Open Access Open Access  Restricted Access Subscription or Fee Access

A Novel Approach for Detecting and Preventing Cross Site Scripting and HTTP Parameter Pollution Using Reverse Proxy

K. SyamaSundara Rao, V. Saritha, G. Lalitha Kumari, Y. Surekha


Present situations, the most critical attacks are those that combine Cross site scripting techniques to access systems and Hypertext Transfer protocol parameter pollution techniques to access the information by polluting the HTTP parameters. The potential damage associated with this kind of threats, the total absence of background and the fact that the solution to mitigate these vulnerabilities must be worked together with programmers, systems administrators and database vendors justifies an in-depth analysis to estimate all the possible ways of implementing this technique. It is a quite simple but effective hacking technique. HPP attacks can be defined as the feasibility to override or add HTTP GET/POST parameters by injecting query string delimiters. It affects a building block of all web technologies. We have to investigate business logic flaws triggered by HPP. As we know, it is tricky and time consuming since manual testing is required. In this paper we are proposing a novel approach to prevent http parameter pollution using reverse proxy. This approach provides a mechanism of records HTML response in order to test the application behavior as well as unexpected exploits. And also this approach also prevents other vulnerabilities.


HPP, HTTP, Reverse Proxy, XSS

Full Text:



Peter Wurzinger, Christian Platzer, Christian Ludl, Engin Kirda, and Christopher Kruegelk “SWAP: Mitigating XSS Attacks using a Reverse Proxy “ in SESS’09, May 19, 2009, Vancouver, 2009 IEEE


Erin Swanson Cenzic issues in smart attack at.

ModSecurity. at.

Nessus . “Web Application Scanning with Nessus Detecting Web Application Vulnerabilities and Environmental Weaknesses” September 2, 2010 issue.

Luca Carettoni, Stefano diPaola at.

cURL ::

Reverse Proxy Apache mod_proxy module at

D. Endler. “The Evolution of Cross Site Scripting Attacks”. technical report, iDEFENSE Labs, 2002.

M. V. Gundy and H. Chen. Noncespaces: “Using randomization to enforce information flow tracking and thwart cross site scripting attacks”. in Proceedings of the 16th Annual Network and Distributed System Security Symposium (NDSS), 2009.

O. Hallaraker and G. Vigna ”Detecting Malicious JavaScript Code in Mozilla”, in Proceedings of the IEEE International Conference on Engineering of Complex Computer Systems (ICECCS), 2005.

N. Jovanovic, C. Kruegel, and E. Kirda.”Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper)”,in IEEE Symposium on Security and Privacy, 2006.

S. Kals, E. Kirda, C. Kruegel, and N. Jovanovic.” SecuBat: A Web Vulnerability Scanner” in World Wide Web Conference, 2006.

D. Scott and R. Sharp.”Abstracting Application-level Web Security.” in 11th World Wide Web Conference, 2002.

Yue Zhang, Serge Egelman, Lorrie Cranor, and Jason Hong “Phinding phishing :Evaluating Anti-phshing tools”

E. Kirda, C. Kruegel, G. Vigna, and N. Jovanovic.”Noxes: A client-side solution for mitigating cross-site scripting attacks.” in 21st ACM Symposium on Applied Computing (SAC), 2006.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.