Rodriguez et al., 2019 - Google Patents
XSStudent: Proposal to Avoid Cross-Site Scripting (XSS) Attacks in UniversitiesRodriguez et al., 2019
View PDF- Document ID
- 12226191647539542378
- Author
- Rodriguez G
- Torres J
- Flores P
- Benavides E
- Nuñez-Agurto D
- Publication year
- Publication venue
- 2019 3rd Cyber Security in Networking Conference (CSNet)
External Links
Snippet
QR codes are the means to offer more direct and instant access to information. However, QR codes have shown their deficiency, being a very powerful attack vector, for example, to execute phishing attacks. In this study, we have proposed a solution that allows controlling …
- 235000015278 beef 0 abstract description 8
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/083—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11709945B2 (en) | System and method for identifying network security threats and assessing network security | |
| Begou et al. | Exploring the dark side of ai: Advanced phishing attack design and deployment using chatgpt | |
| Shah et al. | An overview of vulnerability assessment and penetration testing techniques | |
| CA2966408C (en) | A system and method for network intrusion detection of covert channels based on off-line network traffic | |
| Buchanan et al. | Analysis of the adoption of security headers in HTTP | |
| Koniaris et al. | Analysis and visualization of SSH attacks using honeypots | |
| Bhardwaj et al. | Privacy-aware detection framework to mitigate new-age phishing attacks | |
| Pritom et al. | Characterizing the landscape of covid-19 themed cyberattacks and defenses | |
| Hubbard et al. | A study of SSL proxy attacks on Android and iOS mobile applications | |
| Tkachenko et al. | Enhancing Front‐End Security: Protecting User Data and Privacy in Web Applications | |
| Kollepalli et al. | An Experimental Study on Detecting and Mitigating Vulnerabilities in Web Applications. | |
| Shahriar et al. | PhishTester: automatic testing of phishing attacks | |
| Rodriguez et al. | XSStudent: Proposal to Avoid Cross-Site Scripting (XSS) Attacks in Universities | |
| Al-Khannak et al. | Penetration Testing for the cloud-based web application | |
| Krasniqi et al. | Vulnerability Assessment & Penetration Testing: Case study on web application security | |
| Althobaiti et al. | A review of organization-oriented phishing research | |
| Satter et al. | Vulnerabilities assessment of emerging web-based services in developing countries | |
| Rodríguez et al. | XSS2DENT, Detecting Cross-Site Scripting Attacks (XSS) Vulnerabilities: A Case Study | |
| Pan et al. | TORCHLIGHT: Shedding LIGHT on Real-World Attacks on Cloudless IoT Devices Concealed within the Tor Network | |
| Amoo et al. | Advent Children: Union Worx Threat Hunting | |
| Radholm et al. | Ethical Hacking of an IoT-device: Threat Assessment and Penetration Testing: A Survey on Security of a Smart Refrigerator | |
| Jadhav | An Analytic Approach to Improve Security Features of Web Application using Freeware WAF | |
| Ferraro Petrillo et al. | The design and implementation of a secure CAPTCHA against man‐in‐the‐middle attacks | |
| De Ryck | Client-side web security: mitigating threats against web sessions | |
| Huy | A Study in Advanced Methods for Website Security: Application of Tor and OWASP Zed Attack Proxy |