About this Journal  |  Author Guidelines  |   Submit a Manuscript     

International Journal of Reliable Information and Assurance

Volume 1, No. 1, 2013, pp 19-28
http://dx.doi.org/10.21742/ijria.2013.1.1.03

Abstract



CSRF Attack using Two fish Security Approach



    Sk.Apsaruneesa1, Sk.Wasimakram2, Ye-lin Ahn3 and Yang Shanshan4
    1,2Department of CSE, VVIT, Andhra Pradesh, India
    3Dept. Convergence security, SungShin University, Dongsun-dong, Seongbuk-gu, Seoul, Korea
    4Hangzhou Dianzi University, No.1158# Baiyang Second Street,Hangzhou Economic Development Zone, Hangzhou City, Zhejiang Province

    Abstract

    Nowadays online transactions become very familiar and the web plays a crucial part in everyone’s lives. Due to progression in the technologies it becomes easier for the internet users for storing, accessing and manipulating the data. We know that phishing attacks are more widespread in today’s technology because “it can attack globally and capture the confidential information of users in an undefined manner”. One such type of vulnerability is Cross Site Request Forgery (CSRF) attack. It is a type of malicious exploit of a website whereby unlawful commands are transmit from a user that the website trusts which may leads to loss of confidential data. This type of attack is complicated to detect and prevent. CSRF attacks are occurred because browser validates the website, not by the user. We have implemented a novel approach “Avoiding Cross Site Request Forgery Attack Using Two Fish Security approach” is a better way to avoiding the CSRF attacks.


 

Contact Us

  • PO Box 5074, Sandy Bay Tasmania 7005, Australia
  • Phone: +61 3 9028 5994