Adaptive cross-site scripting attack detection framework for smart devices security using intelligent filters and attack ontology

Smart devices are equipped with technology that facilitates communication among devices connected via the Internet. These devices are shipped with a user interface that enables users to perform administrative activities using a web browser linked to the device’s server. Cross-site scripting (XSS) is...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:Soft computing (Berlin, Germany) Ročník 27; číslo 8; s. 4593 - 4608
Hlavní autoři: Chaudhary, Pooja, Gupta, B. B., Singh, A. K.
Médium: Journal Article
Jazyk:angličtina
Vydáno: Berlin/Heidelberg Springer Berlin Heidelberg 01.04.2023
Témata:
ISSN:1432-7643, 1433-7479
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract Smart devices are equipped with technology that facilitates communication among devices connected via the Internet. These devices are shipped with a user interface that enables users to perform administrative activities using a web browser linked to the device’s server. Cross-site scripting (XSS) is the most prevalent web application vulnerability exploited by attackers to compromise smart devices. In this paper, the authors have designed a framework for shielding smart devices from XSS attacks. It is a machine learning-based attack detection framework which employs self-organizing-map (SOM) to classify XSS attack string. The input vector to the SOM is generated based on attack ontology and the changing behavior of the attack strings in different input fields in the device web interface. Additionally, it also sanitizes the injected attack string to neutralize the harmful effects of attack. The experimental results are obtained using the real-world dataset on the XSS attack. We tested the proposed framework on web interface of two smart devices (TP-link Wi-Fi router and HP color printer) containing hidden XSS vulnerabilities. The observed results unveil the robustness of the proposed work against the existing work as it achieves a high accuracy of 0.9904 on the tested dataset. It is a platform-independent attack detection system deployed on the browser or server side.
AbstractList Smart devices are equipped with technology that facilitates communication among devices connected via the Internet. These devices are shipped with a user interface that enables users to perform administrative activities using a web browser linked to the device’s server. Cross-site scripting (XSS) is the most prevalent web application vulnerability exploited by attackers to compromise smart devices. In this paper, the authors have designed a framework for shielding smart devices from XSS attacks. It is a machine learning-based attack detection framework which employs self-organizing-map (SOM) to classify XSS attack string. The input vector to the SOM is generated based on attack ontology and the changing behavior of the attack strings in different input fields in the device web interface. Additionally, it also sanitizes the injected attack string to neutralize the harmful effects of attack. The experimental results are obtained using the real-world dataset on the XSS attack. We tested the proposed framework on web interface of two smart devices (TP-link Wi-Fi router and HP color printer) containing hidden XSS vulnerabilities. The observed results unveil the robustness of the proposed work against the existing work as it achieves a high accuracy of 0.9904 on the tested dataset. It is a platform-independent attack detection system deployed on the browser or server side.
Author Gupta, B. B.
Chaudhary, Pooja
Singh, A. K.
Author_xml – sequence: 1
  givenname: Pooja
  surname: Chaudhary
  fullname: Chaudhary, Pooja
  organization: Department of Computer Engineering, National Institute of Technology
– sequence: 2
  givenname: B. B.
  surname: Gupta
  fullname: Gupta, B. B.
  email: gupta.brij@gmail.com
  organization: International Center for AI and Cyber Security Research and Innovations & Department of Computer Science and Information Engineering, Asia University, Lebanese American University, Center for Interdisciplinary Research at University of Petroleum and Energy Studies (UPES), Research and Innovation Department, Skyline University College
– sequence: 3
  givenname: A. K.
  surname: Singh
  fullname: Singh, A. K.
  organization: Department of Computer Engineering, National Institute of Technology
BookMark eNp9kM1OQjEQhRuDiYi-gKu-QLU_91LvkhD_EhI3um5KOyWFS0vagmHpm1tANy5YzWQm35k55xoNQgyA0B2j94xS-ZApbSkllHNC5biThF-gIWuEILKR3eDYcyLHjbhC1zkvKeVMtmKIvidWb4rfATYp5kyyL4CzSb4OwwLrUrRZYQsFTPExYJf0Gr5iWmEXE85rnUrd7ryBjDOYbfJlj7f5wPpQoO_9AkLBzvcFUsY62D_NGErs42J_gy6d7jPc_tYR-nx--pi-ktn7y9t0MiOGd6wQQRtpzZwL2zaOOScbmJtOU8Olc9ZyWb23tGmh67iWnIHUY6bBQmekFtaJEeIn3aPRBE5tkq__7xWj6hCiOoWoqpA6hqh4hR7_QcYXfUiiJO3786g4obneCQtIahm3KVSL56gfcDGNYQ
CitedBy_id crossref_primary_10_4018_IJSWIS_341231
crossref_primary_10_1109_ACCESS_2024_3443408
crossref_primary_10_1007_s43926_025_00123_7
crossref_primary_10_32604_cmc_2024_054780
crossref_primary_10_1109_TCSS_2024_3411635
Cites_doi 10.1016/j.entcs.2014.01.024
10.1016/j.cose.2018.12.016
10.1109/5.58325
10.1186/s12864-019-6413-7
10.1201/9780429351327
10.3390/sym12030410
10.4018/IJSWIS.2020100101
10.1109/TDSC.2020.2999866
10.4018/IJSWIS.2020070102
10.1016/j.cose.2022.102710
10.1016/j.comnet.2019.106960
10.4018/JOEUC.2020100105
10.1109/ACCESS.2020.2965184
10.1109/TMC.2020.3042925
10.1145/3426972
10.1109/JIOT.2022.3203249
10.1006/knac.1993.1008
10.4018/IJSWIS.297143
10.1007/s13369-015-1891-7
10.1016/j.eswa.2020.114386
10.1109/ACCESS.2020.2992820
10.1016/j.sysarc.2015.11.001
10.1016/j.iot.2019.100129
10.4018/IJSWIS.295551
10.1016/j.comnet.2021.108040
10.1109/JIOT.2020.3028742
10.1109/JIOT.2020.3042433
10.1109/TITS.2021.3106825
10.1109/IEMENTech51367.2020.9270052
10.1201/9780367822750
10.1145/2557547.2557550
10.1109/ICC45855.2022.9838643
10.1145/2742854.2745719
10.4018/978-1-5225-0105-3.ch010
10.1145/3194452.3194469
10.3390/s22186741
10.1109/CRC51253.2020.9253484
ContentType Journal Article
Copyright The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature 2022. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
Copyright_xml – notice: The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature 2022. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
DBID AAYXX
CITATION
DOI 10.1007/s00500-022-07697-2
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISSN 1433-7479
EndPage 4608
ExternalDocumentID 10_1007_s00500_022_07697_2
GroupedDBID -5B
-5G
-BR
-EM
-Y2
-~C
.86
.VR
06D
0R~
0VY
1N0
1SB
203
29~
2J2
2JN
2JY
2KG
2LR
2P1
2VQ
2~H
30V
4.4
406
408
409
40D
40E
5VS
67Z
6NX
8TC
8UJ
95-
95.
95~
96X
AAAVM
AABHQ
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AARHV
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYQN
AAYTO
AAYZH
ABAKF
ABBBX
ABBXA
ABDZT
ABECU
ABFTD
ABFTV
ABHLI
ABHQN
ABJNI
ABJOX
ABKCH
ABKTR
ABMNI
ABMQK
ABNWP
ABQBU
ABQSL
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABWNU
ABXPI
ACAOD
ACBXY
ACDTI
ACGFS
ACHSB
ACHXU
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACPIV
ACSNA
ACZOJ
ADHHG
ADHIR
ADINQ
ADKNI
ADKPE
ADRFC
ADTPH
ADURQ
ADYFF
ADZKW
AEBTG
AEFQL
AEGAL
AEGNC
AEJHL
AEJRE
AEKMD
AEMSY
AENEX
AEOHA
AEPYU
AESKC
AETLH
AEVLU
AEXYK
AFBBN
AFGCZ
AFKRA
AFLOW
AFQWF
AFWTZ
AFZKB
AGAYW
AGDGC
AGGDS
AGJBK
AGMZJ
AGQEE
AGQMX
AGRTI
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHSBF
AHYZX
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AJBLW
AJRNO
AJZVZ
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMXSW
AMYLF
AMYQR
AOCGG
ARAPS
ARMRJ
ASPBG
AVWKF
AXYYD
AYJHY
AZFZN
B-.
BA0
BDATZ
BENPR
BGLVJ
BGNMA
BSONS
CAG
CCPQU
COF
CS3
CSCUP
DDRTE
DL5
DNIVK
DPUIP
DU5
EBLON
EBS
EIOEI
EJD
ESBYG
FEDTE
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNWQR
GQ6
GQ7
GQ8
GXS
H13
HCIFZ
HF~
HG5
HG6
HMJXF
HQYDN
HRMNR
HVGLF
HZ~
I09
IHE
IJ-
IKXTQ
IWAJR
IXC
IXD
IXE
IZIGR
IZQ
I~X
I~Z
J-C
J0Z
JBSCW
JCJTX
JZLTJ
K7-
KDC
KOV
LAS
LLZTM
M4Y
MA-
N2Q
NB0
NPVJJ
NQJWS
NU0
O9-
O93
O9J
OAM
P2P
P9P
PF0
PT4
PT5
QOS
R89
R9I
RIG
RNI
ROL
RPX
RSV
RZK
S16
S1Z
S27
S3B
SAP
SDH
SEG
SHX
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
TSG
TSK
TSV
TUC
U2A
UG4
UOJIU
UTJUX
UZXMN
VC2
VFIZW
W23
W48
WK8
YLTOR
Z45
Z5O
Z7R
Z7X
Z7Y
Z7Z
Z81
Z83
Z88
ZMTXR
AAPKM
AAYXX
ABBRH
ABDBE
ABFSG
ABRTQ
ACSTC
ADHKG
ADKFA
AEZWR
AFDZB
AFFHD
AFHIU
AFOHR
AGQPQ
AHPBZ
AHWEU
AIXLP
ATHPR
AYFIA
CITATION
PHGZM
PHGZT
PQGLB
ID FETCH-LOGICAL-c291t-3047dcb23d54f1ff74ebc9a0c27ffdd270225045e992a721e7a61aede9c7a3df3
IEDL.DBID RSV
ISICitedReferencesCount 6
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000895666600002&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1432-7643
IngestDate Sat Nov 29 03:36:21 EST 2025
Tue Nov 18 21:15:49 EST 2025
Fri Feb 21 02:43:35 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 8
Keywords Cross-site scripting (XSS) attack
Attack ontology
Self-organizing map algorithm
Internet-of-things (IoT) network
Smart devices
Smart device security
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c291t-3047dcb23d54f1ff74ebc9a0c27ffdd270225045e992a721e7a61aede9c7a3df3
PageCount 16
ParticipantIDs crossref_primary_10_1007_s00500_022_07697_2
crossref_citationtrail_10_1007_s00500_022_07697_2
springer_journals_10_1007_s00500_022_07697_2
PublicationCentury 2000
PublicationDate 20230400
2023-04-00
PublicationDateYYYYMMDD 2023-04-01
PublicationDate_xml – month: 4
  year: 2023
  text: 20230400
PublicationDecade 2020
PublicationPlace Berlin/Heidelberg
PublicationPlace_xml – name: Berlin/Heidelberg
PublicationSubtitle A Fusion of Foundations, Methodologies and Applications
PublicationTitle Soft computing (Berlin, Germany)
PublicationTitleAbbrev Soft Comput
PublicationYear 2023
Publisher Springer Berlin Heidelberg
Publisher_xml – name: Springer Berlin Heidelberg
References Tariq, Sindhu, Abbasi, Khattak, Maqbool, Siddiqui (CR45) 2021; 168
Tewari (CR44) 2020; 16
Wang, Gu, Zhao (CR47) 2017; 38
Zhou, Wang (CR50) 2019; 82
CR36
CR35
CR34
Singh, Gupta (CR42) 2022; 18
CR32
Chaudhary, Gupta, Singh (CR8) 2022; 118
CR30
Gruber (CR23) 1993; 5
Gupta, Gupta (CR22) 2016; 41
Ahmed, Ali (CR3) 2016; 64
Gupta, Chaudhary, Gupta (CR19) 2020; 32
CR6
CR7
CR9
CR49
Babun, Denney, Celik, McDaniel, Uluagac (CR5) 2021; 192
Sejdiu, Ismaili, Ahmedi (CR40) 2020; 16
Nhi, Le, Van (CR33) 2022; 18
CR41
Zhang, Zhou, Pei, Zhuge, Chen (CR48) 2020; 8
Truong, Diep, Zelinka (CR46) 2020; 12
Abdulrahman, Tout, Mourad, Talhi (CR2) 2021; 8
Stergiou, Psannis (CR43) 2021; 22
Chehab, Mourad (CR10) 2022; 19
Gupta, Chaudhary (CR18) 2020
Gupta, Gupta, Gangwar, Kumar, Meena (CR17) 2015; 11
Kohonen (CR27) 1990; 78
Mokbal, Dan, Xiaoxi, Wenbin, Lihua (CR31) 2021; 58
Samir, Assi, Sharafeddine, Ghrayeb (CR39) 2022; 21
CR16
HaddadPajouh, Dehghantanha, Parizi, Aledhari, Karimipour (CR24) 2021; 14
CR15
CR14
CR13
CR12
Rodríguez, Torres, Flores, Benavides (CR37) 2020; 166
CR51
Abd El-Latif, Abd-El-Atty, Venegas-Andraca, Elwahsh, Piran, Bashir (CR1) 2020; 8
CR29
CR28
CR26
Gupta, Gupta (CR20) 2017; 7
CR25
Arisdakessian, Wahab, Mourad, Otrok, Guizani (CR4) 2022
CR21
Chicco, Jurman (CR11) 2020; 21
Salas, Martins (CR38) 2014; 302
MA Ahmed (7697_CR3) 2016; 64
A Tewari (7697_CR44) 2020; 16
D Wang (7697_CR47) 2017; 38
7697_CR29
B Sejdiu (7697_CR40) 2020; 16
A Singh (7697_CR42) 2022; 18
MIP Salas (7697_CR38) 2014; 302
AA Abd El-Latif (7697_CR1) 2020; 8
7697_CR21
7697_CR28
7697_CR26
I Tariq (7697_CR45) 2021; 168
7697_CR25
H HaddadPajouh (7697_CR24) 2021; 14
7697_CR51
GE Rodríguez (7697_CR37) 2020; 166
Y Zhou (7697_CR50) 2019; 82
7697_CR13
D Chicco (7697_CR11) 2020; 21
7697_CR12
X Zhang (7697_CR48) 2020; 8
7697_CR16
BB Gupta (7697_CR18) 2020
7697_CR15
7697_CR14
7697_CR9
7697_CR41
L Babun (7697_CR5) 2021; 192
7697_CR6
TC Truong (7697_CR46) 2020; 12
7697_CR7
M Chehab (7697_CR10) 2022; 19
TR Gruber (7697_CR23) 1993; 5
T Kohonen (7697_CR27) 1990; 78
CL Stergiou (7697_CR43) 2021; 22
S Gupta (7697_CR20) 2017; 7
M Samir (7697_CR39) 2022; 21
BB Gupta (7697_CR19) 2020; 32
7697_CR49
S Gupta (7697_CR22) 2016; 41
P Chaudhary (7697_CR8) 2022; 118
7697_CR30
S Abdulrahman (7697_CR2) 2021; 8
BB Gupta (7697_CR17) 2015; 11
7697_CR35
7697_CR34
S Arisdakessian (7697_CR4) 2022
FMM Mokbal (7697_CR31) 2021; 58
7697_CR32
NTU Nhi (7697_CR33) 2022; 18
7697_CR36
References_xml – volume: 302
  start-page: 133
  year: 2014
  end-page: 154
  ident: CR38
  article-title: Security testing methodology for vulnerabilities detection of xss in web services and ws-security
  publication-title: Electron Notes Theor Comput Sci
  doi: 10.1016/j.entcs.2014.01.024
– volume: 82
  start-page: 261
  year: 2019
  end-page: 269
  ident: CR50
  article-title: An ensemble learning approach for XSS attack detection with domain knowledge and threat intelligence
  publication-title: Comput Secur
  doi: 10.1016/j.cose.2018.12.016
– volume: 78
  start-page: 1464
  issue: 9
  year: 1990
  end-page: 1480
  ident: CR27
  article-title: The self-organizing map
  publication-title: Proc IEEE
  doi: 10.1109/5.58325
– ident: CR49
– volume: 21
  start-page: 1
  issue: 1
  year: 2020
  end-page: 13
  ident: CR11
  article-title: The advantages of the Matthews correlation coefficient (MCC) over F1 score and accuracy in binary classification evaluation
  publication-title: BMC Genom
  doi: 10.1186/s12864-019-6413-7
– year: 2020
  ident: CR18
  publication-title: Cross-site scripting attacks: classification, attack, and countermeasures
  doi: 10.1201/9780429351327
– ident: CR16
– ident: CR51
– ident: CR12
– ident: CR35
– volume: 12
  start-page: 410
  issue: 3
  year: 2020
  ident: CR46
  article-title: Artificial intelligence in the cyber domain: offense and defense
  publication-title: Symmetry
  doi: 10.3390/sym12030410
– ident: CR29
– volume: 16
  start-page: 1
  year: 2020
  end-page: 25
  ident: CR40
  article-title: Integration of semantics into sensor data for the IoT: a systematic literature review
  publication-title: Int J Semant Web Inf Syst (IJSWIS)
  doi: 10.4018/IJSWIS.2020100101
– volume: 19
  start-page: 161
  issue: 1
  year: 2022
  end-page: 175
  ident: CR10
  article-title: LP-SBA-XACML: lightweight semantics based scheme enabling intelligent behavior-aware privacy for IoT
  publication-title: IEEE Trans Dependable Secure Comput
  doi: 10.1109/TDSC.2020.2999866
– volume: 16
  start-page: 20
  issue: 3
  year: 2020
  end-page: 34
  ident: CR44
  article-title: Secure timestamp-based mutual authentication protocol for IoT devices using rfid tags
  publication-title: Int J Semant Web Inf Syst (IJSWIS)
  doi: 10.4018/IJSWIS.2020070102
– volume: 118
  year: 2022
  ident: CR8
  article-title: Securing heterogeneous embedded devices against XSS attack in intelligent IoT system
  publication-title: Comput Secur
  doi: 10.1016/j.cose.2022.102710
– volume: 166
  year: 2020
  ident: CR37
  article-title: Cross-site scripting (XSS) attacks and mitigation: a survey
  publication-title: Comput Netw
  doi: 10.1016/j.comnet.2019.106960
– ident: CR25
– volume: 32
  start-page: 85
  issue: 4
  year: 2020
  end-page: 111
  ident: CR19
  article-title: Designing a XSS defensive framework for web servers deployed in the existing smart city infrastructure
  publication-title: J Organ End User Comput (JOEUC)
  doi: 10.4018/JOEUC.2020100105
– volume: 8
  start-page: 10989
  year: 2020
  end-page: 10996
  ident: CR48
  article-title: Adversarial examples detection for XSS attacks based on generative adversarial networks
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.2965184
– ident: CR21
– volume: 21
  start-page: 2493
  issue: 7
  year: 2022
  end-page: 2505
  ident: CR39
  article-title: Online altitude control and scheduling policy for minimizing aoi in UAV-assisted IoT wireless networks
  publication-title: IEEE Trans Mob Comput
  doi: 10.1109/TMC.2020.3042925
– volume: 22
  start-page: 1
  issue: 2
  year: 2021
  end-page: 22
  ident: CR43
  article-title: InFeMo: flexible big data management through a federated cloud system
  publication-title: ACM Trans Internet Technol (TOIT)
  doi: 10.1145/3426972
– ident: CR15
– year: 2022
  ident: CR4
  article-title: A survey on IoT intrusion detection: federated learning, game theory, social psychology and explainable AI as future directions
  publication-title: IEEE Internet Things J
  doi: 10.1109/JIOT.2022.3203249
– ident: CR9
– volume: 5
  start-page: 199
  issue: 2
  year: 1993
  end-page: 220
  ident: CR23
  article-title: A translation approach to portable ontology specifications
  publication-title: Knowl Acquis
  doi: 10.1006/knac.1993.1008
– volume: 18
  start-page: 1
  year: 2022
  end-page: 43
  ident: CR42
  article-title: Distributed denial-of-service (DDoS) attacks and defense mechanisms in various web-enabled computing platforms: issues, challenges, and future research directions
  publication-title: Int J Semant Web Inf Syst (IJSWIS)
  doi: 10.4018/IJSWIS.297143
– ident: CR32
– volume: 41
  start-page: 897
  issue: 3
  year: 2016
  end-page: 920
  ident: CR22
  article-title: XSS-SAFE: a server-side approach to detect and mitigate cross-site scripting (XSS) attacks in JavaScript code
  publication-title: Arab J Sci Eng
  doi: 10.1007/s13369-015-1891-7
– ident: CR36
– volume: 168
  year: 2021
  ident: CR45
  article-title: Resolving cross-site scripting attacks through genetic algorithm and reinforcement learning
  publication-title: Expert Syst Appl
  doi: 10.1016/j.eswa.2020.114386
– ident: CR26
– volume: 8
  start-page: 92687
  year: 2020
  end-page: 92696
  ident: CR1
  article-title: Providing end-to-end security using quantum walks in IoT networks
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.2992820
– ident: CR14
– ident: CR30
– volume: 64
  start-page: 50
  year: 2016
  end-page: 62
  ident: CR3
  article-title: Multiple-path testing for cross site scripting using genetic algorithms
  publication-title: J Syst Architect
  doi: 10.1016/j.sysarc.2015.11.001
– volume: 7
  start-page: 1
  issue: 3
  year: 2017
  end-page: 43
  ident: CR20
  article-title: Detection, avoidance, and attack pattern mechanisms in modern web application vulnerabilities: present and future challenges
  publication-title: Int J Cloud Appl Comput (IJCAC)
– ident: CR6
– volume: 14
  year: 2021
  ident: CR24
  article-title: A survey on internet of things security: Requirements, challenges, and solutions
  publication-title: Internet Things
  doi: 10.1016/j.iot.2019.100129
– volume: 18
  start-page: 1
  year: 2022
  end-page: 23
  ident: CR33
  article-title: a model of semantic-based image retrieval using C-tree and neighbor graph
  publication-title: Int J Semant Web Inf Syst (IJSWIS)
  doi: 10.4018/IJSWIS.295551
– volume: 192
  year: 2021
  ident: CR5
  article-title: A survey on IoT platforms: Communication, security, and privacy perspectives
  publication-title: Comput Netw
  doi: 10.1016/j.comnet.2021.108040
– volume: 58
  year: 2021
  ident: CR31
  article-title: XGBXSS: an extreme gradient boosting detection framework for cross-site scripting attacks based on hybrid feature selection approach and parameters optimization
  publication-title: J Inf Secur Appl
– ident: CR13
– volume: 8
  start-page: 4723
  issue: 6
  year: 2021
  end-page: 4735
  ident: CR2
  article-title: FedMCCS: multicriteria client selection model for optimal IoT federated learning
  publication-title: IEEE Internet Things J
  doi: 10.1109/JIOT.2020.3028742
– ident: CR34
– ident: CR7
– ident: CR28
– ident: CR41
– volume: 11
  start-page: 118
  issue: 2
  year: 2015
  end-page: 136
  ident: CR17
  article-title: Cross-site scripting (XSS) abuse and defense: exploitation on several testing bed environments and its defense
  publication-title: J Inf Priv Secur
– volume: 38
  start-page: 1769
  issue: 11
  year: 2017
  end-page: 1774
  ident: CR47
  article-title: Cross-site script vulnerability penetration testing technology
  publication-title: J Harbin Eng Univer
– ident: 7697_CR36
– ident: 7697_CR49
  doi: 10.1109/JIOT.2020.3042433
– ident: 7697_CR13
– volume: 302
  start-page: 133
  year: 2014
  ident: 7697_CR38
  publication-title: Electron Notes Theor Comput Sci
  doi: 10.1016/j.entcs.2014.01.024
– volume: 8
  start-page: 4723
  issue: 6
  year: 2021
  ident: 7697_CR2
  publication-title: IEEE Internet Things J
  doi: 10.1109/JIOT.2020.3028742
– volume: 78
  start-page: 1464
  issue: 9
  year: 1990
  ident: 7697_CR27
  publication-title: Proc IEEE
  doi: 10.1109/5.58325
– ident: 7697_CR51
  doi: 10.1109/TITS.2021.3106825
– ident: 7697_CR6
  doi: 10.1109/IEMENTech51367.2020.9270052
– volume: 38
  start-page: 1769
  issue: 11
  year: 2017
  ident: 7697_CR47
  publication-title: J Harbin Eng Univer
– volume: 11
  start-page: 118
  issue: 2
  year: 2015
  ident: 7697_CR17
  publication-title: J Inf Priv Secur
– year: 2022
  ident: 7697_CR4
  publication-title: IEEE Internet Things J
  doi: 10.1109/JIOT.2022.3203249
– ident: 7697_CR16
– ident: 7697_CR28
  doi: 10.1201/9780367822750
– volume: 19
  start-page: 161
  issue: 1
  year: 2022
  ident: 7697_CR10
  publication-title: IEEE Trans Dependable Secure Comput
  doi: 10.1109/TDSC.2020.2999866
– ident: 7697_CR12
– volume: 22
  start-page: 1
  issue: 2
  year: 2021
  ident: 7697_CR43
  publication-title: ACM Trans Internet Technol (TOIT)
  doi: 10.1145/3426972
– ident: 7697_CR7
– volume: 8
  start-page: 10989
  year: 2020
  ident: 7697_CR48
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.2965184
– volume: 21
  start-page: 1
  issue: 1
  year: 2020
  ident: 7697_CR11
  publication-title: BMC Genom
  doi: 10.1186/s12864-019-6413-7
– ident: 7697_CR26
– volume-title: Cross-site scripting attacks: classification, attack, and countermeasures
  year: 2020
  ident: 7697_CR18
  doi: 10.1201/9780429351327
– volume: 58
  year: 2021
  ident: 7697_CR31
  publication-title: J Inf Secur Appl
– ident: 7697_CR14
  doi: 10.1145/2557547.2557550
– volume: 21
  start-page: 2493
  issue: 7
  year: 2022
  ident: 7697_CR39
  publication-title: IEEE Trans Mob Comput
  doi: 10.1109/TMC.2020.3042925
– ident: 7697_CR34
– volume: 41
  start-page: 897
  issue: 3
  year: 2016
  ident: 7697_CR22
  publication-title: Arab J Sci Eng
  doi: 10.1007/s13369-015-1891-7
– volume: 16
  start-page: 1
  year: 2020
  ident: 7697_CR40
  publication-title: Int J Semant Web Inf Syst (IJSWIS)
  doi: 10.4018/IJSWIS.2020100101
– ident: 7697_CR32
  doi: 10.1109/ICC45855.2022.9838643
– ident: 7697_CR25
– volume: 8
  start-page: 92687
  year: 2020
  ident: 7697_CR1
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.2992820
– volume: 14
  year: 2021
  ident: 7697_CR24
  publication-title: Internet Things
  doi: 10.1016/j.iot.2019.100129
– volume: 32
  start-page: 85
  issue: 4
  year: 2020
  ident: 7697_CR19
  publication-title: J Organ End User Comput (JOEUC)
  doi: 10.4018/JOEUC.2020100105
– volume: 118
  year: 2022
  ident: 7697_CR8
  publication-title: Comput Secur
  doi: 10.1016/j.cose.2022.102710
– ident: 7697_CR35
– ident: 7697_CR21
  doi: 10.1145/2742854.2745719
– ident: 7697_CR9
  doi: 10.4018/978-1-5225-0105-3.ch010
– ident: 7697_CR15
  doi: 10.1145/3194452.3194469
– volume: 16
  start-page: 20
  issue: 3
  year: 2020
  ident: 7697_CR44
  publication-title: Int J Semant Web Inf Syst (IJSWIS)
  doi: 10.4018/IJSWIS.2020070102
– volume: 192
  year: 2021
  ident: 7697_CR5
  publication-title: Comput Netw
  doi: 10.1016/j.comnet.2021.108040
– volume: 12
  start-page: 410
  issue: 3
  year: 2020
  ident: 7697_CR46
  publication-title: Symmetry
  doi: 10.3390/sym12030410
– ident: 7697_CR41
  doi: 10.3390/s22186741
– volume: 166
  year: 2020
  ident: 7697_CR37
  publication-title: Comput Netw
  doi: 10.1016/j.comnet.2019.106960
– volume: 7
  start-page: 1
  issue: 3
  year: 2017
  ident: 7697_CR20
  publication-title: Int J Cloud Appl Comput (IJCAC)
– volume: 5
  start-page: 199
  issue: 2
  year: 1993
  ident: 7697_CR23
  publication-title: Knowl Acquis
  doi: 10.1006/knac.1993.1008
– volume: 18
  start-page: 1
  year: 2022
  ident: 7697_CR33
  publication-title: Int J Semant Web Inf Syst (IJSWIS)
  doi: 10.4018/IJSWIS.295551
– ident: 7697_CR29
  doi: 10.1109/CRC51253.2020.9253484
– volume: 82
  start-page: 261
  year: 2019
  ident: 7697_CR50
  publication-title: Comput Secur
  doi: 10.1016/j.cose.2018.12.016
– ident: 7697_CR30
– volume: 64
  start-page: 50
  year: 2016
  ident: 7697_CR3
  publication-title: J Syst Architect
  doi: 10.1016/j.sysarc.2015.11.001
– volume: 18
  start-page: 1
  year: 2022
  ident: 7697_CR42
  publication-title: Int J Semant Web Inf Syst (IJSWIS)
  doi: 10.4018/IJSWIS.297143
– volume: 168
  year: 2021
  ident: 7697_CR45
  publication-title: Expert Syst Appl
  doi: 10.1016/j.eswa.2020.114386
SSID ssj0021753
Score 2.3648682
Snippet Smart devices are equipped with technology that facilitates communication among devices connected via the Internet. These devices are shipped with a user...
SourceID crossref
springer
SourceType Enrichment Source
Index Database
Publisher
StartPage 4593
SubjectTerms Artificial Intelligence
Computational Intelligence
Control
Data Analytics and Machine Learning
Engineering
Mathematical Logic and Foundations
Mechatronics
Robotics
Title Adaptive cross-site scripting attack detection framework for smart devices security using intelligent filters and attack ontology
URI https://link.springer.com/article/10.1007/s00500-022-07697-2
Volume 27
WOSCitedRecordID wos000895666600002&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVPQU
  databaseName: Advanced Technologies & Aerospace Database
  customDbUrl:
  eissn: 1433-7479
  dateEnd: 20241214
  omitProxy: false
  ssIdentifier: ssj0021753
  issn: 1432-7643
  databaseCode: P5Z
  dateStart: 20090101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/hightechjournals
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Computer Science Database
  customDbUrl:
  eissn: 1433-7479
  dateEnd: 20241214
  omitProxy: false
  ssIdentifier: ssj0021753
  issn: 1432-7643
  databaseCode: K7-
  dateStart: 20090101
  isFulltext: true
  titleUrlDefault: http://search.proquest.com/compscijour
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl:
  eissn: 1433-7479
  dateEnd: 20241214
  omitProxy: false
  ssIdentifier: ssj0021753
  issn: 1432-7643
  databaseCode: BENPR
  dateStart: 20090101
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVAVX
  databaseName: SpringerLINK Contemporary 1997-Present
  customDbUrl:
  eissn: 1433-7479
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0021753
  issn: 1432-7643
  databaseCode: RSV
  dateStart: 19970401
  isFulltext: true
  titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22
  providerName: Springer Nature
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LSwMxEB60etCD1apYHyUHbxrYZ7M5FrEIShF80NuSZynqWrqrd_-5SZpdLEhBT3vYbDZkJvPIzHwDcJ4qlQpJEqziPscJ4wFmQZbgOO1LoQhNmXSUviOjUTYe03tfFFbW2e51SNJJ6qbYzUKVBNhmnxvfmxJsBO9GatFmrI_-8Ny4WR570hgCxnY0CteXyvw-x7I6Wo6FOhUzbP9vcbuw401KNFjwwB6sqaID7bpdA_KntwPbP7AH9-FrINnMyjrkVoZtFBl5GVJMEKsqJl6QVJXL1SqQrrO4kDFzUflmWM68dXIGlb4JHrJZ9BM0bWA-K6SnNhxfIlbIek6LmGDv8g_gaXj9eHWDfT8GLCIaVthG6KTgUSzTRIdak0RxQVkgIqK1lLayzQKipYrSiBnPUhHWD5mSigrCYqnjQ2gV74U6AhRLLjNClGTcGkA8i7RIKQ_Ng5OAqC6ENVly4cHKbc-M17yBWXY7nptf5m7H86gLF803swVUx8rRlzUlc39syxXDj_82_AS2bF_6RYrPKbSq-Yc6g03xWU3LeQ_WbwnuOa79BtJ_6Tc
linkProvider Springer Nature
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LSwMxEB6kCurB-sT6zMGbBvbZNMciFsVaBKv0tuRZirqW7urdf26SZhcLIuhpD5vNhsxkHpmZbwDOUqVSIUmCVdzmOGE8wCzoJDhO21IoQlMmHaX7ZDDojEb03heFFVW2exWSdJK6LnazUCUBttnnxvemBBvBu5zYNjvWR394qt0sjz1pDAFjOxqF60tlfp5jUR0txkKdiuk1_7e4TdjwJiXqznlgC5ZUvg3Nql0D8qd3G9a_YQ_uwGdXsqmVdcitDNsoMvIyJB8jVpZMPCOpSperlSNdZXEhY-ai4tWwnHnr5AwqfBM8ZLPox2hSw3yWSE9sOL5ALJfVnBYxwd7l78Jj72p4eY19PwYsIhqW2EbopOBRLNNEh1qTRHFBWSAiorWUtrLNAqKlitKIGc9SEdYOmZKKCsJiqeM9aORvudoHFEsuO4Qoybg1gHgn0iKlPDQPTgKiWhBWZMmEByu3PTNeshpm2e14Zn6ZuR3Pohac199M51Adv46-qCiZ-WNb_DL84G_DT2H1enjXz_o3g9tDWLM96ufpPkfQKGfv6hhWxEc5KWYnjne_AEyU60s
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LSwMxEA5SRfRgtSrWZw7eNHSfzeZY1KJYSvFFb0uepahr6a7e_ecmaXZpQQriaQ-bzYZMMpnJfPMNAOexlDEXOEIybDMUUeYh6iURCuO24BKTmAor6R7u95PhkAzmsvgt2r0MSc5yGgxLU1a0JkK1qsQ3Q1viIYNE1344wUgr4dVIezIG1PXw-FK5XI6HUhsF2o7Uh69Lm_m9j8WjaTEuao-bbv3_A90GW87UhJ3Z2tgBKzJrgHpZxgG6Xd0Am3OchLvguyPoxOhAaEeJTHQZOt2SjSAtCspfoZCFxXBlUJXoLqjNX5i_66Wo31r9A3NXHA8adP0Ijiv6zwKqsQnT55BmouzTMCmYO_498Ny9ebq6Ra5OA-IB8QtkIneCsyAUcaR8pXAkGSfU4wFWSgiT8WaI0mJJSEC1xykxbftUCkk4pqFQ4T6oZR-ZPAAwFEwkGEtBmTGMWBIoHhPm6wfDHpZN4JciSrkjMTe1NN7Sin7Zzniqf5naGU-DJriovpnMKDyWtr4spZq67ZwvaX74t-ZnYH1w3U17d_37I7BhStfPUEDHoFZMP-UJWONfxTifntpl_AN-bPQv
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Adaptive+cross-site+scripting+attack+detection+framework+for+smart+devices+security+using+intelligent+filters+and+attack+ontology&rft.jtitle=Soft+computing+%28Berlin%2C+Germany%29&rft.au=Chaudhary%2C+Pooja&rft.au=Gupta%2C+B.+B.&rft.au=Singh%2C+A.+K.&rft.date=2023-04-01&rft.issn=1432-7643&rft.eissn=1433-7479&rft.volume=27&rft.issue=8&rft.spage=4593&rft.epage=4608&rft_id=info:doi/10.1007%2Fs00500-022-07697-2&rft.externalDBID=n%2Fa&rft.externalDocID=10_1007_s00500_022_07697_2
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1432-7643&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1432-7643&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1432-7643&client=summon