Semastin E.Azam S.Shanmugam B.Kannoorpatti K.Jonokman M.Samy G.N.Perumal S.2024-05-282024-05-2820182227524X10.14419/ijet.v7i4.15.214342-s2.0-85054678384https://www.scopus.com/inward/record.uri?eid=2-s2.0-85054678384&doi=10.14419%2fijet.v7i4.15.21434&partnerID=40&md5=3f6bc3b1b5b67bc8acab363400db3380https://oarep.usim.edu.my/handle/123456789/8513Today's contemporary business world has incorporated Web Services and Web Applications in its core of operating cycle nowadays and security plays a major role in the amalgamation of such services and applications with the business needs worldwide. OWASP (Open Web Application Security Project) states that the effectiveness of security mechanisms in a Web Application can be estimated by evaluating the degree of vulnerability against any of the nominated top ten vulnerabilities, nominated by the OWASP. This paper sheds light on a number of existing tools that can be used to test for the CSRF vulnerability. The main objective of the research is to identify the available solutions to prevent CSRF attacks. By analyzing the techniques employed in each of the solutions, the optimal tool can be identified. Tests against the exploitation of the vulnerabilities were conducted after implementing the solutions into the web application to check the efficacy of each of the solutions. The research also proposes a combined solution that integrates the passing of an unpredictable token through a hidden field and validating it on the server side with the passing of token through URL. � 2018 Authors.en-USCSRFCSRF PreventionCSRF TesterHidden TokenWeb Application VulnerabilitiesPreventive measures for cross site request forgery attacks on Web-based ApplicationsInt. J. Eng. Technol.Article13013474