Proceedings of the 2020 12th International Conference on Machine Learning and Computing 2020
DOI: 10.1145/3383972.3384027
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on XSS Attack Detection and Prevention in Web Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(8 citation statements)
references
References 1 publication
0
8
0
Order By: Relevance
“…During this type of attack, the attacker injects code that has been maliciously written onto the server in such a way that it cannot be removed. As shown in Figure 3, the scenario I used to illustrate a stored XSS attack [10] injected a script tag directly into the Document Object Model (DOM) and subsequently executed a malicious script using JavaScript hypothetically. However, while this is the most popular method of exploiting XSS, it is also the most common approach neutralized by advanced security professionals and security-conscious software developers [11].…”
Section: Stored Cross-site Scripting (Xss) Attackmentioning
confidence: 99%
“…During this type of attack, the attacker injects code that has been maliciously written onto the server in such a way that it cannot be removed. As shown in Figure 3, the scenario I used to illustrate a stored XSS attack [10] injected a script tag directly into the Document Object Model (DOM) and subsequently executed a malicious script using JavaScript hypothetically. However, while this is the most popular method of exploiting XSS, it is also the most common approach neutralized by advanced security professionals and security-conscious software developers [11].…”
Section: Stored Cross-site Scripting (Xss) Attackmentioning
confidence: 99%
“…Hence the attack cannot be detected by client-side approaches. Moreover, Stored XSS attacks can lead to more devastating damage because while Reflected XSS attacks often limit the scope of the attack to the attacker (i.e., the outcome of the attack is reflected by whoever injected the payload), Stored XSS attacks allow the payload injected by an attacker to be executed multiple times and even affecting on the unsuspicious user's browser context because of its nature the payload is persistently stored inside the application's database (Cui et al, 2020).…”
Section: Introductionmentioning
confidence: 99%
“…Cross-site Scripting (XSS) and cross-site request forgery (CSRF) are considered to be among the top severe risks to web security from the kinds of vulnerabilities demonstrated by web applications, as per OWASP Top Ten (Open Web Application Security Project) [1]. Many detection algorithms based on conventional techniques, have been provided in order to track down these web vulnerabilities and defend against these attacks [2]. Unfortunately, they are not sufficiently effective enough against a threat that can take any form and is evolving as time passes by.…”
Section: Introductionmentioning
confidence: 99%
“…Such web attacks are evolving and becoming more challenging to detect. Several ideas from different perspectives have been put forth that can be used to improve the performance of detecting these web vulnerabilities and preventing the attacks from happening [2]. Machine learning techniques have lately been used by researchers to defend against XSS and CSRF [3], [4], [5], and given the positive findings, it can be concluded that it is a promising research direction.…”
mentioning
confidence: 99%