Designing a XSS Defensive Framework for Web Servers Deployed in the Existing Smart City Infrastructure

Designing a XSS Defensive Framework for Web Servers Deployed in the Existing Smart City Infrastructure

Brij B. Gupta, Pooja Chaudhary, Shashank Gupta
Copyright: © 2020 |Pages: 27
DOI: 10.4018/JOEUC.2020100105
Article PDF Download
Open access articles are freely available for download

Abstract

Cross-site scripting is one of the notable exceptions effecting almost every web application. Hence, this article proposed a framework to negate the impact of the XSS attack on web servers deployed in one of the major applications of the Internet of Things (IoT) i.e. the smart city environment. The proposed framework implements 2 approaches: first, it executes vulnerable flow tracking for filtering injected malicious scripting code in dynamic web pages. Second, it accomplished trusted remark generation and validation for unveiling any suspicious activity in static web pages. Finally, the filtered and modified webpage is interfaced to the user. The prototype of the framework has been evaluated on a suite of real-world web applications to detect XSS attack mitigation capability. The performance analysis of the framework has revealed that this framework recognizes the XSS worms with very low false positives, false negatives and acceptable performance overhead as compared to existent XSS defensive methodologies.
Article Preview
Top

1. Introduction

Urbanization and migration require global development of economic, social, institutional and physical infrastructure. Consequently, it puts pressure on the city’s organization as request for resources like education, healthcare, transportation, government, and safety exceed their availability. To overcome these issues, cities are focusing on the utilization of technology i.e. becoming ‘smart’. Smart cities (Ferraz & Ferraz, 2014; Seth, 2013) are the cities that harness Information and Communication Technology to automate and enhance services for improving the living standard of their citizens and attain sustainable development. This concept of “smart cities” is the outcome of the new computing paradigm, that is, Internet of Things. Internet has been risen up to the level where everything nearby us is connected and turns out to be part of some form of network. Informally, we can define IoT as a network formed by devices capable of generating, sending and receiving information related to any business, accesses by any person, any time irrespective of the geographical location. Technology should be used to make cities smart in terms of the services provided such as smart traffic control, smart parking, smart health-care, smart transportation, smart city management system like waste management, water management, Smart Street lighting and so on (Hossain & Shamim, 2018; Li, & Daming, 2019). Therefore, in a nutshell, smart city means everything is embedded with sensors to enable them to interact with the environment. Smart cities comprise of some of the main components as illustrated in Figure 1. Indeed, smart city concept has given a new direction for nation’s growth; nevertheless, for the exchange of the data, it utilizes server infrastructure which brings some major challenges also. Cyber security is the biggest challenge because people share large amount of information comprising personal and professional over the Internet (Li, Jianzhong, 2018; Almomani, Ammar, 2013; Parada, Raúl,2018; Drennan, Judy, 2019). There are numerous cyber-attacks that have contaminated web application.

Figure 1.

Smart city components

JOEUC.2020100105.f01

Figure 2 shows detailed architecture of the smart city and also shows what type of attacks are launched at which layer in the architecture of smart city. It may include DDOS, phishing, XSS, SQL injection, spamming etc. Code injection vulnerabilities are the most common and dangerous threat on Internet. It includes Cross-Site Scripting (XSS) (Chaudhary, Gupta, & Gupta, 2019; Gupta & Gupta, 2016a, 2016b, 2018b), SQL injection, etc. XSS attack (Chaudhary, Gupta, & Gupta, 2016;) is a type of code injection attack in which adversary injects malicious script code into the source program of the web application, triggers malicious actions like cookie stealing, session hijacking, dis-information and so on. It covers 3 types: Persistent XSS (Gupta & Gupta, 2018d, 2018e, 2018f), Reflected XSS (Gupta et al. 2017a, 2018c) and Document Object Model (DOM) based XSS attack (Gupta, Gupta, & Chaudhary, 2018a).

Complete Article List

Search this Journal:
Reset
Volume 36: 1 Issue (2024)
Volume 35: 3 Issues (2023)
Volume 34: 10 Issues (2022)
Volume 33: 6 Issues (2021)
Volume 32: 4 Issues (2020)
Volume 31: 4 Issues (2019)
Volume 30: 4 Issues (2018)
Volume 29: 4 Issues (2017)
Volume 28: 4 Issues (2016)
Volume 27: 4 Issues (2015)
Volume 26: 4 Issues (2014)
Volume 25: 4 Issues (2013)
Volume 24: 4 Issues (2012)
Volume 23: 4 Issues (2011)
Volume 22: 4 Issues (2010)
Volume 21: 4 Issues (2009)
Volume 20: 4 Issues (2008)
Volume 19: 4 Issues (2007)
Volume 18: 4 Issues (2006)
Volume 17: 4 Issues (2005)
Volume 16: 4 Issues (2004)
Volume 15: 4 Issues (2003)
Volume 14: 4 Issues (2002)
Volume 13: 4 Issues (2001)
Volume 12: 4 Issues (2000)
Volume 11: 4 Issues (1999)
Volume 10: 4 Issues (1998)
Volume 9: 4 Issues (1997)
Volume 8: 4 Issues (1996)
Volume 7: 4 Issues (1995)
Volume 6: 4 Issues (1994)
Volume 5: 4 Issues (1993)
Volume 4: 4 Issues (1992)
Volume 3: 4 Issues (1991)
Volume 2: 4 Issues (1990)
Volume 1: 3 Issues (1989)
View Complete Journal Contents Listing