International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 117

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 6, June 2014


Mitigation of CSRF Attack

Nikunj Tandel | Kalpesh Patel [4]


Abstract: Web Application is used in our day to day life and there are several vulnerabilities in web application as per OWASP (Open Web Application Security Project). Most of the developers are unaware about the CSRF attack therefore many web application are still vulnerable from CSRF attack. Cross Site request forgery attack occur when the malicious web site forces a users browser to send unauthorized request and perform unwanted action on a trusted web site without users awareness. In this paper we will study about the CSRF attack and existing mechanisms for mitigating CSRF attack and also compare our approach with existing approaches.


Keywords: OWASP, Cross Site Request Forgery CSRF, web application vulnerability, Mitigation techniques


Edition: Volume 3 Issue 6, June 2014,


Pages: 1416 - 1420


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Nikunj Tandel, Kalpesh Patel, "Mitigation of CSRF Attack", International Journal of Science and Research (IJSR), Volume 3 Issue 6, June 2014, pp. 1416-1420, https://www.ijsr.net/get_abstract.php?paper_id=20131846

Similar Articles with Keyword 'Mitigation techniques'

Downloads: 113

Research Paper, Computer Science & Engineering, Saudi Arabia, Volume 5 Issue 2, February 2016

Pages: 1972 - 1974

The Network Security Policies of Telecommunication Industries in Sudan

Mohammed Ibrahim M. Gali | Dr. Abdelrahman Elsharif Karrar [5]

Share this Article

Downloads: 113

Research Paper, Computer Science & Engineering, India, Volume 7 Issue 6, June 2018

Pages: 1590 - 1594

A Detail Review of Jamming Attack Mitigation Techniques in Mobile Wireless Networks

Kalpana [69] | Raj Kumar [65]

Share this Article
Top