web应用程序中的跨站脚本攻击

Aliga Paul Aliga, A. M. John-Otumu, Rebecca E Imhanhahimi, Atuegbelo Confidence Akpe
{"title":"web应用程序中的跨站脚本攻击","authors":"Aliga Paul Aliga, A. M. John-Otumu, Rebecca E Imhanhahimi, Atuegbelo Confidence Akpe","doi":"10.37121/JASE.V1I2.19","DOIUrl":null,"url":null,"abstract":"Web-based applications has turn out to be very prevalent due to the ubiquity of web browsers to deliver service oriented application on-demand to diverse client over the Internet and cross site scripting (XSS) attack is a foremost security risk that has continuously ravage the web applications over the years. This paper critically examines the concept of XSS and some recent approaches for detecting and preventing XSS attacks in terms of architectural framework, algorithm used, solution location, and so on. The techniques were analysed and results showed that most of the available recognition and avoidance solutions to XSS attacks are more on the client end than the server end because of the peculiar nature of web application vulnerability and they also lack support for self-learning ability in order to detect new XSS attacks. Few researchers as cited in this paper inculcated the self-learning ability to detect and prevent XSS attacks in their design architecture using artificial neural networks and soft computing approach; a lot of improvement is still needed to effectively and efficiently handle the web application security menace as recommended.","PeriodicalId":92218,"journal":{"name":"International journal of advances in science, engineering and technology","volume":"13 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2018-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Cross Site Scripting Attacks in Web-Based Applications\",\"authors\":\"Aliga Paul Aliga, A. M. John-Otumu, Rebecca E Imhanhahimi, Atuegbelo Confidence Akpe\",\"doi\":\"10.37121/JASE.V1I2.19\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Web-based applications has turn out to be very prevalent due to the ubiquity of web browsers to deliver service oriented application on-demand to diverse client over the Internet and cross site scripting (XSS) attack is a foremost security risk that has continuously ravage the web applications over the years. This paper critically examines the concept of XSS and some recent approaches for detecting and preventing XSS attacks in terms of architectural framework, algorithm used, solution location, and so on. The techniques were analysed and results showed that most of the available recognition and avoidance solutions to XSS attacks are more on the client end than the server end because of the peculiar nature of web application vulnerability and they also lack support for self-learning ability in order to detect new XSS attacks. Few researchers as cited in this paper inculcated the self-learning ability to detect and prevent XSS attacks in their design architecture using artificial neural networks and soft computing approach; a lot of improvement is still needed to effectively and efficiently handle the web application security menace as recommended.\",\"PeriodicalId\":92218,\"journal\":{\"name\":\"International journal of advances in science, engineering and technology\",\"volume\":\"13 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-09-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International journal of advances in science, engineering and technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.37121/JASE.V1I2.19\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International journal of advances in science, engineering and technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.37121/JASE.V1I2.19","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

摘要

基于web的应用程序已经变得非常流行,因为web浏览器无处不在,可以通过Internet按需向不同的客户端交付面向服务的应用程序,而跨站点脚本攻击是多年来不断破坏web应用程序的首要安全风险。本文从体系结构框架、使用的算法、解决方案位置等方面详细分析了XSS的概念以及最近用于检测和预防XSS攻击的一些方法。分析结果表明,由于web应用程序漏洞的特殊性,现有的跨站攻击识别和避免方案大多集中在客户端而不是服务器端,并且缺乏自学习能力来检测新的跨站攻击。本文引用的少数研究人员在其设计架构中引入了使用人工神经网络和软计算方法检测和预防XSS攻击的自学习能力;要像建议的那样有效和高效地处理web应用程序的安全威胁,仍然需要大量的改进。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Cross Site Scripting Attacks in Web-Based Applications
Web-based applications has turn out to be very prevalent due to the ubiquity of web browsers to deliver service oriented application on-demand to diverse client over the Internet and cross site scripting (XSS) attack is a foremost security risk that has continuously ravage the web applications over the years. This paper critically examines the concept of XSS and some recent approaches for detecting and preventing XSS attacks in terms of architectural framework, algorithm used, solution location, and so on. The techniques were analysed and results showed that most of the available recognition and avoidance solutions to XSS attacks are more on the client end than the server end because of the peculiar nature of web application vulnerability and they also lack support for self-learning ability in order to detect new XSS attacks. Few researchers as cited in this paper inculcated the self-learning ability to detect and prevent XSS attacks in their design architecture using artificial neural networks and soft computing approach; a lot of improvement is still needed to effectively and efficiently handle the web application security menace as recommended.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Stability analysis of three-dimensional thick rectangular plate using direct variational energy method Leaching of Ibute-Nze kaolin iron-oxide impurity with oxalic acid process optimization of dissolution conditions using response surface methodology Design and simulation of an effective backup power supply for academic institutions in Nigeria: A case study of NDA postgraduate school Voltage profile improvement and losses minimization for Hayin Rigasa radial network Kaduna using distributed generation Development of a horizontal three bladed windmill with vortex tubes
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1