Limpar
943 resultados

Acesso aberto

Tipo do recurso

Ano de criação

Produção nacional

Revisado por pares

Áreas

Idioma

Editores

Artigo

Dieter Gollmann,

... attack patterns, i.e. SQL injection, cross-site scripting, cross-site request forgery, JavaScript hijacking, and DNS rebinding, together ...

Tópico(s): Advanced Malware Detection Techniques

2008 - Elsevier BV | Information Security Technical Report

Artigo

Yossi Gilad, Amir Herzberg,

... any user of that cache to cross-site scripting , cross-site request forgery , and phishing attacks. In contrast to ...

Tópico(s): Internet Traffic Analysis and Secure E-voting

2014 - Association for Computing Machinery | ACM Transactions on Information and System Security

Capítulo de livro Revisado por pares

Anne Edmundson, Brian Holtkamp, Emanuel Rivera, Matthew Finifter, Adrian Mettler, David Wagner,

... known vulnerabilities, including three different types: Cross-Site Scripting, Cross-Site Request Forgery, and SQL Injection. Our findings include: ( ...

Tópico(s): Information and Cyber Security

2013 - Springer Science+Business Media | Lecture notes in computer science

Artigo Acesso aberto

Ja’far Alqatawna, Hossam Faris, Khalid Jaradat, Malek Al‐Zewairi, Omar Adwan,

... vectors including attacks such as phishing, cross-site scripting, cross-site request forgery and malware infection. Statistics show that ...

Tópico(s): Network Security and Intrusion Detection

2015 - Scientific Research Publishing | International Journal of Communications Network and System Sciences

Artigo

V. Nithya, S. Lakshmana Pandian, C. Malarvizhi,

... to attack the web application is Cross-Site Scripting (XSS). Cross-Site Scripting (XSS) vulnerabilities are being exploited by the attackers ... browser. The analysis of detection and prevention of Cross-Site Scripting (XSS) help to avoid this type of attack. ... this ki nd of manipulation and hence eliminate Cross-Site Scripting attack.

Tópico(s): Advanced Malware Detection Techniques

2015 - Science and Engineering Research Support Society | International Journal of Security and Its Applications

Artigo

Jyoti Snehi, Renu Dhir,

... rendering organizations helpless and prone to cross site scripting attacks. Cross Site Scripting attacks are difficult to detect because they are executed as a background process. Cross Site Scripting is the most common web vulnerabilities in existence ...

Tópico(s): Advanced Malware Detection Techniques

2005 - Khalsa Publications | INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY

Artigo Acesso aberto Revisado por pares

Ain Zubaidah Mohd Saleh, Nur Amizah Binti Rozali, Alya Geogiana Buja, Kamarularifin Abd Jalil, Fakariah Hani Mohd Ali, Teh Faradilla Abdul Rahman,

... vulnerabilities are SQL Injection, Buffer Overflow, Cross Site Scripting and Cross Site request Forgery. In order to overcome this vulnerabilities, ...

Tópico(s): Network Security and Intrusion Detection

2015 - Elsevier BV | Procedia Computer Science

Artigo Acesso aberto Revisado por pares

Xuyan Song, Chen Chen, Baojiang Cui, Junsong Fu,

... to launch various attacks, such as Cross-Site Scripting (XSS), Cross-site Request Forgery (CSRF), and drive-by download attack. ...

Tópico(s): Web Application Security Vulnerabilities

2020 - Multidisciplinary Digital Publishing Institute | Applied Sciences

Artigo

Ramya Dharam, Sajjan G. Shiva,

... applications include SQL Injection Attacks (SQLIAs), Cross-Site Scripting (CSS), Cross-Site Request Forgery (CSRF), Path Traversal Attacks, etc.

Tópico(s): Digital and Cyber Forensics

2012 - | International Journal of Cyber-Security and Digital Forensics

Artigo Acesso aberto

S. Krishnaveni, K. Sathiyakumari,

... These types of attacks are called Cross-Site Scripting (XSS) attacks.Cross Site Scripting (XSS) attacks are the most common type of ...

Tópico(s): Spam and Phishing Detection

2013 - | International Journal of Computer Applications

Artigo Acesso aberto

Isatou Hydara, Abu Bakar Md Sultan, Hazura Zulzalil, Novia Admodisastro,

... applications, on a daily basis. These attacks, including cross-site scripting, have caused damages for both web site owners and users. Cross-site scripting vulnerabilities are easy to exploit but difficult to ... proposed for their detection. However, the problem of cross-site scripting vulnerabilities present in web applications still persists. In ... genetic algorithms that will be able to detect cross-site scripting vulnerabilities in the source code before an application ... modifications. Initial evaluations have indicated promising results.Keywords: Cross-Site Scripting, Genetic Algorithm, Software Security, Vulnerability Detection

Tópico(s): Advanced Malware Detection Techniques

2015 - Indian Society for Education and Environment | Indian Journal of Science and Technology

Artigo Revisado por pares

Tianle Hu, Chonghai Xu, Shenwen Zhang, Shuangshuang Tao, Luqun Li,

... Traditional antivirus software cannot identify such cross-site scripting attacks. To identify cross-site scripting attacks quickly and accurately, we proposed a cross-site scripting detection model (C-BLA) with two-channel multi- ... a self-attention mechanism. The model first maps cross-site scripting payloads into spatial vectors by data preprocessing using ... the data. Channel I: extract local features of cross-site scripting payloads at different scales by designing parallel one- ... kernel sizes; Channel II: extract semantic information of cross-site scripting payloads from two directions of positive and negative ...

Tópico(s): Spam and Phishing Detection

2022 - Elsevier BV | Computers & Security

Artigo Acesso aberto

Isaac Odun- Ayo, Williams Toro- Abasi, Marion O. Adebiyi, Oladapo Alagbe,

Cross-site scripting has caused considerable harm to the economy and individual privacy. Deep learning consists of three primary ... to achieve real-time detection and prevention of cross-site scripting attacks in cloud-based web applications, using deep ... of accuracy. This project work utilized five phases cross-site scripting payloads and Benign user inputs extraction, feature engineering, ... deep learning modeling, and classification filter for Malicious cross-site scripting queries. A web application was then developed with ...

Tópico(s): Digital and Cyber Forensics

2021 - Institute of Advanced Engineering and Science (IAES) | Bulletin of Electrical Engineering and Informatics

Artigo Revisado por pares

Zhonglin Liu, Yong Fang, Cheng Huang, Jiaxuan Han,

... for stealing private information from web applications is cross-site scripting attacks. Attackers frequently use cross-site scripting vulnerabilities to steal victims' identity information or hijack login tokens. Therefore, we proposed a cross-site scripting payload detection model based on graph convolutional networks, which could identify the cross-site scripting payload in the content submitted by the user ( ... network and the residual network to train the cross-site scripting detection model. In experiments, the model based on ...

Tópico(s): Advanced Malware Detection Techniques

2021 - Elsevier BV | Computers & Security

Artigo Revisado por pares

Engin Kirda, Nenad Jovanović, Christopher Kruegel, Giovanni Vigna,

... to the trusted site. Such attacks are called cross-site scripting (XSS) attacks. In general, XSS attacks are easy ... knowledge, the first client-side solution to mitigate cross-site scripting attacks. Noxes acts as a web proxy and ... manual and automatically generated rules to mitigate possible cross-site scripting attempts. Noxes effectively protects against information leakage from ...

Tópico(s): Advanced Malware Detection Techniques

2009 - Elsevier BV | Computers & Security

Artigo Acesso aberto

Dr Kavita Patil, Kailas Patil,

... vulnerabilities.According to OWASP TOP 10 vulnerability report, Cross-site Scripting (XSS) is among top 5 vulnerabilities.So this ... to implement effective solution for the prevention of cross-site scripting vulnerabilities.In this paper, we implemented a novel ... XSS attacks.Our sanitizer is able to detect cross-site scripting vulnerabilities at the client-side.It strengthens web ...

Tópico(s): Web Application Security Vulnerabilities

2015 - | International Journal of Computer Applications

Artigo Acesso aberto Revisado por pares

Zhonglin Liu, Yong Fang, Cheng Huang, Yijia Xu,

... tokens make web applications often targeted by hackers. Cross-site scripting attacks are the most common method used to ... applications. To solve the security risks caused by cross-site scripting vulnerabilities, security personnel need to actively discover these ... genes. Combined with the grammatical structure features of cross-site scripting and common bypass methods, the gene sequences are ... high-quality vectors are used to detect potential cross-site scripting threats in the application (we named the implementation ...

Tópico(s): Spam and Phishing Detection

2022 - Hindawi Publishing Corporation | Security and Communication Networks

Artigo Acesso aberto

Muhammad Noman Khalid, Muhammad Iqbal, Kamran Rasheed, Malik Muneeb Abid,

... in web applications.Recently, SQL Injection, Cross Site Scripting (XSS) and Cross Site Request Forgery (CSRF) seriously threaten the most of ...

Tópico(s): Spam and Phishing Detection

2020 - | International Journal of Information Technology and Computer Science

Capítulo de livro Acesso aberto Revisado por pares

Smitha Sundareswaran, Anna Squicciarini,

Cross-site scripting attacks represent one of the major security threats in today's Web applications. Current approaches to mitigate cross-site scripting vulnerabilities rely on either server-based or client- ... our approach through extended testing using real-world cross-site scripting exploits.

Tópico(s): Information and Cyber Security

2012 - Springer Science+Business Media | Lecture notes in computer science

Artigo Acesso aberto Revisado por pares

Qasem Abu Al‐Haija,

Cross-Site Scripting (XSS) attacks inject malicious code payloads into web application logs, triggering stored cross-site scripting execution when accessing the view-logs interface. The destruction produced by the XSS injection susceptibilities is especially ...

Tópico(s): Advanced Malware Detection Techniques

2023 - Elsevier BV | Results in Engineering

Artigo Revisado por pares

Iram Tariq, Muddassar Azam Sindhu, Rabeeh Ayaz Abbasi, Akmal Saeed Khattak, Onaiza Maqbool, Ghazanfar Farooq Siddiqui,

Cross Site Scripting (XSS) is one of the most frequently occurring vulnerability. The impact of XSS can vary from ... of XSS efficiently is still an open issue. Cross site scripting has been dealt with static and dynamic analysis previously. Both techniques have shortcomings and fail due to ...

Tópico(s): Advanced Malware Detection Techniques

2020 - Elsevier BV | Expert Systems with Applications

Artigo Acesso aberto

Oluwakemi Christiana Abikoye, Abdullahi Abubakar, Ahmed Haruna Dokoro, Akande Noah Oluwatobi, Aderonke Anthonia Kayode,

Abstract Structured Query Language (SQL) injection and cross-site scripting remain a major threat to data-driven web applications. Instances where hackers obtain unrestricted access to back-end database of web applications so ... measured using different test cases of SQL injection, cross-site scripting (XSS), and encoded injection attacks. Results obtained revealed ...

Tópico(s): Security and Verification in Computing

2020 - Springer Science+Business Media | EURASIP Journal on Information Security

Artigo Acesso aberto Revisado por pares

Isatou Hydara, Abu Bakar Md Sultan, Hazura Zulzalil, Novia Admodisastro,

Cross-site scripting (XSS) is a security vulnerability that affects web applications. It occurs due to improper or lack ... reviewed a total of 115 studies related to cross-site scripting from various journals and conference proceedings. Research on ...

Tópico(s): Information and Cyber Security

2014 - Elsevier BV | Information and Software Technology

Artigo Acesso aberto Revisado por pares

Bakare Ayeni, Junaidu B. Sahalu, Kolawole R. Adeyanju,

... data access in the course of information transmission. Cross-site scripting (XSS) is a form of web security attack ... this paper describes an “intelligent” tool for detecting cross-site scripting flaws in web applications. This paper describes the ...

Tópico(s): Network Security and Intrusion Detection

2018 - Hindawi Publishing Corporation | Journal of Computer Networks and Communications

Artigo Revisado por pares

Germán Rodríguez, Jenny Torres, Pamela Flores, Eduardo Benavides-Astudillo,

... attack attempts lead to a method known as Cross-Site Scripting (XSS), which was the most widely used technique. ... malicious code on another user's computer. Also, Cross Site Scripting is a type of cyber attack by which ...

Tópico(s): Spam and Phishing Detection

2019 - Elsevier BV | Computer Networks

Artigo Revisado por pares

G. Usha, S. Kannimuthu, P. D. Mahendiran, Anusha Kadambari Shanker, D. Venugopal,

... paper, we concentrate on the particular issue of cross site scripting (XSS) assaults. We exhibit a scientific categorisation think about on cross site scripting assaults. We have additionally examined different sorts of ...

Tópico(s): Security and Verification in Computing

2020 - Inderscience Publishers | International Journal of Information and Computer Security

Revisão Revisado por pares

Jun-Ming Gan, Hang-Yek Ling, Yu‐Beng Leau,

... standard software system allowing human and computer communication. Cross-Site Scripting (XSS) attacks are a prevalent cybersecurity threat. This paper contains the brief emergence of Cross-Site Scripting Attacks (XSS), the key trigger and effects of Cross-Site Scripting Attacks (XSS), the existing Cross-Site Scripting Detection and Prevention Mechanism (XSS), and the analysis of current frameworks. Therefore, the current Cross-Site Scripting (XSS) detection and prevention mechanism would address how ...

Tópico(s): Security and Verification in Computing

2021 - Springer Science+Business Media | Communications in computer and information science

Artigo Acesso aberto Revisado por pares

Faizan Younas, Ali Raza, Nisrean Thalji, Laith Abualigah, Raed Abu Zitar, Heming Jia,

Cross-Site Scripting (XSS) attacks continue to pose a significant threat to web applications, compromising the security and integrity ... which combines temporal and TFIDF features from the cross-site scripting dataset, resulting in a new feature set. Extensive ...

Tópico(s): Advanced Malware Detection Techniques

2024 - Elsevier BV | Decision Analytics Journal

Capítulo de livro Revisado por pares

Joe Portner, Joel Kerr, Bill Chu,

We present a new method to defend against cross-site scripting (XSS) attacks. Our approach is based on mutating ... Policy (CSP), a leading web standard to prevent cross site scripting, but can be much more easily adopted because ...

Tópico(s): Advanced Malware Detection Techniques

2015 - Springer Science+Business Media | Lecture notes in computer science

Capítulo de livro Revisado por pares

S. Fouzul Hidhaya, Angelina Geetha,

... are the SQL Injection attacks (SQLIA) and the Cross Site Scripting Attack (XSS), contributing to 30% of the total ... a reverse proxy, to mitigate SQL injection and Cross Site Scripting Attacks. This system provides a server side solution ...

Tópico(s): Advanced Malware Detection Techniques

2012 - Springer Science+Business Media | Communications in computer and information science