Results 31 to 40 of about 5,960 (196)

Machine and Deep Learning-based XSS Detection Approaches: A Systematic Literature Review

open access: yesJournal of King Saud University: Computer and Information Sciences, 2023
Web applications are paramount tools for facilitating services providing in the modern world. Unfortunately, the tremendous growth in the web application usage has resulted in a rise in cyberattacks. Cross-site scripting (XSS) is one of the most frequent
Isam Kareem Thajeel   +3 more
doaj   +1 more source

State-Sensitive Black-Box Web Application Scanning for Cross-Site Scripting Vulnerability Detection

open access: yesApplied Sciences, 2023
Black-box web application scanning has been a popular technique to detect Cross-Site Scripting (XSS) vulnerabilities without prior knowledge of the application. However, several limitations lead to low efficiency of current black-box scanners, including (
Tianxiang Zhang   +4 more
doaj   +1 more source

CODDLE: Code-Injection Detection With Deep Learning

open access: yesIEEE Access, 2019
Code Injection attacks such as SQL Injection and Cross-Site Scripting (XSS) are among the major threats for today's web applications and systems. This paper proposes CODDLE, a deep learning-based intrusion detection systems against web-based code ...
Stanislav Abaimov, Giuseppe Bianchi
doaj   +1 more source

Providing Email Privacy by Preventing Webmail from Loading Malicious XSS Payloads

open access: yesApplied Sciences, 2020
With the development of internet technology, email has become the formal communication method in modern society. Email often contains a large amount of personal privacy information, possible business agreements, and sensitive attachments, which make ...
Yong Fang   +3 more
doaj   +1 more source

Analisis Kerentanan Serangan Cross Site Scripting (XSS) pada Aplikasi Smart Payment Menggunakan Framework OWASP

open access: yesJISKA (Jurnal Informatika Sunan Kalijaga), 2020
E-commerce that is growing so rapidly can provide space for unauthorized parties in carrying out cybercrime, security anticipation is needed so that e-commerce applications can be protected from harassment or hacking attacks such as cross-site scripting (
Imam Riadi, Rusydi Umar, Tri Lestari
doaj   +1 more source

XSS-Dec: A Hybrid Solution to Mitigate Cross-Site Scripting Attacks [PDF]

open access: yes, 2012
Cross-site scripting attacks represent one of the major security threats in today's Web applications. Current approaches to mitigate cross-site scripting vulnerabilities rely on either server-based or client-based defense mechanisms. Although effective for many attacks, server-side protection mechanisms may leave the client vulnerable if the server is ...
Smitha Sundareswaran   +1 more
openaire   +1 more source

Reverse Proxy Framework using Sanitization Technique for Intrusion Prevention in Database

open access: yes, 2013
With the increasing importance of the internet in our day to day life, data security in web application has become very crucial. Ever increasing on line and real time transaction services have led to manifold rise in the problems associated with the ...
Chougule, Archana   +2 more
core   +1 more source

Automatic Creation of SQL Injection and Cross-Site Scripting Attacks [PDF]

open access: yes, 2008
We present a technique for finding security vulnerabilitiesin Web applications. SQL Injection (SQLI) and cross-sitescripting (XSS) attacks are widespread forms of attackin which the attacker crafts the input to the application toaccess or modify user ...
Ernst, Michael D.   +3 more
core   +5 more sources

Detecting Cross-Site Scripting Attacks Using Machine Learning [PDF]

open access: yes, 2018
Cross-site scripting (XSS) is one of the most frequently occurring types of attacks on web applications, hence is of importance in information security.
Howe, J. M., Mereani, F.
core   +1 more source

XSS Peeker: A Systematic Analysis of Cross-site Scripting Vulnerability Scanners

open access: yesCoRR, 2014
Since the first publication of the "OWASP Top 10" (2004), cross-site scripting (XSS) vulnerabilities have always been among the top 5 web application security bugs. Black-box vulnerability scanners are widely used in the industry to reproduce (XSS) attacks automatically.
Enrico Bazzoli   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy