Results 1 to 10 of about 5,786 (134)

Current state of research on cross-site scripting (XSS) – A systematic literature review [PDF]

open access: yesInformation and Software Technology, 2015
Context: Cross-site scripting (XSS) is a security vulnerability that affects web applications. It occurs due to improper or lack of sanitization of user inputs. The security vulnerability caused many problems for users and server applications. Objective:
Abu Bakar Md Sultân   +2 more
exaly   +5 more sources

Ontology for Cross-Site-Scripting (XSS) Attack in Cybersecurity [PDF]

open access: yesJournal of Cybersecurity and Privacy, 2021
In this work, we tackle a frequent problem that frequently occurs in the cybersecurity field which is the exploitation of websites by XSS attacks, which are nowadays considered a complicated attack. These types of attacks aim to execute malicious scripts
Jean Rosemond Dora, Karol Nemoga
doaj   +2 more sources

Structural Learning of Attack Vectors for Generating Mutated XSS Attacks [PDF]

open access: yesElectronic Proceedings in Theoretical Computer Science, 2010
Web applications suffer from cross-site scripting (XSS) attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks.
Yi-Hsun Wang   +2 more
doaj   +4 more sources

Cross-Site Scripting Guardian: A Static XSS Detector Based on Data Stream Input-Output Association Mining

open access: yesApplied Sciences, 2020
The largest number of cybersecurity attacks is on web applications, in which Cross-Site Scripting (XSS) is the most popular way. The code audit is the main method to avoid the damage of XSS at the source code level.
Chenghao Li   +3 more
doaj   +3 more sources

Cost-effective detection system of cross-site scripting attacks using hybrid learning approach

open access: yesResults in Engineering, 2023
Cross-Site Scripting (XSS) attacks inject malicious code payloads into web application logs, triggering stored cross-site scripting execution when accessing the view-logs interface.
Qasem Abu Al-Haija
doaj   +1 more source

Penerapan Analisis Kerentanan XSS dan Rate Limiting pada Situs Web MTsN 3 Negara Menggunakan OWASP ZAP

open access: yesJurnal informatika UPGRIS, 2022
Indonesia yang sudah memasuki era digitalisasi membuat sektor pendidikan diharapkan mampu beradaptasi. Learning Daring kini menjadi salah satu metode pembelajaran di Indonesia.
Bagus Indra Dewangkara   +3 more
doaj   +1 more source

Web Vulnerability Through Cross Site Scripting (XSS) Detection with OWASP Security Shepherd

open access: yesIndonesian Journal of Information Systems, 2021
Web applications are needed as a solution to the use of internet technology that can be accessed globally, capable of displaying information that is rich in content, cost effective, easy to use and can also be accessed by anyone, anytime and anywhere. In
Ripto Mukti Wibowo, Aruji Sulaksono
doaj   +1 more source

A novel technique to prevent SQL injection and cross-site scripting attacks using Knuth-Morris-Pratt string match algorithm

open access: yesEURASIP Journal on Information Security, 2020
Structured Query Language (SQL) injection and cross-site scripting remain a major threat to data-driven web applications. Instances where hackers obtain unrestricted access to back-end database of web applications so as to steal, edit, and destroy ...
Oluwakemi Christiana Abikoye   +4 more
doaj   +1 more source

A hybrid XSS attack (HYXSSA) based on fusion approach: Challenges, threats and implications in cybersecurity

open access: yesJournal of King Saud University: Computer and Information Sciences, 2022
Cross-site scripting (XSS) attacks have been extensively studied in the literature, although mitigating such attacks remain a challenge for cyber defenders. In this paper, we survey the existing literature on XSS attacks, focusing on the range of attacks
Dragan Korać   +3 more
doaj   +1 more source

Detection of Web Cross-Site Scripting (XSS) Attacks

open access: yesElectronics, 2022
Most applications looking for XSS vulnerabilities have a variety of weaknesses related to the nature of constructing internet applications. Existing XSS vulnerability packages solely scan public net resources, which negatively influences the safety of internet resources.
Mohammad Alsaffar   +6 more
openaire   +1 more source

Home - About - Disclaimer - Privacy