Results 41 to 50 of about 5,960 (196)
Application Research of BiLSTM in Cross-Site Scripting Detection
At present, machine learning methods are used in the most traditional cross-site scripting (XSS) detection technologies, which have some defects, such as bad readability because of maliciously confused code, insufficient feature extraction and low ...
CHENG Qiqin, WAN Liang
doaj +1 more source
Automatic generation of content security policy to mitigate cross site scripting [PDF]
Content Security Policy (CSP) is powerful client-side security layer that helps in mitigating and detecting wide ranges of web attacks including cross-site scripting (XSS).
Atan, Rodziah +2 more
core +1 more source
ABSTRACT As software applications get increasingly connected and complex, cybersecurity becomes more and more important to consider during development and evaluation. Software engineers need to be aware of various security threats and the countermeasures that can be taken to mitigate them.
Raffaela Groner +5 more
wiley +1 more source
This paper proposes SQLi‐ScanEval Framework, a standardized SQLi detection system that integrates vulnerability and penetration testing scanners into a standardized framework. It tested seven prominent SQLi vulnerability scanners including OWASP ZAP, Wapiti, Vega, Acunetix, Invicti, Burp Suite, and Arachni on two prominent vulnerable testing ...
Hajira Bashir +6 more
wiley +1 more source
Detecting Cross-Site Scripting in Web Applications Using Fuzzy Inference System
With improvement in computing and technological advancements, web-based applications are now ubiquitous on the Internet. However, these web applications are becoming prone to vulnerabilities which have led to theft of confidential information, data loss,
Bakare K. Ayeni +2 more
doaj +1 more source
Web applications’ popularity has raised attention in various service domains, which increased the concern about cyber-attacks. One of these most serious and frequent web application attacks is a Cross-site scripting attack (XSS).
Isam Kareem Thajeel +3 more
doaj +1 more source
Automated and Explainable Denial of Service Analysis for AI‐Driven Intrusion Detection Systems
With the increasing frequency and sophistication of distributed denial of service (DDoS) attacks, it has become critical to develop more efficient and interpretable detection methods. Traditional detection systems often struggle with scalability and transparency, hindering real‐time response and understanding of attack vectors. This article presents an
Paul Badu Yakubu +6 more
wiley +1 more source
XSS-GUARD: Precise Dynamic Prevention of Cross-Site Scripting Attacks [PDF]
This paper focuses on defense mechanisms for cross-site scripting attacks, the top threat on web applications today. It is believed that input validation (or filtering) can effectively prevent XSS attacks on the server side. In this paper, we discuss several recent real-world XSS attacks and analyze the reasons for the failure of filtering mechanisms ...
Prithvi Bisht, V. N. Venkatakrishnan
openaire +1 more source
Detection of APTs by Machine Learning: A Performance Comparison
ABSTRACT Recent advances in machine learning and deep learning have significantly impacted multiple domains, including computer vision, natural language processing and cybersecurity. In the context of increasingly sophisticated Advanced Persistent Threats (APTs), deep learning models have shown strong potential for network intrusion detection by ...
Marcos Luengo Viñuela +5 more
wiley +1 more source
Lightweight Deep Learning Approach for Intelligent Intrusion Detection in IoT Networks
Intrusion detection system (IDS) is designed to analyze and monitor the network traffic to identify unauthorized access or attacks in an Internet of Things (IoT). IDS assists in protecting IoT devices and networks by recognizing malicious activities and preventing potential breaches.
Srikanth Mudiyanuru Sriramappa +5 more
wiley +1 more source

