مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

video

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

sound

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Version

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View:

91
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Download:

205
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Cites:

Information Journal Paper

Title

Cross Site Scripting Attack Review

Pages

  21-30

Abstract

 In the present time, web applications are growing constantly in the whole society with the development of communication technology. Since the utilization of WWW (World Wide Web) expanded and increased since it provides many services, such as sharing data, staying connected, and other services. As a consequence, these numerous numbers of web application users are susceptible to cybersecurity breaches to steal sensitive information or crash the users' systems, etc. Particularly, the most common vulnerability today in web applications is the Cross-Site Scripting (XSS) attack. Furthermore, online cyber attacks utilizing Cross-Site Scripting were responsible for 40% of the attack instances that struck enterprises in North America and Europe in 2019. Therefore, Cross-Site Scripting is a form of an injection that targets both vulnerable and non-vulnerable websites, for the injection of malicious scripts. Cross-Site Scripting XSS operates by directing users to a vulnerable website that contains malicious JavaScript. Then, when malicious code runs in a victim's browser, the attacker has complete control over how they interact with the application. To protect the website or prevent the XSS, must know the application complexity and the way it handles data must be known so it could be controlled by the user. However, Detecting XSS e ectively is still a work in progress, and XSS is considered a gateway for various attacks. However, in this paper, we will introduce the XSS attack and the forms of XSS as a review paper. In addition, the methods and techniques that help to detect Cross-Site Scripting (XSS) attacks.

Cites

  • No record.
  • References

  • No record.
  • Cite

    APA: Copy

    Alotaibi, Afnan, Alghufaili, Lujain, & Ibrahim, Dina M.. (2021). Cross Site Scripting Attack Review. THE ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 13(3), 21-30. SID. https://sid.ir/paper/978261/en

    Vancouver: Copy

    Alotaibi Afnan, Alghufaili Lujain, Ibrahim Dina M.. Cross Site Scripting Attack Review. THE ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY[Internet]. 2021;13(3):21-30. Available from: https://sid.ir/paper/978261/en

    IEEE: Copy

    Afnan Alotaibi, Lujain Alghufaili, and Dina M. Ibrahim, “Cross Site Scripting Attack Review,” THE ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, vol. 13, no. 3, pp. 21–30, 2021, [Online]. Available: https://sid.ir/paper/978261/en

    Related Journal Papers

  • No record.
  • Related Seminar Papers

  • No record.
  • Related Plans

  • No record.
  • Recommended Workshops






    Move to top
    telegram sharing button
    whatsapp sharing button
    linkedin sharing button
    twitter sharing button
    email sharing button
    email sharing button
    email sharing button
    sharethis sharing button