Implementation of PSO Algorithm for Detection and Removal of XSS Attack

Author:

Bhanwar Lal 1,Irfan Khan 2

Affiliation:

1. Research (MTech) Scholar (CSE), Shekhawati Institute of Engineering and Technology, Sikar, Rajasthan, India

2. Assistant Professor (CSE), 1Shekhawati Institute of Engineering and Technology, Sikar, Rajasthan, India

Abstract

In recent years, managing the security over the web has gained its importance. Use of appropriate security handling techniques help to solve controversies and to extract interesting scenarios based on the content of the web page. Many varieties of vulnerabilities prevail and Cross-Site Scripting (XSS) vulnerability is ranked among the top ten risks found over the web which is a mandatory issue that requires a solution. XSS vulnerability injects malicious code in many ways that rise during the browsing session. Analysis should be made over the web page to identify whether the page is vulnerable or not. A dataset is formulated that contains malicious and benign data. Malicious data are obtained from the XSS archive [source: www.xssed.com] which contains the vulnerable XSS web pages and benign data are the web pages that are obtained through queries from the Google search engine. The major constraint is the number of Lines of Code (LOC) present in the web page. Five samples from the dataset were considered and algorithms are applied. About 24 attributes are used by the classifier. The samples vary in terms of content and size. Different optimization techniques are applied and the results are analyzed. Evaluation measures like Detection Rate (DR), False Detection Rate (FDR) and F Score (FS) are calculated based on the Confusion Matrix. The final content obtained after the „XSS Handler phase? that is to be displayed on the browser is tested using black box testing technique and also using XSS and SQL Injection Scanner tool. The tool is capable of identifying promising XSS code available in web pages. Based on the experiments, it was observed that the generation of paths using PPACO achieves better results in terms of DR, FDR and FS than other algorithms.

Publisher

Technoscience Academy

Subject

General Medicine

Reference30 articles.

1. Adi, E 2012, „A design of a proxy inspired from human immune system to detect SQL injection and cross-site scripting‟, Procedia Engineering, vol. 50, pp. 19–28.

2. Adi, E & Salomo, I 2010, „Detect and sanitise encoded cross-site scripting and SQL injection attack strings using a hash map‟, Australian Information Security Management Conference.

3. Ahmed, AA & Ali, F 2016, „Multiple-path testing for cross site scripting using genetic algorithms‟, Journal of Systems Architecture, vol. 64, pp.50-62.

4. Alfaro, JG & Arribas, GN 2007, „Prevention of Cross-Site Scripting Attacks on Current Web Applications‟, OTM confederated International Conference On the Move to Meaningful Internet Systems, pp. 1770-1784.

5. Anupam, V& Mayer, A, 1998,‟Secure Web Scripting‟, IEEE Journal of Internet Computing, vol. 2, no. 6, pp. 46-55.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3