International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064


Downloads: 105

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014


Solving False Positive Problem in Client Side XSS Filter

Dr. Nitin Mishra, Saumya Chaturvedi, Chandrashekhar Dewangan, Sakshi Jain


Abstract: Cross Site Scripting (XSS) is the most popular security problem in modern web application. In Cross Site Scripting, attacker uses a trusted site and injects a vulnerability script in the client or server side browser. This code when executes sends a secure information to attacker. This type of attack can be blocked by using server side filters and client side filters. In this work we have developed a two pass client side filter. This filter solves the well known problem of False Positive in various client side filters. We have proposed an architecture and algorithm that solves false positive problem.


Keywords: Web Application, attacks, attacker, vulnerability, malicious, server, Client and Server filter, False positive problem, Cheat sheet, Black list, white list


Edition: Volume 3 Issue 12, December 2014,


Pages: 637 - 642


How to Cite this Article?

Dr. Nitin Mishra, Saumya Chaturvedi, Chandrashekhar Dewangan, Sakshi Jain, "Solving False Positive Problem in Client Side XSS Filter", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=SUB14445, Volume 3 Issue 12, December 2014, 637 - 642

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Web Application'

Downloads: 2

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 7, July 2021

Pages: 915 - 920

Calibration Software: Performance Analysis

Prasad Rajendra Kumbhar, Anil R. Surve, Shailender Shekhawat

Share this Article

Downloads: 103

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1565 - 1567

A Region Boundaries Algorithm for Ear Authentication Based on Plots

G. Harsha Vardhan, K. Jeeva

Share this Article

Similar Articles with Keyword 'attacks'

Downloads: 134 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Downloads: 2

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Similar Articles with Keyword 'attacker'

Downloads: 94

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1253 - 1257

Implementation Details of Anonymization of Sensitive Labels in Collaborative Data Publishing

Vandhana V

Share this Article

Downloads: 102

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 842 - 845

Defending Against Source Routing Attacks in Wireless Ad-Hoc Networks

Srihari Babu Kolla, B. B. K. Prasad

Share this Article

Similar Articles with Keyword 'vulnerability'

Downloads: 2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Downloads: 38

Research Paper, Computer Science & Engineering, Sri Lanka, Volume 10 Issue 4, April 2021

Pages: 139 - 144

Analysis onto the Evolving Cyber-Attack Trends during COVID-19 Pandemic

Senthuran Nallainathan

Share this Article

Similar Articles with Keyword 'malicious'

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 1240 - 1249

Secure Methods for Supplychain Management to Protect from Attacks in Blockchain

B. Ratnakanth, K. Venkata Ramana

Share this Article

Downloads: 4 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 863 - 865

Detection of Malicious URLs using Classification Algorithm

Muskan V. Jaiswal, Dr. Anjali B. Raut

Share this Article

Similar Articles with Keyword 'server'

Downloads: 176 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, Bangladesh, Volume 5 Issue 6, June 2016

Pages: 1523 - 1527

Multifunctional Remote Controlled Robot Using Android Application

T. A. Mithu, T. S. Reddy

Share this Article

Downloads: 180

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Similar Articles with Keyword 'Black list'

Downloads: 100

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 988 - 991

Filtering Unwanted Post from Online Social Networking (OSN) Sites

Sachin P. Vidhate, Syed Akhter

Share this Article

Downloads: 125

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 385 - 388

A Classifier System for Unwanted Message Filtering From O.S.N User Space

Sneha R. Harsule, Mininath K. Nighot

Share this Article

Similar Articles with Keyword 'white list'

Downloads: 113

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2352 - 2355

Spam Detection Techniques: A Review

Reena Sharma, Gurjot Kaur

Share this Article

Downloads: 129

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 149 - 152

Securing Manets with Ticket Granting for Acknowledgement Based Intrusion Detection

Reshma R, Sreerag B M

Share this Article

Similar Articles with Keyword 'Web'

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 1717 - 1724

Krashi Prabhandak (Agricultural Manager)

Prafful Mundra, A V Pavan Krishna, Swarnalatha P, Venkata Sumanth Kakollu

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 1240 - 1249

Secure Methods for Supplychain Management to Protect from Attacks in Blockchain

B. Ratnakanth, K. Venkata Ramana

Share this Article

Similar Articles with Keyword 'Application'

Downloads: 176 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, Bangladesh, Volume 5 Issue 6, June 2016

Pages: 1523 - 1527

Multifunctional Remote Controlled Robot Using Android Application

T. A. Mithu, T. S. Reddy

Share this Article

Downloads: 155

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article
Top