The advancement of technology and the digitization of organizational functions and services have propelled the world into a new era of computing capability and sophistication. The proliferation and usability of such c...The advancement of technology and the digitization of organizational functions and services have propelled the world into a new era of computing capability and sophistication. The proliferation and usability of such complex technological services raise several security concerns. One of the most critical concerns is cross-site scripting (XSS) attacks. This paper has concentrated on revealing and comprehensively analyzing XSS injection attacks, detection, and prevention concisely and accurately. I have done a thorough study and reviewed several research papers and publications with a specific focus on the researchers’ defensive techniques for preventing XSS attacks and subdivided them into five categories: machine learning techniques, server-side techniques, client-side techniques, proxy-based techniques, and combined approaches. The majority of existing cutting-edge XSS defensive approaches carefully analyzed in this paper offer protection against the traditional XSS attacks, such as stored and reflected XSS. There is currently no reliable solution to provide adequate protection against the newly discovered XSS attack known as DOM-based and mutation-based XSS attacks. After reading all of the proposed models and identifying their drawbacks, I recommend a combination of static, dynamic, and code auditing in conjunction with secure coding and continuous user awareness campaigns about XSS emerging attacks.展开更多
Web pre-fetching is one of the most popular strategies, which are proposed for reducing the perceived access delay and improving the service quality of web server. In this paper, we present a pre-fetching model based ...Web pre-fetching is one of the most popular strategies, which are proposed for reducing the perceived access delay and improving the service quality of web server. In this paper, we present a pre-fetching model based an the hidden Markov model, which mines the later information requirement concepts that the user's access path contains and makes semantic-based pre-fetching decisions. Experimental results show that our schcme has better predictive pre-fetching precision.展开更多
The increase in the number of databases accessed only by some applications has made code injection attacks an important threat to almost any current system. If one of these applications accepts inputs from a client an...The increase in the number of databases accessed only by some applications has made code injection attacks an important threat to almost any current system. If one of these applications accepts inputs from a client and executes these inputs without first validating them, the attackers are free to execute their own queries and therefore, to extract, modify or delete the content of the database associated to the application. In this paper a deep analysis of the LDAP injection techniques is presented. Furthermore, a clear distinction between classic and blind injection techniques is made.展开更多
针对病险水库大坝失事这一涉及社会公众安全的突发事件,借鉴国外的洪灾评估技术,结合我国水库大坝管理现状,构建了基于W eb G IS技术的病险水库灾情动态评估系统架构.并研究了数据库的建立、灾前预测评估、灾中实时评估和灾后反馈评估的...针对病险水库大坝失事这一涉及社会公众安全的突发事件,借鉴国外的洪灾评估技术,结合我国水库大坝管理现状,构建了基于W eb G IS技术的病险水库灾情动态评估系统架构.并研究了数据库的建立、灾前预测评估、灾中实时评估和灾后反馈评估的4个阶段.展开更多
文摘The advancement of technology and the digitization of organizational functions and services have propelled the world into a new era of computing capability and sophistication. The proliferation and usability of such complex technological services raise several security concerns. One of the most critical concerns is cross-site scripting (XSS) attacks. This paper has concentrated on revealing and comprehensively analyzing XSS injection attacks, detection, and prevention concisely and accurately. I have done a thorough study and reviewed several research papers and publications with a specific focus on the researchers’ defensive techniques for preventing XSS attacks and subdivided them into five categories: machine learning techniques, server-side techniques, client-side techniques, proxy-based techniques, and combined approaches. The majority of existing cutting-edge XSS defensive approaches carefully analyzed in this paper offer protection against the traditional XSS attacks, such as stored and reflected XSS. There is currently no reliable solution to provide adequate protection against the newly discovered XSS attack known as DOM-based and mutation-based XSS attacks. After reading all of the proposed models and identifying their drawbacks, I recommend a combination of static, dynamic, and code auditing in conjunction with secure coding and continuous user awareness campaigns about XSS emerging attacks.
基金The research is supported by the National Natural Science Foundation of China(No. 60082003)
文摘Web pre-fetching is one of the most popular strategies, which are proposed for reducing the perceived access delay and improving the service quality of web server. In this paper, we present a pre-fetching model based an the hidden Markov model, which mines the later information requirement concepts that the user's access path contains and makes semantic-based pre-fetching decisions. Experimental results show that our schcme has better predictive pre-fetching precision.
文摘The increase in the number of databases accessed only by some applications has made code injection attacks an important threat to almost any current system. If one of these applications accepts inputs from a client and executes these inputs without first validating them, the attackers are free to execute their own queries and therefore, to extract, modify or delete the content of the database associated to the application. In this paper a deep analysis of the LDAP injection techniques is presented. Furthermore, a clear distinction between classic and blind injection techniques is made.