[go: up one dir, main page]

Kumar et al., 2023 - Google Patents

Cross site scripting (XSS) Vulnerability detection using machine learning and statistical analysis

Kumar et al., 2023

Document ID
13204758564910976415
Author
Kumar J
Ponsam J
Publication year
Publication venue
2023 International conference on computer communication and informatics (ICCCI)

External Links

Snippet

In our current technological development, usage of social networking, e-commerce, media, and management, web application plays a very indispensable role on the Internet. organizations use web applications to reach information to the public, e-commerce sites like …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2133Verifying human interaction, e.g., Captcha

Similar Documents

Publication Publication Date Title
Mokbal et al. MLPXSS: an integrated XSS-based attack detection scheme in web applications using multilayer perceptron technique
Tariq et al. Resolving cross-site scripting attacks through genetic algorithm and reinforcement learning
Zhang et al. A deep learning method to detect web attacks using a specially designed CNN
Demilie et al. Detection and prevention of SQLI attacks and developing compressive framework using machine learning and hybrid techniques
Tadhani et al. Securing web applications against XSS and SQLi attacks using a novel deep learning approach
Kumar et al. Cross site scripting (XSS) Vulnerability detection using machine learning and statistical analysis
Kascheev et al. The detecting cross-site scripting (XSS) using machine learning methods
Banerjee et al. Detection of XSS in web applications using Machine Learning Classifiers
US20250159008A1 (en) Full-scene cybersecurity threat-related analysis method and system thereof
Ávila et al. Use of security logs for data leak detection: a systematic literature review
Pillai et al. Hybrid unsupervised web-attack detection and classification–A deep learning approach
Bai et al. $\sf {DBank} $ DBank: Predictive Behavioral Analysis of Recent Android Banking Trojans
Gupta et al. GeneMiner: a classification approach for detection of XSS attacks on web services
Naim et al. Malicious website identification using design attribute learning
IŞiker et al. Machine learning based web application firewall
Shahid Machine learning for detection and mitigation of web vulnerabilities and web attacks
Kumar et al. Performance evaluation of machine learning techniques for detecting cross-site scripting attacks
Kulkarni et al. Phishing webpage detection: Unveiling the threat landscape and investigating detection techniques
Sharma et al. Comparative study of machine learning algorithms for prediction of SQL injections
Sharma et al. WOA-XGboost classifier to detect XSS attacks
Kalim et al. Novel Detection Technique For Framejacking Vulnerabilities In Web Applications
Wang et al. DoubleR: Effective XSS attacking reality detection
Sharma et al. A Grey Wolf Optimized XGboost-Multilayer Stacking Approach to Detect XSS Attacks
Tarannum et al. Cyber Security Issues: Web Attack Investigation
Fonseka et al. Detecting tabnabbing attacks via an RL-Based agent