Detection of Reflected XSS Vulnerabilities Based on Paths-Attention Method
نویسندگان
چکیده
Cross-site scripting vulnerability (XSS) is one of the most frequently exploited and harmful vulnerabilities among web vulnerabilities. In recent years, many researchers have used different machine learning methods to detect network attacks, but these not achieved high accuracy recall rates cannot effectively combat XSS attacks. Designing a model that can achieve truly proactive defense against reflected has become top priority for maintaining user security at this stage. paper, we propose detection based on paths-attention method (PATS model). Firstly, converts data into an intermediate representation abstract syntax trees, then traverses tree generate multiple sets syntactic paths, them vector representations through word embedding matrices. The extracts semantic features using attention mechanisms improve training effectiveness by assigning appropriate weights paths as it learns with neural networks, which realizes transformation from passive active defense. Additionally, in dataset processing section, point out shortcomings current research datasets construct reliable composed 1000 malicious samples NIST 10,000 benign GitHub experimentation purposes. Experimental results show compared other models, rate 90.25% F1-score 81.62%, while reducing time half 30 h.
منابع مشابه
An Unsupervised Method for Detection of XSS Attack
Cross-site scripting (XSS) is a code injection attack that allows an attacker to execute malicious script in another user’s browser. Once the attacker gains control over the Website vulnerable to XSS attack, it can perform actions like cookie-stealing, malware-spreading, session-hijacking and malicious redirection. Malicious JavaScripts are the most conventional ways of performing XSS attacks. ...
متن کاملIslanding Detection Method of Distributed Generation Based on Wavenet
Due to the increasing need to distributed energy resources in power systems, their problems should be studied. One of the main problem of distributed energy resources is unplanned islanding. The unplanned islanding has some dangers to the power systems and the repairman which are works with the incorrect devices. In this paper, a passive local method is proposed. The proposed method is based on...
متن کاملstudy of hash functions based on chaotic maps
توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...
application of upfc based on svpwm for power quality improvement
در سالهای اخیر،اختلالات کیفیت توان مهمترین موضوع می باشد که محققان زیادی را برای پیدا کردن راه حلی برای حل آن علاقه مند ساخته است.امروزه کیفیت توان در سیستم قدرت برای مراکز صنعتی،تجاری وکاربردهای بیمارستانی مسئله مهمی می باشد.مشکل ولتاژمثل شرایط افت ولتاژواضافه جریان ناشی از اتصال کوتاه مدار یا وقوع خطا در سیستم بیشتر مورد توجه می باشد. برای مطالعه افت ولتاژ واضافه جریان،محققان زیادی کار کرده ...
15 صفحه اولPosition Detection Based on Intensities of Reflected Infrared Light
This thesis focus on development of methods for using infrared sensors for position detection. There exists various methods where optical sensors are used to give position estimates, many utilizing multiple cameras. The overall approach in this thesis is to base a position detection sensor system on inputs from an array of infrared emitters and receivers. The signals from the emitters are refle...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Applied sciences
سال: 2023
ISSN: ['2076-3417']
DOI: https://doi.org/10.3390/app13137895