MLPXSS: An Integrated XSS-Based Attack Detection Scheme in Web Applications Using Multilayer Perceptron Technique
暂无分享,去创建一个
Faheem Akhtar | Azhar Imran | Wang Xiaoxi | Wang Dan | Fawaz Mahiuob Mohammed Mokbal | Lin Jiuchuan | F. Akhtar | Xiaoxi Wang | F. Mokbal | A. Imran | Wang Dan | Wang Xiaoxi | Jiuchuan Lin | Lin Jiuchuan
[1] Jugal K. Kalita,et al. A survey of detection methods for XSS attacks , 2018, J. Netw. Comput. Appl..
[2] W. Marsden. I and J , 2012 .
[3] Monica S. Lam,et al. Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking , 2008, USENIX Security Symposium.
[4] Eunjin Jung,et al. Obfuscated malicious javascript detection using classification techniques , 2009, 2009 4th International Conference on Malicious and Unwanted Software (MALWARE).
[5] Jack W. Stokes,et al. Neural Classification of Malicious Scripts: A study with JavaScript and VBScript , 2018, ArXiv.
[6] Jong Hyuk Park,et al. XSSClassifier: An Efficient XSS Attack Detection Approach Based on Machine Learning Classifier on SNSs , 2017, J. Inf. Process. Syst..
[7] Rui Wang,et al. Machine Learning Based Cross-Site Scripting Detection in Online Social Network , 2014, 2014 IEEE Intl Conf on High Performance Computing and Communications, 2014 IEEE 6th Intl Symp on Cyberspace Safety and Security, 2014 IEEE 11th Intl Conf on Embedded Software and Syst (HPCC,CSS,ICESS).
[8] Brij Bhooshan Gupta,et al. PHP-sensor: a prototype method to discover workflow violation and XSS vulnerabilities in PHP web applications , 2015, Conf. Computing Frontiers.
[9] Borgersen Gustav,et al. Supervised learning in artificial neural networks , 2008 .
[10] Ansar Abbas,et al. Systematic Review of Web Application Security Vulnerabilities Detection Methods , 2015 .
[11] Brij Bhooshan Gupta,et al. Enhancing the Browser-Side Context-Aware Sanitization of Suspicious HTML5 Code for Halting the DOM-Based XSS Vulnerabilities in Cloud , 2017, Int. J. Cloud Appl. Comput..
[12] Brij Bhooshan Gupta,et al. Cross-Site Scripting (XSS) attacks and defense mechanisms: classification and state-of-the-art , 2017, Int. J. Syst. Assur. Eng. Manag..
[13] Peter Norvig,et al. Artificial Intelligence: A Modern Approach , 1995 .
[14] Yang Li,et al. DeepXSS: Cross Site Scripting Detection Based on Deep Learning , 2018, ICCAI.
[15] Ganesh Chandra Deka,et al. Handbook of Research on Securing Cloud-Based Databases with Biometric Applications , 2014 .
[16] Jerry Murphree,et al. Machine learning anomaly detection in large systems , 2016, 2016 IEEE AUTOTESTCON.
[17] P. Santhi Thilagam,et al. Securing web applications from injection and logic vulnerabilities: Approaches and challenges , 2016, Inf. Softw. Technol..
[18] Haoxiang Wang,et al. Computer and Cyber Security , 2018 .
[19] Naveen K. Chilamkurti,et al. Deep Learning: The Frontier for Distributed Attack Detection in Fog-to-Things Computing , 2018, IEEE Communications Magazine.
[20] Berndt Müller,et al. Neural networks: an introduction , 1990 .
[21] Sancheng Peng,et al. New deep learning method to detect code injection attacks on hybrid applications , 2018, J. Syst. Softw..
[22] Eduardo Feitosa,et al. Automatic classification of cross-site scripting in web pages using document-based and URL-based features , 2012, 2012 IEEE Symposium on Computers and Communications (ISCC).
[23] Sebastian Lekies,et al. Code-Reuse Attacks for the Web: Breaking Cross-Site Scripting Mitigations via Script Gadgets , 2017, CCS.
[24] Bill Chu,et al. Detecting Cross-Site Scripting Vulnerabilities through Automated Unit Testing , 2017, 2017 IEEE International Conference on Software Quality, Reliability and Security (QRS).
[25] Jeff Heaton,et al. Introduction to neural networks for C , 2008 .
[26] Hassan B. Kazemian,et al. Comparisons of machine learning techniques for detecting malicious webpages , 2015, Expert Syst. Appl..
[27] Yao Wang,et al. A deep learning approach for detecting malicious JavaScript code , 2016, Secur. Commun. Networks.
[28] Sahalu B. Junaidu,et al. Detecting Cross-Site Scripting in Web Applications Using Fuzzy Inference System , 2018, J. Comput. Networks Commun..
[29] Dharma P. Agrawal,et al. Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security , 2016 .
[30] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.