Cross-Site Scripting Attack Detection using Rule-Based Signature
Abstract
Full Text:
PDFReferences
S. Gupta and L. Sharma, “Exploitation of Cross-Site Scripting ( XSS ) Vulnerability on Real World Web Applications and its Defense,” nternational J. Comput. Appl. (0975 – 8887), vol. 60, no. 14, pp. 28–33, 2012.
K. K. Mookhey and N. Burghate, “Detection of SQL Injection and Cross-site Scripting Attacks,” Symantec, pp. 3–7, 2010.
N. Sagita, N. D. Cahyani, and F. A. Yulianto, “Perbandingan Performansi Antara Signature Based dan Anomaly Based Dalam Pendeteksian Intrusi,” 2011.
C. Obimbo, K. Ali, and K. Mohamed, “Using IDS to prevent XSS Attacks,” Int’l Conf. Secur. Manag., pp. 233–239, 2017.
C. M. Frenz and J. P. Yoon, “XSSmon: A Perl based IDS for the detection of potential XSS attacks,” 2012 IEEE Long Isl. Syst. Appl. Technol. Conf. LISAT 2012, pp. 0–3, 2012.
M. R. Zalbina, T. W. Septian, D. Stiawan, M. Y. Idris, A. Heryanto, and R. Budiarto, “Payload recognition and detection of Cross Site Scripting attack,” 2017 2nd Int. Conf. Anti-Cyber Crimes, ICACC 2017, pp. 172–176, 2017.
Refbacks
- There are currently no refbacks.