Open Access   Article Go Back

A Study About Implementation of CSRF Attacks

Kamaljeet Kumar1

Section:Review Paper, Product Type: Journal Paper
Volume-6 , Issue-7 , Page no. 1240-1243, Jul-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i7.12401243

Online published on Jul 31, 2018

Copyright © Kamaljeet Kumar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Kamaljeet Kumar, “A Study About Implementation of CSRF Attacks,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1240-1243, 2018.

MLA Style Citation: Kamaljeet Kumar "A Study About Implementation of CSRF Attacks." International Journal of Computer Sciences and Engineering 6.7 (2018): 1240-1243.

APA Style Citation: Kamaljeet Kumar, (2018). A Study About Implementation of CSRF Attacks. International Journal of Computer Sciences and Engineering, 6(7), 1240-1243.

BibTex Style Citation:
@article{Kumar_2018,
author = {Kamaljeet Kumar},
title = {A Study About Implementation of CSRF Attacks},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2018},
volume = {6},
Issue = {7},
month = {7},
year = {2018},
issn = {2347-2693},
pages = {1240-1243},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2592},
doi = {https://doi.org/10.26438/ijcse/v6i7.12401243}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i7.12401243}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2592
TI - A Study About Implementation of CSRF Attacks
T2 - International Journal of Computer Sciences and Engineering
AU - Kamaljeet Kumar
PY - 2018
DA - 2018/07/31
PB - IJCSE, Indore, INDIA
SP - 1240-1243
IS - 7
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
655 376 downloads 220 downloads
  
  
           

Abstract

Today worldwide revolution in web application technology is changing our lives in term of the way we learn and use. Web applications fit into this because the technology has been around long enough and can provide benefits for development in this area. The main objective of this paper is to study about the CSRF attacks and implement these attacks in real world and check the success rate of these attacks. The CSRF attacks are the state changing attacks not the data stealing attacks. In this paper also discussed how various tools and frameworks that are helpful to perform the CSRF attacks works. The implementation technique of CSRF attack is discussed in fully detail. One can easily learn and understand the CSRF attacks and its implementation using this paper.

Key-Words / Index Term

Cross-Site Request Forgery, Log analysis, CSRF Attacks, Implementation of CSRF

References

[1]. CSRF Attacks, XSRF or Sea-Surf. (n.d.). Retrieved from https://www.acunetix.com/websitesecurity/csrf-attacks/
[2]. Getting Started With Burp Suite. (n.d.). Retrieved from https://portswigger.net/burp/help/suite_gettingstarted
[3]. K. Goseva-Popstojanova, G. A. (2012). Classification of malicious web sessions. Retrieved from 21st International Conference on Computer Communications and Networks (ICCCN): http://dx.doi.org/10.1109/ICCCN.2012.6289291
[4]. Kali Linux Tutorials. (n.d.). Retrieved from https://www.kali.org/category/tutorials/
[5]. M. Auxilia, D. T. (2010). "Anomaly detection using negative security model in web application". Retrieved from International Conference on Computer Information Systems and Industrial Management Applications (CISIM): http://dx.doi.org/10.1109/CISIM.2010.5643461
[6]. M. Zolotukhin, T. Hämäläinen, T. Kokkonen, J. Siltanen. (2014). "Analysis of http requests for anomaly detection of web attacks". Retrieved from IEEE 12th International Conference on Dependable, Autonomic and Secure Computing: http://dx.doi.org/10.1109/DASC.2014.79
[7]. Merve Bas, Seyyar Ferhat, Özgür Çatak Ensar Gül. (2017). "Detection of attack-targeted scans from the Apache HTTP Server access logs". Retrieved from Applied Computing and Informatics: https://www.sciencedirect.com/science/article/pii/S2210832717300169
[8]. N. Singh, A. Jain, R.S. Raw, R. Raman. (2014). "Detection of Web-Based Attacks by Analyzing Web Server Log Files". Retrieved from Springer India: http://dx.doi. org/10.1007/978-81-322-1665-0_10
[9]. OWASP Zed Attack Proxy Project. (n.d.). Retrieved from https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project