期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
Deploying Hybrid Ensemble Machine Learning Techniques for Effective Cross-Site Scripting(XSS)Attack Detection
1
作者 Noor Ullah Bacha Songfeng Lu +3 位作者 Attiq Ur Rehman Muhammad Idrees Yazeed Yasin Ghadi Tahani Jaser Alahmadi 《Computers, Materials & Continua》 SCIE EI 2024年第10期707-748,共42页
Cross-Site Scripting(XSS)remains a significant threat to web application security,exploiting vulnerabilities to hijack user sessions and steal sensitive data.Traditional detection methods often fail to keep pace with ... Cross-Site Scripting(XSS)remains a significant threat to web application security,exploiting vulnerabilities to hijack user sessions and steal sensitive data.Traditional detection methods often fail to keep pace with the evolving sophistication of cyber threats.This paper introduces a novel hybrid ensemble learning framework that leverages a combination of advanced machine learning algorithms—Logistic Regression(LR),Support Vector Machines(SVM),eXtreme Gradient Boosting(XGBoost),Categorical Boosting(CatBoost),and Deep Neural Networks(DNN).Utilizing the XSS-Attacks-2021 dataset,which comprises 460 instances across various real-world trafficrelated scenarios,this framework significantly enhances XSS attack detection.Our approach,which includes rigorous feature engineering and model tuning,not only optimizes accuracy but also effectively minimizes false positives(FP)(0.13%)and false negatives(FN)(0.19%).This comprehensive methodology has been rigorously validated,achieving an unprecedented accuracy of 99.87%.The proposed system is scalable and efficient,capable of adapting to the increasing number of web applications and user demands without a decline in performance.It demonstrates exceptional real-time capabilities,with the ability to detect XSS attacks dynamically,maintaining high accuracy and low latency even under significant loads.Furthermore,despite the computational complexity introduced by the hybrid ensemble approach,strategic use of parallel processing and algorithm tuning ensures that the system remains scalable and performs robustly in real-time applications.Designed for easy integration with existing web security systems,our framework supports adaptable Application Programming Interfaces(APIs)and a modular design,facilitating seamless augmentation of current defenses.This innovation represents a significant advancement in cybersecurity,offering a scalable and effective solution for securing modern web applications against evolving threats. 展开更多
关键词 cross-site scripting machine learning XSS detection stacking ensemble learning hybrid learning
下载PDF
Design & Test of an Advanced Web Security Analysis Tool (AWSAT)
2
作者 Meenakshi S. P. Manikandaswamy Vijay Madisetti 《Journal of Software Engineering and Applications》 2024年第5期448-461,共14页
Considering the escalating frequency and sophistication of cyber threats targeting web applications, this paper proposes the development of an automated web security analysis tool to address the accessibility gap for ... Considering the escalating frequency and sophistication of cyber threats targeting web applications, this paper proposes the development of an automated web security analysis tool to address the accessibility gap for non-security professionals. This paper presents the design and implementation of an automated web security analysis tool, AWSAT, aimed at enabling individuals with limited security expertise to effectively assess and mitigate vulnerabilities in web applications. Leveraging advanced scanning techniques, the tool identifies common threats such as Cross-Site Scripting (XSS), SQL Injection, and Cross-Site Request Forgery (CSRF), providing detailed reports with actionable insights. By integrating sample payloads and reference study links, the tool facilitates informed decision-making in enhancing the security posture of web applications. Through its user-friendly interface and robust functionality, the tool aims to democratize web security practices, empowering a wider audience to proactively safeguard against cyber threats. 展开更多
关键词 Web Security Automated Analysis Vulnerability Assessment Web Scanning cross-site scripting SQL Injection cross-site Request Forgery
下载PDF
跨站脚本漏洞渗透测试技术 被引量:5
3
作者 王丹 顾明昌 赵文兵 《哈尔滨工程大学学报》 EI CAS CSCD 北大核心 2017年第11期1769-1774,共6页
为提升跨站脚本(XSS)漏洞检测方法的检测效果,本文提出了基于隐马尔科夫模型(HMM)的攻击向量动态生成和优化方法。采用决策树模型和代码混淆策略对攻击向量进行分类和变形,获得测试用攻击向量。使用注入点去重处理和探子技术去除一部分... 为提升跨站脚本(XSS)漏洞检测方法的检测效果,本文提出了基于隐马尔科夫模型(HMM)的攻击向量动态生成和优化方法。采用决策树模型和代码混淆策略对攻击向量进行分类和变形,获得测试用攻击向量。使用注入点去重处理和探子技术去除一部分不存在XSS漏洞的Web页面,避免重复检测不同Web页面中相同的漏洞注入点,减少测试阶段与Web服务器的交互次数;进一步采用XPath路径定位技术提高漏洞检测结果分析的效率。对比实验结果表明,本文提出的方法降低了响应时间和漏报率,提高了检测效率。 展开更多
关键词 跨站脚本漏洞 渗透测试 隐马尔科夫模型 攻击向量 注入点
下载PDF
试析王铎书法艺术 被引量:4
4
作者 周红日 《河北科技大学学报(社会科学版)》 2008年第1期71-72,93,共3页
王铎是明末清初的书法家,他的书法艺术中尤以行草最为世人所重,王铎的草书虽然是学自二王灵秀俊逸一路,其用笔却出自颜真卿、李邕的厚重浑朴,熔碑帖于一炉。涨墨在王铎书法上的应用更发挥到了极至。他的书法气度雄厚、笔性老辣、涨墨淋... 王铎是明末清初的书法家,他的书法艺术中尤以行草最为世人所重,王铎的草书虽然是学自二王灵秀俊逸一路,其用笔却出自颜真卿、李邕的厚重浑朴,熔碑帖于一炉。涨墨在王铎书法上的应用更发挥到了极至。他的书法气度雄厚、笔性老辣、涨墨淋漓、章法宕逸,自成一家。 展开更多
关键词 王铎 书法 行草 涨墨
下载PDF
一种跨站脚本的检测方法 被引量:1
5
作者 余学永 江国华 《小型微型计算机系统》 CSCD 北大核心 2015年第8期1763-1768,共6页
跨站脚本是Web漏洞中一种非常常见并且影响比较广泛的漏洞,它通过浏览器端执行第三方的恶意脚本来实现攻击.针对跨站脚本的测试,提出一种新型的测试方法.与以往研究只针对对于单个服务页面不同的是,文中所提出的方法是从Web系统的整体... 跨站脚本是Web漏洞中一种非常常见并且影响比较广泛的漏洞,它通过浏览器端执行第三方的恶意脚本来实现攻击.针对跨站脚本的测试,提出一种新型的测试方法.与以往研究只针对对于单个服务页面不同的是,文中所提出的方法是从Web系统的整体出发并从用户变量的角度来对跨站脚本进行检测,整个方法包括客户端测试和服务端测试两个部分.针对客户端的数据验证机制的检测,采用了一种静态分析和渗透测试相结合的方法.而针对服务端的跨站脚本检测,通过构造代码的信息流并在信息流的基础上进行污点分析来确定系统中和漏洞相关的用户输入,并且确定与此类输入相关的验证机制是否存在缺陷.依据文中的测试方法实现了跨站脚本漏洞检测原型工具Web Tester,使用Web Tester进行实验的数据表明文中所提出的方法可以比较有效地检测出Web系统中的跨站脚本漏洞. 展开更多
关键词 万维网 跨站脚本 污点分析 信息流 渗透测试 软件测试
下载PDF
Web Security:Emerging Threats and Defense
6
作者 Abdulwahed Awad Almutairi Shailendra Mishra Mohammed AlShehri 《Computer Systems Science & Engineering》 SCIE EI 2022年第3期1233-1248,共16页
Web applications have become a widely accepted method to support the internet for the past decade.Since they have been successfully installed in the business activities and there is a requirement of advanced functiona... Web applications have become a widely accepted method to support the internet for the past decade.Since they have been successfully installed in the business activities and there is a requirement of advanced functionalities,the configuration is growing and becoming more complicated.The growing demand and complexity also make these web applications a preferred target for intruders on the internet.Even with the support of security specialists,they remain highly problematic for the complexity of penetration and code reviewing methods.It requires considering different testing patterns in both codes reviewing and penetration testing.As a result,the number of hacked websites is increasing day by day.Most of these vulnerabilities also occur due to incorrect input validation and lack of result validation for lousy programming practices or coding errors.Vulnerability scanners for web applications can detect a few vulnerabilities in a dynamic approach.These are quite easy to use;however,these often miss out on some of the unique critical vulnerabilities in a different and static approach.Although these are time-consuming,they can find complex vulnerabilities and improve developer knowledge in coding and best practices.Many scanners choose both dynamic and static approaches,and the developers can select them based on their requirements and conditions.This research explores and provides details of SQL injection,operating system command injection,path traversal,and cross-site scripting vulnerabilities through dynamic and static approaches.It also examines various security measures in web applications and selected five tools based on their features for scanning PHP,and JAVA code focuses on SQL injection,cross-site scripting,Path Traversal,operating system command.Moreover,this research discusses the approach of a cyber-security tester or a security developer finding out vulnerabilities through dynamic and static approaches using manual and automated web vulnerability scanners. 展开更多
关键词 SQL injection attack cross-site scripting attack command injection attack path traversal attack
下载PDF
基于Akast的XSS网络渗透攻击研究
7
作者 涂传唐 《无线互联科技》 2020年第5期21-22,共2页
文章针对黑客最新的Akast XSS渗透攻击手段,利用Web站点文本交互,嵌入诱导攻击于文字代码,成功躲避信息安全防范攻击;列举了获取后台系统信息过程;提出了不同环境下的防范方法,警示系统漏洞危害和Web站点安全。
关键词 Akast 跨站脚本渗透 网络攻击 信息安全 黑客
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部