Kumar et al., 2023 - Google Patents
Cross site scripting (XSS) vulnerability detection using machine learning and statistical analysisKumar et al., 2023
- Document ID
- 13204758564910976415
- Author
- Kumar J
- Ponsam J
- Publication year
- Publication venue
- 2023 International Conference on Computer Communication and Informatics (ICCCI)
External Links
Snippet
In our current technological development, usage of social networking, e-commerce, media, and management, web application plays a very indispensable role on the Internet. organizations use web applications to reach information to the public, e-commerce sites like …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2133—Verifying human interaction, e.g., Captcha
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Mokbal et al. | MLPXSS: an integrated XSS-based attack detection scheme in web applications using multilayer perceptron technique | |
Kaur et al. | Detection of cross-site scripting (XSS) attacks using machine learning techniques: a review | |
Zhang et al. | A deep learning method to detect web attacks using a specially designed CNN | |
Alloghani et al. | Implementation of machine learning and data mining to improve cybersecurity and limit vulnerabilities to cyber attacks | |
AlSlaiman et al. | Enhancing false negative and positive rates for efficient insider threat detection | |
Kascheev et al. | The detecting cross-site scripting (XSS) using machine learning methods | |
Banerjee et al. | Detection of XSS in web applications using Machine Learning Classifiers | |
Kumar et al. | Cross site scripting (XSS) Vulnerability detection using machine learning and statistical analysis | |
Demilie et al. | Detection and prevention of SQLI attacks and developing compressive framework using machine learning and hybrid techniques | |
Al-Haija | Cost-effective detection system of cross-site scripting attacks using hybrid learning approach | |
Barlow et al. | A novel approach to detect phishing attacks using binary visualisation and machine learning | |
Ávila et al. | Use of security logs for data leak detection: a systematic literature review | |
Bai et al. | $\sf {DBank} $ DBank: Predictive Behavioral Analysis of Recent Android Banking Trojans | |
Gupta et al. | GeneMiner: a classification approach for detection of XSS attacks on web services | |
Pillai et al. | Hybrid unsupervised web-attack detection and classification–A deep learning approach | |
Akbar et al. | Advanced Persistent Threat Detection Using Data Provenance and Metric Learning | |
Naim et al. | Malicious website identification using design attribute learning | |
Hassan et al. | SQL injection vulnerability detection using deep learning: a feature-based approach | |
Kumar et al. | Performance evaluation of machine learning techniques for detecting cross-site scripting attacks | |
Shahid | Machine learning for detection and mitigation of web vulnerabilities and web attacks | |
Fowdur et al. | A real-time machine learning application for browser extension security monitoring | |
Sharma et al. | Comparative Study of Machine Learning Algorithms for Prediction of SQL Injections | |
IŞiker et al. | Machine learning based web application firewall | |
Kulkarni et al. | Phishing webpage detection: Unveiling the threat landscape and investigating detection techniques | |
Xie | Machine learning-based DDoS detection for IoT networks |