Reference Hub3
Information Theoretic XSS Attack Detection in Web Applications

Information Theoretic XSS Attack Detection in Web Applications

Hossain Shahriar, Sarah North, Wei-Chuen Chen, Edward Mawangi
Copyright: © 2014 |Volume: 5 |Issue: 3 |Pages: 15
ISSN: 1947-3036|EISSN: 1947-3044|EISBN13: 9781466656864|DOI: 10.4018/ijsse.2014070101
Cite Article Cite Article

MLA

Shahriar, Hossain, et al. "Information Theoretic XSS Attack Detection in Web Applications." IJSSE vol.5, no.3 2014: pp.1-15. http://doi.org/10.4018/ijsse.2014070101

APA

Shahriar, H., North, S., Chen, W., & Mawangi, E. (2014). Information Theoretic XSS Attack Detection in Web Applications. International Journal of Secure Software Engineering (IJSSE), 5(3), 1-15. http://doi.org/10.4018/ijsse.2014070101

Chicago

Shahriar, Hossain, et al. "Information Theoretic XSS Attack Detection in Web Applications," International Journal of Secure Software Engineering (IJSSE) 5, no.3: 1-15. http://doi.org/10.4018/ijsse.2014070101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Cross-Site Scripting (XSS) has been ranked among the top three vulnerabilities over the last few years. XSS vulnerability allows an attacker to inject arbitrary JavaScript code that can be executed in the victim's browser to cause unwanted behaviors and security breaches. Despite the presence of many mitigation approaches, the discovery of XSS is still widespread among today's web applications. As a result, there is a need to improve existing solutions and to develop novel attack detection techniques. This paper proposes a proxy-level XSS attack detection approach based on a popular information-theoretic measure known as Kullback-Leibler Divergence (KLD). Legitimate JavaScript code present in an application should remain similar or very close to the JavaScript code present in a rendered web page. A deviation between the two can be an indication of an XSS attack. This paper applies a back-off smoothing technique to effectively detect the presence of malicious JavaScript code in response pages. The proposed approach has been applied for a number of open-source PHP web applications containing XSS vulnerabilities. The initial results show that the approach can effectively detect XSS attacks and suffer from low false positive rate through proper choice of threshold values of KLD. Further, the performance overhead has been found to be negligible.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.