XSS Attack Detection Based on Multisource Semantic Feature Fusion.
Gespeichert in:
| Titel: | XSS Attack Detection Based on Multisource Semantic Feature Fusion. |
|---|---|
| Autoren: | Hu, Ze, Zhang, Jianwei, Yang, Hongyu |
| Quelle: | Electronics (2079-9292); Mar2025, Vol. 14 Issue 6, p1174, 26p |
| Schlagwörter: | LONG short-term memory |
| Abstract: | Cross-site scripting (XSS) attacks can be implemented through various attack vectors, and the diversity of these vectors significantly increases the overhead required for detection systems. The existing XSS detection methods face issues such as insufficient feature extraction capabilities for XSS attacks, inadequate multisource feature fusion processes, and high resource consumption levels for their detection models. To address these problems, we propose a novel XSS detection approach based on multisource semantic feature fusion. First, we design a normalized tokenization rule based on the structural features of XSS code and use a word embedding model to generate the original feature vectors of XSS. Second, we propose a local semantic feature extraction network based on depthwise separable convolution (DSC) that extracts XSS text and syntactic features using convolution kernels with different sizes. Then, we use a bidirectional long short-term memory (Bi-LSTM) network to extract the global semantic features of XSS. Finally, we introduce a multihead attention fusion network that employs a saliency score and a dynamic weight adjustment mechanism to identify the key parts of the input sequence and dynamically adjust the weight of each head. This enables the deep fusion of local and global XSS semantic features. Experimental results demonstrate that the proposed approach achieves an F1 score of 99.92%, outperforming the existing detection methods. [ABSTRACT FROM AUTHOR] |
| Copyright of Electronics (2079-9292) is the property of MDPI and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.) | |
| Datenbank: | Complementary Index |
Schreiben Sie den ersten Kommentar!
Full Text Finder
Nájsť tento článok vo Web of Science