Kumar et al., 2023 - Google Patents
Cross site scripting (XSS) Vulnerability detection using machine learning and statistical analysisKumar et al., 2023
- Document ID
- 13204758564910976415
- Author
- Kumar J
- Ponsam J
- Publication year
- Publication venue
- 2023 International conference on computer communication and informatics (ICCCI)
External Links
Snippet
In our current technological development, usage of social networking, e-commerce, media, and management, web application plays a very indispensable role on the Internet. organizations use web applications to reach information to the public, e-commerce sites like …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2133—Verifying human interaction, e.g., Captcha
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Mokbal et al. | MLPXSS: an integrated XSS-based attack detection scheme in web applications using multilayer perceptron technique | |
Tariq et al. | Resolving cross-site scripting attacks through genetic algorithm and reinforcement learning | |
Zhang et al. | A deep learning method to detect web attacks using a specially designed CNN | |
Demilie et al. | Detection and prevention of SQLI attacks and developing compressive framework using machine learning and hybrid techniques | |
Tadhani et al. | Securing web applications against XSS and SQLi attacks using a novel deep learning approach | |
Kumar et al. | Cross site scripting (XSS) Vulnerability detection using machine learning and statistical analysis | |
Kascheev et al. | The detecting cross-site scripting (XSS) using machine learning methods | |
Banerjee et al. | Detection of XSS in web applications using Machine Learning Classifiers | |
US20250159008A1 (en) | Full-scene cybersecurity threat-related analysis method and system thereof | |
Ávila et al. | Use of security logs for data leak detection: a systematic literature review | |
Pillai et al. | Hybrid unsupervised web-attack detection and classification–A deep learning approach | |
Bai et al. | $\sf {DBank} $ DBank: Predictive Behavioral Analysis of Recent Android Banking Trojans | |
Gupta et al. | GeneMiner: a classification approach for detection of XSS attacks on web services | |
Naim et al. | Malicious website identification using design attribute learning | |
IŞiker et al. | Machine learning based web application firewall | |
Shahid | Machine learning for detection and mitigation of web vulnerabilities and web attacks | |
Kumar et al. | Performance evaluation of machine learning techniques for detecting cross-site scripting attacks | |
Kulkarni et al. | Phishing webpage detection: Unveiling the threat landscape and investigating detection techniques | |
Sharma et al. | Comparative study of machine learning algorithms for prediction of SQL injections | |
Sharma et al. | WOA-XGboost classifier to detect XSS attacks | |
Kalim et al. | Novel Detection Technique For Framejacking Vulnerabilities In Web Applications | |
Wang et al. | DoubleR: Effective XSS attacking reality detection | |
Sharma et al. | A Grey Wolf Optimized XGboost-Multilayer Stacking Approach to Detect XSS Attacks | |
Tarannum et al. | Cyber Security Issues: Web Attack Investigation | |
Fonseka et al. | Detecting tabnabbing attacks via an RL-Based agent |