Implementation of web browser extension for mitigating CSRF attack

4Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

CSRF is one of the most serious cyber-attacks and has been recognized among the major threats and among the top ten worst vulnerabilities of web applications. CSRF attack occurs when the attacker takes the advantages of implicit authentication mechanisms of HTTP protocol and cached credentials in the browser to execute a sensitive action on a target website behalf of an authenticated user without his knowledge. In this paper, we present a CSRF protection mechanism that can be added to Google Chrome browser as an extension. Our tool “CSRF Detector” is purely implemented on the client-side to defeat the attacker attempt to perform CSRF attacks by analyzing web requests and web pages content to detect all the basic and advanced CSRF attacks. Our evaluation result shows that CSRF Detector extension successfully detects all the generated attacks and it has the ability to protect users and web applications against CSRF attacks with no false positive.

Cite

CITATION STYLE

APA

Lalia, S., & Moustafa, K. (2019). Implementation of web browser extension for mitigating CSRF attack. In Advances in Intelligent Systems and Computing (Vol. 931, pp. 867–880). Springer Verlag. https://doi.org/10.1007/978-3-030-16184-2_82

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free