Skip to main content
Erschienen in: Artificial Intelligence Review 11/2023

23.03.2023

Detection of cross-site scripting (XSS) attacks using machine learning techniques: a review

verfasst von: Jasleen Kaur, Urvashi Garg, Gourav Bathla

Erschienen in: Artificial Intelligence Review | Ausgabe 11/2023

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the rising demand for E-commerce, Social Networking websites, it has become essential to develop security protocols over the World Wide Web that can provide security and privacy to Internet users all over the globe. Several traditional encryption techniques and attack detection protocols can secure the data transmitted over public networks. However, hackers can effortlessly exploit them to acquire access to the users’ sensitive information such as user ID, session ID, cookies, passwords, bank account details, contact numbers, private PINs, database information, etc. Researchers have continuously innovated new techniques to build a secure and robust system that cannot be easily hacked and manipulated. Still, there is much scope for novelty to provide security against contemporary techniques used by intruders. The motivation of this survey is to observe the recent developments in Cross-Site Scripting attacks and techniques used by researchers to secure confidential information. Cross-Site Scripting (XSS) has been recognized as one of the top 10 online application security risks by the Open Web Application Security Project (OWASP) for decades. Therefore, dealing with this security flaw in web applications has become essential to avoid further personal and financial damage to Internet users and business organizations. There is a need for an extensive survey of recent XSS attack detection techniques that can provide the right direction to researchers and security professionals. We present a complete overview of recent machine learning and neural network-based XSS attack detection techniques in this paper, covering deep neural networks, decision trees, web-log-based detection models, and many more. This paper also highlights the research gaps that must be addressed while designing attack detection models. Further, challenges researchers face during the development of recent techniques are also discussed. Finally, future directions are provided to reflect on new concepts that can be used in forthcoming research works to improve XSS attack detection techniques.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Alam F, Pachauri S (2017) Comparative study of J48, naive bayes and one-R classification technique for credit card fraud detection using WEKA. Adv Comput Sci Technol 10(6):1731–1743 Alam F, Pachauri S (2017) Comparative study of J48, naive bayes and one-R classification technique for credit card fraud detection using WEKA. Adv Comput Sci Technol 10(6):1731–1743
Zurück zum Zitat Guo Y, Pan Y, Zhang Z, Li L, Jamshed MA, Moon Y, Kim D, Han D, Park K, Jamshed M A, Berger DS, Sitaraman RK, Harchol-Balter M, Pfaff B, Pettit J, Koponen T, Jackson E, Zhou A, Rajahalme J, … Security I. T (2017) Same-origin policy: Evaluation in modern browsers. In Proceedings of the Same-Origin Policy: Evaluation in Modern Browsers. Nsdi, 40(4): 97–112 Guo Y, Pan Y, Zhang Z, Li L, Jamshed MA, Moon Y, Kim D, Han D, Park K, Jamshed M A, Berger DS, Sitaraman RK, Harchol-Balter M, Pfaff B, Pettit J, Koponen T, Jackson E, Zhou A, Rajahalme J, … Security I. T (2017) Same-origin policy: Evaluation in modern browsers. In Proceedings of the Same-Origin Policy: Evaluation in Modern Browsers. Nsdi, 40(4): 97–112
Zurück zum Zitat Heiderich, M., Schwenk, J., Frosch, T., Magazinius, J., & Yang, E. Z. (2013). mXSS attacks: Attacking well-secured web-applications by using innerHTML mutations. Proceedings of the ACM Conference on Computer and Communications Security, 777–788. https://doi.org/10.1145/2508859.2516723 Heiderich, M., Schwenk, J., Frosch, T., Magazinius, J., & Yang, E. Z. (2013). mXSS attacks: Attacking well-secured web-applications by using innerHTML mutations. Proceedings of the ACM Conference on Computer and Communications Security, 777–788. https://​doi.​org/​10.​1145/​2508859.​2516723
Zurück zum Zitat Kaur, J., & Garg, U. (2022). State-of-the-Art Survey on Web Vulnerabilities, Threat Vectors, and Countermeasures. In: Dr. R. Aggarwal, Dr. J. He, Dr. E. Shubhakar Pilli, & Dr. S. Kumar (Eds) Cyber Security in Intelligent Computing and Communications. Springer, Singapore. (pp. 3–17). Kaur, J., & Garg, U. (2022). State-of-the-Art Survey on Web Vulnerabilities, Threat Vectors, and Countermeasures. In: Dr. R. Aggarwal, Dr. J. He, Dr. E. Shubhakar Pilli, & Dr. S. Kumar (Eds) Cyber Security in Intelligent Computing and Communications. Springer, Singapore. (pp. 3–17).
Zurück zum Zitat Matt, F. (2021). Application Model & Same-Origin Policy. In Lecture Notes on Web Security: Application Model & Same-Origin Policy. Matt, F. (2021). Application Model & Same-Origin Policy. In Lecture Notes on Web Security: Application Model & Same-Origin Policy.
Zurück zum Zitat Melicher, W., Fung, C., Bauer, L., & Jia, L. (2021). Towards a lightweight, hybrid approach for detecting DOM XSS vulnerabilities with machine learning. The Web Conference 2021—Proceedings of the World Wide Web Conference, WWW 2021, 2684–2695. https://doi.org/10.1145/3442381.3450062 Melicher, W., Fung, C., Bauer, L., & Jia, L. (2021). Towards a lightweight, hybrid approach for detecting DOM XSS vulnerabilities with machine learning. The Web Conference 2021—Proceedings of the World Wide Web Conference, WWW 2021, 2684–2695. https://​doi.​org/​10.​1145/​3442381.​3450062
Zurück zum Zitat Olalere, M., Abdullah, M. T., Mahmod, R., & Abdullah, A. (2016). Identification and Evaluation of Discriminative Lexical Features of Malware URL for Real-Time Classification. 2016 International Conference on Computer and Communication Engineering (ICCCE). https://doi.org/10.1109/ICCCE.2016.31 Olalere, M., Abdullah, M. T., Mahmod, R., & Abdullah, A. (2016). Identification and Evaluation of Discriminative Lexical Features of Malware URL for Real-Time Classification. 2016 International Conference on Computer and Communication Engineering (ICCCE). https://​doi.​org/​10.​1109/​ICCCE.​2016.​31
Zurück zum Zitat Machine Learning based Intrusion Detection System for Web-Based Attacks, Proceedings - 2020 IEEE 6th Intl Conference on Big Data Security on Cloud, BigDataSecurity 2020, 2020 IEEE Intl Conference on High Performance and Smart Computing, HPSC 2020 and 2020 IEEE Intl Conference on Intelligent Data and Security, IDS 2020 227 (2020). Machine Learning based Intrusion Detection System for Web-Based Attacks, Proceedings - 2020 IEEE 6th Intl Conference on Big Data Security on Cloud, BigDataSecurity 2020, 2020 IEEE Intl Conference on High Performance and Smart Computing, HPSC 2020 and 2020 IEEE Intl Conference on Intelligent Data and Security, IDS 2020 227 (2020).
Zurück zum Zitat Syarif, A. R., & Gata, W. (2018). Intrusion detection system using hybrid binary PSO and K-nearest neighborhood algorithm. Proceedings of the 11th International Conference on Information and Communication Technology and System, ICTS 2017, 2018-January, 181–186. https://doi.org/10.1109/ICTS.2017.8265667 Syarif, A. R., & Gata, W. (2018). Intrusion detection system using hybrid binary PSO and K-nearest neighborhood algorithm. Proceedings of the 11th International Conference on Information and Communication Technology and System, ICTS 2017, 2018-January, 181–186. https://​doi.​org/​10.​1109/​ICTS.​2017.​8265667
Zurück zum Zitat Vuong, T. P., Loukas, G., Gan, D., & Bezemskij, A. (2015). Decision tree-based detection of denial of service and command injection attacks on robotic vehicles. 2015 IEEE International Workshop on Information Forensics and Security, WIFS 2015 - Proceedings. https://doi.org/10.1109/WIFS.2015.7368559 Vuong, T. P., Loukas, G., Gan, D., & Bezemskij, A. (2015). Decision tree-based detection of denial of service and command injection attacks on robotic vehicles. 2015 IEEE International Workshop on Information Forensics and Security, WIFS 2015 - Proceedings. https://​doi.​org/​10.​1109/​WIFS.​2015.​7368559
Zurück zum Zitat Wang, R., Jia, X., Li, Q., & Zhang, S. (2014). Machine Learning Based Cross-Site Scripting Detection in Online Social Network. 2014 IEEE Intl Conf on High Performance Computing and Communications, 2014 IEEE 6th Intl Symp on Cyberspace Safety and Security, 2014 IEEE 11th Intl Conf on Embedded Software and Syst (HPCC,CSS,ICESS), 823–826. https://doi.org/10.1109/HPCC.2014.137 Wang, R., Jia, X., Li, Q., & Zhang, S. (2014). Machine Learning Based Cross-Site Scripting Detection in Online Social Network. 2014 IEEE Intl Conf on High Performance Computing and Communications, 2014 IEEE 6th Intl Symp on Cyberspace Safety and Security, 2014 IEEE 11th Intl Conf on Embedded Software and Syst (HPCC,CSS,ICESS), 823–826. https://​doi.​org/​10.​1109/​HPCC.​2014.​137
Zurück zum Zitat Zhao, G., Zhang, C., & Zheng, L. (2017, July). Intrusion Detection Using Deep Belief Network and Probabilistic Neural Network. 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC). https://doi.org/10.1109/CSE-EUC.2017.119 Zhao, G., Zhang, C., & Zheng, L. (2017, July). Intrusion Detection Using Deep Belief Network and Probabilistic Neural Network. 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC). https://​doi.​org/​10.​1109/​CSE-EUC.​2017.​119
Metadaten
Titel
Detection of cross-site scripting (XSS) attacks using machine learning techniques: a review
verfasst von
Jasleen Kaur
Urvashi Garg
Gourav Bathla
Publikationsdatum
23.03.2023
Verlag
Springer Netherlands
Erschienen in
Artificial Intelligence Review / Ausgabe 11/2023
Print ISSN: 0269-2821
Elektronische ISSN: 1573-7462
DOI
https://doi.org/10.1007/s10462-023-10433-3

Weitere Artikel der Ausgabe 11/2023

Artificial Intelligence Review 11/2023 Zur Ausgabe

Premium Partner