems. In this paper, we tend to gift an answer that has a totally automatic protection From XSRF attacks. A lot of exactly, our approach relies on a server-side proxy that detects and prevents XSRF attacks during an approach that's clear to users furthermore on the online application itself. We give experimental results that demonstrate that we are able to use our prototype to secure variety of common ASCII text file internet applications, while not negatively touching their behavior.


Keywords: Detection, Modification, Prevention, SQL injection attacks, strategies, Vulnerabilities, Web application security


Edition: Volume 5 Issue 1, January 2016,


Pages: 94 - 98


How to Cite this Article?

Kadambari Pradip Chaudhari, Manisha Tijare, "Survey on Preventing Cross Web Site Request Forgery Attacks with Activation Link", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=26121501, Volume 5 Issue 1, January 2016, 94 - 98

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Detection'

Downloads: 134 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 948 - 951

Survey on Various Image Segmentation Techniques

Babita Chauhan

Share this Article

Similar Articles with Keyword 'Modification'

Downloads: 104

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1130 - 1132

Survey On: Reversible Data Hiding in Encrypted JPEG Images

N. B. Pokale, Sanjivani S. Koli

Share this Article

Downloads: 104

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1681 - 1683

Software Reliability Growth Model with Varying- Time Fault Removal Efficiency As Well As With Fault Introduction

D N Gowsami, Anshu Chaturvedi, Mohammad Altaf Dar

Share this Article

Similar Articles with Keyword 'Prevention'

Downloads: 7

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 778 - 782

A Helpline Application in COVID-19 Pandemic Situation

G. Muni Venkatesh

Share this Article

Downloads: 92

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS

Pranita Prakash Kulkarni

Share this Article

Similar Articles with Keyword 'SQL injection attacks'

Downloads: 106

Comparative Studies, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 193 - 195

Application for Detecting and Preventing SQL Injection Attacks using Web Service

Anuja A. Patil, Ketaki H. Pangu

Share this Article

Downloads: 108 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 242 - 245

An Approach to Detect and Prevent SQL Injection Attacks using Web Service

Shabnam R. Makanadar, Vaibhav V. Solankurkar

Share this Article

Similar Articles with Keyword 'strategies'

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 948 - 951

Survey on Various Image Segmentation Techniques

Babita Chauhan

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 9, September 2021

Pages: 939 - 945

Load Balancing in Cloud Computing Using Optimization Algorithm

Manpreet Kaur, Dr. Amandeep Kaur

Share this Article

Similar Articles with Keyword 'Vulnerabilities'

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 1240 - 1249

Secure Methods for Supplychain Management to Protect from Attacks in Blockchain

B. Ratnakanth, K. Venkata Ramana

Share this Article

Downloads: 5

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 7, July 2021

Pages: 613 - 616

Categorize & Compare Cloud Automation & Devops Tools

Pardeep Singh Virdi

Share this Article

Similar Articles with Keyword 'Web application security'

Downloads: 106

Comparative Studies, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 193 - 195

Application for Detecting and Preventing SQL Injection Attacks using Web Service

Anuja A. Patil, Ketaki H. Pangu

Share this Article

Downloads: 108 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 242 - 245

An Approach to Detect and Prevent SQL Injection Attacks using Web Service

Shabnam R. Makanadar, Vaibhav V. Solankurkar

Share this Article
Top