4.6 Review

Detection of cross-site scripting (XSS) attacks using machine learning techniques: a review

Related references

Note: Only part of the references are listed.
Article Computer Science, Artificial Intelligence

Artificial intelligence in cyber security: research advances, challenges, and opportunities

Zhimin Zhang et al.

Summary: This paper reviews the applications of artificial intelligence in cybersecurity, such as user access authentication, network situation awareness, dangerous behavior monitoring, and abnormal traffic identification. It also proposes a conceptual human-in-the-loop intelligence cybersecurity model based on identified limitations and challenges.

ARTIFICIAL INTELLIGENCE REVIEW (2022)

Article Computer Science, Information Systems

Machine learning approach to vulnerability detection in OAuth 2.0 authentication and authorization flow

Kindson Munonye et al.

Summary: This study applied machine learning to detect potential vulnerabilities in OAuth authentication and authorization flow by analyzing the relationship between changes in OAuth parameters and the final output. The OAuth protocol was modeled as a supervised learning problem, with seven classification models developed and tuned. Performance accuracy above 90% was achieved for vulnerability detection in the OAuth flow, with a 54% match when compared to known vulnerabilities.

INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2022)

Article Computer Science, Information Systems

MNN-XSS: Modular Neural Network Based Approach for XSS Attack Detection

Ahmed Abdullah Alqarni et al.

Summary: The rapid growth and uptake of network-based communication technologies have made cybersecurity a significant challenge as the number of cyber-attacks is also increasing. Researchers have used machine learning methods to detect network attacks without relying on known attack signatures. However, these methods often have a high false-positive rate. In this study, a new method is proposed and implemented using a modular deep neural network to reduce the false positive rate in XSS attack detection.

CMC-COMPUTERS MATERIALS & CONTINUA (2022)

Review Computer Science, Information Systems

Research communities in cyber security: A comprehensive literature review

Sotirios Katsikeas et al.

Summary: By mining the Scopus academic database and applying a community detection algorithm, researchers identified twelve top-level communities and 80 sub-communities in cybersecurity research. The study shows a greater emphasis on cryptography, quantum cryptography, information hiding, and biometrics among researchers.

COMPUTER SCIENCE REVIEW (2021)

Review Computer Science, Information Systems

A survey on semi-structured web data manipulations by non-expert users

Gilbert Tekli

Summary: This paper examines the manipulation of semi-structured web data, especially XML data, from the perspective of non-experts. It found that web data manipulation techniques have shifted from professionals to public computer users, and categorized these techniques into three major groups, including XML-oriented visual languages, Mashups, and Dataflow visual programming languages.

COMPUTER SCIENCE REVIEW (2021)

Review Computer Science, Information Systems

Vulnerability retrospection of security solutions for software-defined Cyber-Physical System against DDoS and IoT-DDoS attacks

Manish Snehi et al.

Summary: The widespread adoption of IoT, Software-defined Networks, and Cloud Computing has facilitated the development of Cyber-Physical Systems. Despite offering solutions to DDoS attacks, Software-defined Cyber-Physical Systems still face vulnerabilities and security risks. Integrating Fog Computing as an architectural layer can enhance the security of the system.

COMPUTER SCIENCE REVIEW (2021)

Article Automation & Control Systems

A Novel Web Attack Detection System for Internet of Things via Ensemble Classification

Chaochao Luo et al.

Summary: The IoT technology has been widely applied in various fields, but the diversity of devices makes networks more vulnerable to web attacks. Researchers proposed a deep learning-based web attack detection system that can accurately detect web attacks with low false positive and negative rates.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)

Proceedings Paper Computer Science, Artificial Intelligence

Towards a Lightweight, Hybrid Approach for Detecting DOM XSS Vulnerabilities with Machine Learning

William Melicher et al.

Summary: Client-side cross-site scripting vulnerabilities in web applications are common but difficult to prevent. Machine learning classifiers may help in detecting these vulnerabilities.

PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE 2021 (WWW 2021) (2021)

Article Computer Science, Theory & Methods

Intrusion detection systems using long short-term memory (LSTM)

FatimaEzzahra Laghrissi et al.

Summary: An Intrusion Detection System (IDS) is a device or software application that monitors networks for malicious activities, with deep learning algorithms proving effective in improving detection efficiency. In this study, PCA and Mutual information were utilized as dimensionality reduction and feature selection techniques for a deep learning attack detection model based on Long Short-Term Memory (LSTM). The experimental results on the KDD99 benchmark dataset demonstrated that PCA-based models achieved the highest accuracy in both training and testing for binary and multiclass classification.

JOURNAL OF BIG DATA (2021)

Article Computer Science, Information Systems

A Term Weighted Neural Language Model and Stacked Bidirectional LSTM Based Framework for Sarcasm Identification

Aytug Onan et al.

Summary: This research aims to present an effective sarcasm identification framework on social media data by utilizing neural language models and deep neural networks. The model includes a three-layer stacked bidirectional long short-term memory architecture and introduces an inverse gravity moment based term weighted word embedding model to preserve word-ordering information. The presented model achieves promising results with a classification accuracy of 95.30% for the sarcasm identification task.

IEEE ACCESS (2021)

Article Automation & Control Systems

A Distributed Deep Learning System for Web Attack Detection on Edge Devices

Zhihong Tian et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Proceedings Paper Computer Science, Interdisciplinary Applications

The Detecting Cross-Site Scripting (XSS) Using Machine Learning Methods

Stanislav Kascheev et al.

2020 GLOBAL SMART INDUSTRY CONFERENCE (GLOSIC) (2020)

Article Computer Science, Hardware & Architecture

Deep Learning Based Multi-Channel Intelligent Attack Detection for Data Security

Feng Jiang et al.

IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING (2020)

Article Computer Science, Software Engineering

Consensus Clustering-Based Undersampling Approach to Imbalanced Learning

Aytug Onan

SCIENTIFIC PROGRAMMING (2019)

Article Mathematical & Computational Biology

A Comparison of Shallow and Deep Learning Methods for Predicting Cognitive Performance of Stroke Patients From MRI Lesion Images

Sucheta Chauhan et al.

FRONTIERS IN NEUROINFORMATICS (2019)

Article Computer Science, Information Systems

CODDLE: Code-Injection Detection With Deep Learning

Stanislav Abaimov et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

RLXSS: Optimizing XSS Detection Model to Defend Against Adversarial Attacks Based on Reinforcement Learning

Yong Fang et al.

FUTURE INTERNET (2019)

Article Computer Science, Information Systems

MLPXSS: An Integrated XSS-Based Attack Detection Scheme in Web Applications Using Multilayer Perceptron Technique

Fawaz Mahiuob Mohammed Mokbal et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

An ensemble scheme based on language function analysis and feature engineering for text genre classification

Aytug Onan

JOURNAL OF INFORMATION SCIENCE (2018)

Article Computer Science, Artificial Intelligence

Detecting Android malware using Long Short-term Memory (LSTM)

R. Vinayakumar et al.

JOURNAL OF INTELLIGENT & FUZZY SYSTEMS (2018)

Article Computer Science, Software Engineering

New deep learning method to detect code injection attacks on hybrid applications

Ruibo Yan et al.

JOURNAL OF SYSTEMS AND SOFTWARE (2018)

Article Mathematical & Computational Biology

Biomedical Text Categorization Based on Ensemble Pruning and Optimized Topic Modelling

Aytug Onan

COMPUTATIONAL AND MATHEMATICAL METHODS IN MEDICINE (2018)

Review Computer Science, Information Systems

Cyber security meets artificial intelligence: a survey

Jian-hua Li

FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING (2018)

Proceedings Paper Computer Science, Artificial Intelligence

Detecting Blind Cross-Site Scripting Attacks Using Machine Learning

Gurpreet Kaur et al.

2018 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND MACHINE LEARNING (SPML 2018) (2018)

Proceedings Paper Computer Science, Artificial Intelligence

DeepXSS: Cross Site Scripting Detection Based on Deep Learning

Yong Fang et al.

PROCEEDINGS OF 2018 INTERNATIONAL CONFERENCE ON COMPUTING AND ARTIFICIAL INTELLIGENCE (ICCAI 2018) (2018)

Article Computer Science, Information Systems

A feature selection model based on genetic rank aggregation for text sentiment classification

Aytug Onan et al.

JOURNAL OF INFORMATION SCIENCE (2017)

Article Computer Science, Information Systems

Defending Malicious Script Attacks Using Machine Learning Classifiers

Nayeem Khan et al.

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2017)

Article Computer Science, Information Systems

XSSClassifier: An Efficient XSS Attack Detection Approach Based on Machine Learning Classifier on SNSs

Shailendra Rathore et al.

JOURNAL OF INFORMATION PROCESSING SYSTEMS (2017)

Proceedings Paper Computer Science, Theory & Methods

Intrusion Detection using Deep Belief Network and Probabilistic Neural Network

Guangzhen Zhao et al.

2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1 (2017)

Article Computer Science, Theory & Methods

Software Vulnerability Analysis and Discovery Using Machine-Learning and Data-Mining Techniques: A Survey

Seyed Mohammad Ghaffarian et al.

ACM COMPUTING SURVEYS (2017)

Article Computer Science, Theory & Methods

Searching the Web of Things: State of the Art, Challenges, and Solutions

Nguyen Khoi Tran et al.

ACM COMPUTING SURVEYS (2017)

Proceedings Paper Engineering, Electrical & Electronic

Identification and Evaluation of Discriminative Lexical Features of Malware URL for Real-Time Classification

Morufu Olalere et al.

PROCEEDINGS OF 6TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION ENGINEERING (ICCCE 2016) (2016)

Article Computer Science, Information Systems

From information security to cyber security

Rossouw von Solms et al.

COMPUTERS & SECURITY (2013)