“…Developers also feel relaxed with Ajax due to its robustness and easy integrability with API. Usually Ajax displays data in XML, JSON, or plain text starting from this stage [1], [4]. Since developers are not very much aware to implement the secured tunneling protocols like Hyper Text Transfer Protocol Secure (HTTPS), Secure Sockets Layer (SSL), Transport Layer Security (TLS), etc., attackers, working as middleman, are trying to list and intercept all request from server through insecure protocol like Hyper Text Transfer Protocol (HTTP) to manipulate the requests [1], [7], [10].…”