2021
DOI: 10.11591/eei.v10i5.3168
|View full text |Cite
|
Sign up to set email alerts
|

An implementation of real-time detection of cross-site scripting attacks on cloud-based web applications using deep learning

Abstract: Cross-site scripting has caused considerable harm to the economy and individual privacy. Deep learning consists of three primary learning approaches, and it is made up of numerous strata of artificial neural networks. Triggering functions that can be used for the production of non-linear outputs are contained within each layer. This study proposes a secure framework that can be used to achieve real-time detection and prevention of cross-site scripting attacks in cloud-based web applications, using deep learnin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 27 publications
0
4
0
Order By: Relevance
“…Researchers [170] and [171] use MLP in their methods. Research [170] detects XSS using a robust ANN-based MLP scheme, using a large real-world dataset.…”
Section: •Detection Timementioning
confidence: 99%
See 1 more Smart Citation
“…Researchers [170] and [171] use MLP in their methods. Research [170] detects XSS using a robust ANN-based MLP scheme, using a large real-world dataset.…”
Section: •Detection Timementioning
confidence: 99%
“…They achieve high accuracy, detection rate and AUC-ROC while maintaining low FP rate. Whereas, research [171] use MLP DL model in five phases namely extraction, feature engineering, datasets generation, then DL modeling, and classification filtering. Their experiment shows high accuracy of 99.47%.…”
Section: •Detection Timementioning
confidence: 99%
“…Ayo et al [67] made a safe framework recommendation that can be utilized to accurately and quickly identify and mitigate cross-site scripting threats in cloud-based web applications. Alabdel and Prarthana presented a technique that uses a friendly jammer and a max min optimization model to optimize the secrecy rate.…”
Section: Figure 2 Overview Of Grey Hole Attack [19]mentioning
confidence: 99%
“…Ivanova and Rozeva [15] proposed an ML technique for detecting stored XSS attacks and defending a representational state transfer (REST) web service written in JAVA, which was evaluated in a specifically designed test-bed simulation environment that included the IntelliJ IDEA environment, Postman, and a web browser. A secure framework that may be used to accomplish real-time detection and mitigation of XSS attacks in cloud-based web applications via deep learning (DL) at a high level of accuracy was presented in [16]. A solution integrating three techniques to determine the most difficult attacking challenges is revealed in [17] by implementing Random Forest (RF), k-Nearest Neighbors (k-NN), logistic regression (LR), support vector machine (SVM) algorithms, content security policy (CSP) approach, web application firewall (WAF), intrusion detection and prevention system (IDS and IPS).…”
Section: Relevant Research Workmentioning
confidence: 99%