[go: up one dir, main page]

Kumar et al., 2023 - Google Patents

Cross site scripting (XSS) vulnerability detection using machine learning and statistical analysis

Kumar et al., 2023

Document ID
13204758564910976415
Author
Kumar J
Ponsam J
Publication year
Publication venue
2023 International Conference on Computer Communication and Informatics (ICCCI)

External Links

Snippet

In our current technological development, usage of social networking, e-commerce, media, and management, web application plays a very indispensable role on the Internet. organizations use web applications to reach information to the public, e-commerce sites like …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2133Verifying human interaction, e.g., Captcha

Similar Documents

Publication Publication Date Title
Mokbal et al. MLPXSS: an integrated XSS-based attack detection scheme in web applications using multilayer perceptron technique
Kaur et al. Detection of cross-site scripting (XSS) attacks using machine learning techniques: a review
Zhang et al. A deep learning method to detect web attacks using a specially designed CNN
Alloghani et al. Implementation of machine learning and data mining to improve cybersecurity and limit vulnerabilities to cyber attacks
AlSlaiman et al. Enhancing false negative and positive rates for efficient insider threat detection
Kascheev et al. The detecting cross-site scripting (XSS) using machine learning methods
Banerjee et al. Detection of XSS in web applications using Machine Learning Classifiers
Kumar et al. Cross site scripting (XSS) Vulnerability detection using machine learning and statistical analysis
Demilie et al. Detection and prevention of SQLI attacks and developing compressive framework using machine learning and hybrid techniques
Al-Haija Cost-effective detection system of cross-site scripting attacks using hybrid learning approach
Barlow et al. A novel approach to detect phishing attacks using binary visualisation and machine learning
Ávila et al. Use of security logs for data leak detection: a systematic literature review
Bai et al. $\sf {DBank} $ DBank: Predictive Behavioral Analysis of Recent Android Banking Trojans
Gupta et al. GeneMiner: a classification approach for detection of XSS attacks on web services
Pillai et al. Hybrid unsupervised web-attack detection and classification–A deep learning approach
Akbar et al. Advanced Persistent Threat Detection Using Data Provenance and Metric Learning
Naim et al. Malicious website identification using design attribute learning
Hassan et al. SQL injection vulnerability detection using deep learning: a feature-based approach
Kumar et al. Performance evaluation of machine learning techniques for detecting cross-site scripting attacks
Shahid Machine learning for detection and mitigation of web vulnerabilities and web attacks
Fowdur et al. A real-time machine learning application for browser extension security monitoring
Sharma et al. Comparative Study of Machine Learning Algorithms for Prediction of SQL Injections
IŞiker et al. Machine learning based web application firewall
Kulkarni et al. Phishing webpage detection: Unveiling the threat landscape and investigating detection techniques
Xie Machine learning-based DDoS detection for IoT networks