Reducing attack surface corresponding to Type 1 cross-site scripting attacks using secure development life cycle practices

While because the range of web users have increased exponentially, thus has the quantity of attacks that decide to use it for malicious functions. The vulnerability that has become usually exploited is thought as cross-site scripting (XSS). Cross-site Scripting (XSS) refers to client-side code injection attack whereby a malicious user will execute malicious scripts (also usually stated as a malicious payload) into a legitimate web site or web based application. XSS is amongst the foremost rampant of web based application vulnerabilities and happens once an internet based application makes use of un-validated or un-encoded user input at intervals the output it generates. In such instances, the victim is unaware that their data is being transferred from a website that he/she trusts to a different site controlled by the malicious user. In this paper we shall focus on type 1 or "non-persistent cross-site scripting". With non-persistent cross-site scripting, malicious code or script is embedded in a Web request, and then partially or entirely echoed (or "reflected") by the Web server without encoding or validation in the Web response. The malicious code or script is then executed in the client’s Web browser which could lead to several negative outcomes, such as the theft of session data and accessing sensitive data within cookies. In order for this type of cross-site scripting to be successful, a malicious user must coerce a user into clicking a link that triggers the non-persistent cross-site scripting attack. This is usually done through an email that encourages the user to click on a provided malicious link, or to visit a web site that is fraught with malicious links. In this paper it will be discussed and elaborated as to how attack surfaces related to type 1 or "non-persistent cross-site scripting" attack shall be reduced using secure development life cycle practices and techniques

[1]  Xiaohong Yuan,et al.  A case study on web application security testing with tools and manual testing , 2013, 2013 Proceedings of IEEE Southeastcon.

[2]  R. Ramakrishnan,et al.  A survey and vital analysis of various state of the art solutions for web application security , 2014, International Conference on Information Communication and Embedded Systems (ICICES2014).

[3]  A. Tajpour,et al.  Comparison of SQL injection detection and prevention techniques , 2010, 2010 2nd International Conference on Education Technology and Computer.

[4]  Carlos Serrao,et al.  Web application security: Improving critical web-based applications quality through in-depth security analysis , 2011, International Conference on Information Society (i-Society 2011).