Skip to main content
Top

2017 | OriginalPaper | Chapter

A Novel Approach to Detect XSS Attacks in Real Time Online Social Networking

Authors : K. G. Maheswari, R. Anita

Published in: Proceedings of 2nd International Conference on Intelligent Computing and Applications

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In a real time network scenario, online social networks (OSN) play a significant role in connecting and growing business and technology. This technology gathers much information and share secret data among network. This attitude gives the intruders to exploit the original information. This paper contributes for major widely spread and critical OSN vulnerability. XSS, popularly noted as a one-click attack or session riding attack which is the most common malicious attack that exploits the trust that a site has in a user’s browser. Proposed method is a XSS attack detection mechanism for the client side. It focuses on the matching of parameters and values present in a suspected request with a form’s input fields and values that are being displayed on a webpage. Next to address concerns of offensive content over Internet. The proposed method analyzes the social network features integrating with textual features improving the accuracy of automatic detection of XSS.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Van Royen, K., Poels, K., Daelemans, W., Vandebosch, H.: Automatic monitoring of cyberbullying on social networking sites: from technological feasibility to desirability. Telemat. Inform. (2014) Van Royen, K., Poels, K., Daelemans, W., Vandebosch, H.: Automatic monitoring of cyberbullying on social networking sites: from technological feasibility to desirability. Telemat. Inform. (2014)
2.
go back to reference Al Mazari, A.: Cyber-bullying taxonomies: definition, forms, consequences and mitigation strategies. In: IEEE International Conference on Computer Science and Information Technology (2013) Al Mazari, A.: Cyber-bullying taxonomies: definition, forms, consequences and mitigation strategies. In: IEEE International Conference on Computer Science and Information Technology (2013)
3.
go back to reference Rybnicek, M., Poisel, R., Tjoa, S.: Facebook watchdog: a research agenda for detecting online grooming and bullying activities. In: IEEE International Conference on Systems, Man, and Cybernetics (2013) Rybnicek, M., Poisel, R., Tjoa, S.: Facebook watchdog: a research agenda for detecting online grooming and bullying activities. In: IEEE International Conference on Systems, Man, and Cybernetics (2013)
4.
go back to reference Shar, L.K., Tan, H.B.K.: Predicting SQL injection and cross site scripting vulnerabilities through mining input sanitization patterns. Inf. Softw. Technol. 55(10), 1767–1780 (2013)CrossRef Shar, L.K., Tan, H.B.K.: Predicting SQL injection and cross site scripting vulnerabilities through mining input sanitization patterns. Inf. Softw. Technol. 55(10), 1767–1780 (2013)CrossRef
5.
go back to reference Kopecký, K.: Cyberbullying and other risks of internet communication focused on university students. In: Elsevier International Conference (2013) Kopecký, K.: Cyberbullying and other risks of internet communication focused on university students. In: Elsevier International Conference (2013)
6.
go back to reference Fonseca, J., Vieira, M., Madeira, H.: Evaluation of web security mechanisms using vulnerability and attack injection. IEEE Trans. Dependable Secure Comput. 11(5), 440–453 (2014) Fonseca, J., Vieira, M., Madeira, H.: Evaluation of web security mechanisms using vulnerability and attack injection. IEEE Trans. Dependable Secure Comput. 11(5), 440–453 (2014)
7.
go back to reference Atoum, J.O., Qaralleh, A.J.: A hybrid technique for SQL injection attacks detection and prevention. Int. J. Database Manag. Syst. (IJDMS) 6(1), 21–28 (2014) Atoum, J.O., Qaralleh, A.J.: A hybrid technique for SQL injection attacks detection and prevention. Int. J. Database Manag. Syst. (IJDMS) 6(1), 21–28 (2014)
8.
go back to reference Kumar, M., Indu, L.: Detection and prevention of SQL injection attack. Int. J. Comput. Sci. Inf. Technol. (IJCSIT) 5, 374–377 (2014) Kumar, M., Indu, L.: Detection and prevention of SQL injection attack. Int. J. Comput. Sci. Inf. Technol. (IJCSIT) 5, 374–377 (2014)
9.
go back to reference Lee, I., Jeong, S., Yeo, S., Moon, J.: A novel method for SQL injection attack detection based on removing SQL query attribute values. J. Math. Comput. Modell. 55(1–2), 56–68 (2011) Lee, I., Jeong, S., Yeo, S., Moon, J.: A novel method for SQL injection attack detection based on removing SQL query attribute values. J. Math. Comput. Modell. 55(1–2), 56–68 (2011)
10.
go back to reference Zhou, C.V., Leckie, C., Karunasekera, S.: A survey of coordinated attacks and collaborative intrusion detection. Comput. Secur. 29(1), 124–140 (2010) Zhou, C.V., Leckie, C., Karunasekera, S.: A survey of coordinated attacks and collaborative intrusion detection. Comput. Secur. 29(1), 124–140 (2010)
Metadata
Title
A Novel Approach to Detect XSS Attacks in Real Time Online Social Networking
Authors
K. G. Maheswari
R. Anita
Copyright Year
2017
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-1645-5_30

Premium Partner