Results 1 to 10 of about 38,750 (142)

Cross-site scripting attack detection based on a modified convolution neural network [PDF]

open access: yesFrontiers in Computational Neuroscience, 2022
Cross-site scripting (XSS) attacks are currently one of the most threatening network attack methods. Effectively detecting and intercepting XSS attacks is an important research topic in the network security field. This manuscript proposes a convolutional
Huyong Yan   +16 more
doaj   +2 more sources

Current state of research on cross-site scripting (XSS) – A systematic literature review [PDF]

open access: yesInformation and Software Technology, 2015
Context: Cross-site scripting (XSS) is a security vulnerability that affects web applications. It occurs due to improper or lack of sanitization of user inputs. The security vulnerability caused many problems for users and server applications. Objective:
Abu Bakar Md Sultân   +2 more
exaly   +3 more sources

Cost-effective detection system of cross-site scripting attacks using hybrid learning approach

open access: yesResults in Engineering, 2023
Cross-Site Scripting (XSS) attacks inject malicious code payloads into web application logs, triggering stored cross-site scripting execution when accessing the view-logs interface.
Qasem Abu Al-Haija
doaj   +3 more sources

Cross-Site Scripting Guardian: A Static XSS Detector Based on Data Stream Input-Output Association Mining

open access: yesApplied Sciences, 2020
The largest number of cybersecurity attacks is on web applications, in which Cross-Site Scripting (XSS) is the most popular way. The code audit is the main method to avoid the damage of XSS at the source code level.
Chenghao Li   +3 more
doaj   +3 more sources

Ontology for Cross-Site-Scripting (XSS) Attack in Cybersecurity

open access: yesJournal of Cybersecurity and Privacy, 2021
In this work, we tackle a frequent problem that frequently occurs in the cybersecurity field which is the exploitation of websites by XSS attacks, which are nowadays considered a complicated attack. These types of attacks aim to execute malicious scripts
Jean Rosemond Dora, Karol Nemoga
doaj   +1 more source

Web Vulnerability Through Cross Site Scripting (XSS) Detection with OWASP Security Shepherd

open access: yesIndonesian Journal of Information Systems, 2021
Web applications are needed as a solution to the use of internet technology that can be accessed globally, capable of displaying information that is rich in content, cost effective, easy to use and can also be accessed by anyone, anytime and anywhere. In
Ripto Mukti Wibowo, Aruji Sulaksono
doaj   +1 more source

An Automated Cross-site Scripting Loopholes Discovery Model [PDF]

open access: yesJisuanji gongcheng, 2018
Cross-site Scripting(XSS) attacks pose serious threats to web applications.Before the application is released,detecting them can effectively reduce the risk of vulnerabilities.Aiming at the problems in the current detection of cross-site scripting,such ...
MA Futian,QIAN Xuezhong,SONG Wei
doaj   +1 more source

Penerapan Analisis Kerentanan XSS dan Rate Limiting pada Situs Web MTsN 3 Negara Menggunakan OWASP ZAP

open access: yesJurnal informatika UPGRIS, 2022
Indonesia yang sudah memasuki era digitalisasi membuat sektor pendidikan diharapkan mampu beradaptasi. Learning Daring kini menjadi salah satu metode pembelajaran di Indonesia.
Bagus Indra Dewangkara   +3 more
doaj   +1 more source

Application Research of BiLSTM in Cross-Site Scripting Detection

open access: yesJisuanji kexue yu tansuo, 2020
At present, machine learning methods are used in the most traditional cross-site scripting (XSS) detection technologies, which have some defects, such as bad readability because of maliciously confused code, insufficient feature extraction and low ...
CHENG Qiqin, WAN Liang
doaj   +1 more source

Resolving Cross-Site Scripting Attacks through Fusion Verification and Machine Learning

open access: yesMathematics, 2022
The frequent variations of XSS (cross-site scripting) payloads make static and dynamic analysis difficult to detect effectively. In this paper, we proposed a fusion verification method that combines traffic detection with XSS payload detection, using ...
Jiazhong Lu   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy