An Enhanced Mechanism for Protecting Web Applications from Cross Site Request Forgery (CSRF)

Publication Date: 02/01/2024

DOI: 10.52589/BJCNIT_R5YYKXKA


Author(s): Ele. B. I..

Volume/Issue: Volume 7 , Issue 1 (2024)



Abstract:

Cross-Site Request Forgery (CSRF) is considered one of the top vulnerabilities in today’s web, where an untrusted website can force the user browser to send an unauthorized valid request to the trusted site. Legitimate users will lose their integrity over the website when the CSRF takes place. So far, many solutions have been proposed for the CSRF attacks such as the referrer HTTP header, custom HTTP header, origin header, client site proxy, a browser plug-in, and random token validation, but in this research, the use of random token validation to solve the problem of CSRF attacks was implemented. The proposed solution in the study used a concept known as Nonce which is a type of random token attached to requests sent over a server. This solution proved to be effective enough to protect and prevent web applications from CSRF attacks. Although no system can be secured against attacks, this study recommends that the random token validation (Nonce) approach of protecting web applications should be adopted by all web applications developers and users to improve on the already established solutions to reduce the chances of attacks on web applications to a very slim percentage, if not eliminated.


Keywords:

Web Applications, Website, Cross-Site Request Forgery, Attacks, vulnerability, Random Token Validation.


No. of Downloads: 0

View: 98




This article is published under the terms of the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0)
CC BY-NC-ND 4.0