Adaptive cross-site scripting attack detection framework for smart devices security using intelligent filters and attack ontology
Smart devices are equipped with technology that facilitates communication among devices connected via the Internet. These devices are shipped with a user interface that enables users to perform administrative activities using a web browser linked to the device’s server. Cross-site scripting (XSS) is...
Uloženo v:
| Vydáno v: | Soft computing (Berlin, Germany) Ročník 27; číslo 8; s. 4593 - 4608 |
|---|---|
| Hlavní autoři: | , , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
Berlin/Heidelberg
Springer Berlin Heidelberg
01.04.2023
|
| Témata: | |
| ISSN: | 1432-7643, 1433-7479 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | Smart devices are equipped with technology that facilitates communication among devices connected via the Internet. These devices are shipped with a user interface that enables users to perform administrative activities using a web browser linked to the device’s server. Cross-site scripting (XSS) is the most prevalent web application vulnerability exploited by attackers to compromise smart devices. In this paper, the authors have designed a framework for shielding smart devices from XSS attacks. It is a machine learning-based attack detection framework which employs self-organizing-map (SOM) to classify XSS attack string. The input vector to the SOM is generated based on attack ontology and the changing behavior of the attack strings in different input fields in the device web interface. Additionally, it also sanitizes the injected attack string to neutralize the harmful effects of attack. The experimental results are obtained using the real-world dataset on the XSS attack. We tested the proposed framework on web interface of two smart devices (TP-link Wi-Fi router and HP color printer) containing hidden XSS vulnerabilities. The observed results unveil the robustness of the proposed work against the existing work as it achieves a high accuracy of 0.9904 on the tested dataset. It is a platform-independent attack detection system deployed on the browser or server side. |
|---|---|
| AbstractList | Smart devices are equipped with technology that facilitates communication among devices connected via the Internet. These devices are shipped with a user interface that enables users to perform administrative activities using a web browser linked to the device’s server. Cross-site scripting (XSS) is the most prevalent web application vulnerability exploited by attackers to compromise smart devices. In this paper, the authors have designed a framework for shielding smart devices from XSS attacks. It is a machine learning-based attack detection framework which employs self-organizing-map (SOM) to classify XSS attack string. The input vector to the SOM is generated based on attack ontology and the changing behavior of the attack strings in different input fields in the device web interface. Additionally, it also sanitizes the injected attack string to neutralize the harmful effects of attack. The experimental results are obtained using the real-world dataset on the XSS attack. We tested the proposed framework on web interface of two smart devices (TP-link Wi-Fi router and HP color printer) containing hidden XSS vulnerabilities. The observed results unveil the robustness of the proposed work against the existing work as it achieves a high accuracy of 0.9904 on the tested dataset. It is a platform-independent attack detection system deployed on the browser or server side. |
| Author | Gupta, B. B. Chaudhary, Pooja Singh, A. K. |
| Author_xml | – sequence: 1 givenname: Pooja surname: Chaudhary fullname: Chaudhary, Pooja organization: Department of Computer Engineering, National Institute of Technology – sequence: 2 givenname: B. B. surname: Gupta fullname: Gupta, B. B. email: gupta.brij@gmail.com organization: International Center for AI and Cyber Security Research and Innovations & Department of Computer Science and Information Engineering, Asia University, Lebanese American University, Center for Interdisciplinary Research at University of Petroleum and Energy Studies (UPES), Research and Innovation Department, Skyline University College – sequence: 3 givenname: A. K. surname: Singh fullname: Singh, A. K. organization: Department of Computer Engineering, National Institute of Technology |
| BookMark | eNp9kM1OQjEQhRuDiYi-gKu-QLU_91LvkhD_EhI3um5KOyWFS0vagmHpm1tANy5YzWQm35k55xoNQgyA0B2j94xS-ZApbSkllHNC5biThF-gIWuEILKR3eDYcyLHjbhC1zkvKeVMtmKIvidWb4rfATYp5kyyL4CzSb4OwwLrUrRZYQsFTPExYJf0Gr5iWmEXE85rnUrd7ryBjDOYbfJlj7f5wPpQoO_9AkLBzvcFUsY62D_NGErs42J_gy6d7jPc_tYR-nx--pi-ktn7y9t0MiOGd6wQQRtpzZwL2zaOOScbmJtOU8Olc9ZyWb23tGmh67iWnIHUY6bBQmekFtaJEeIn3aPRBE5tkq__7xWj6hCiOoWoqpA6hqh4hR7_QcYXfUiiJO3786g4obneCQtIahm3KVSL56gfcDGNYQ |
| CitedBy_id | crossref_primary_10_4018_IJSWIS_341231 crossref_primary_10_1109_ACCESS_2024_3443408 crossref_primary_10_1007_s43926_025_00123_7 crossref_primary_10_32604_cmc_2024_054780 crossref_primary_10_1109_TCSS_2024_3411635 |
| Cites_doi | 10.1016/j.entcs.2014.01.024 10.1016/j.cose.2018.12.016 10.1109/5.58325 10.1186/s12864-019-6413-7 10.1201/9780429351327 10.3390/sym12030410 10.4018/IJSWIS.2020100101 10.1109/TDSC.2020.2999866 10.4018/IJSWIS.2020070102 10.1016/j.cose.2022.102710 10.1016/j.comnet.2019.106960 10.4018/JOEUC.2020100105 10.1109/ACCESS.2020.2965184 10.1109/TMC.2020.3042925 10.1145/3426972 10.1109/JIOT.2022.3203249 10.1006/knac.1993.1008 10.4018/IJSWIS.297143 10.1007/s13369-015-1891-7 10.1016/j.eswa.2020.114386 10.1109/ACCESS.2020.2992820 10.1016/j.sysarc.2015.11.001 10.1016/j.iot.2019.100129 10.4018/IJSWIS.295551 10.1016/j.comnet.2021.108040 10.1109/JIOT.2020.3028742 10.1109/JIOT.2020.3042433 10.1109/TITS.2021.3106825 10.1109/IEMENTech51367.2020.9270052 10.1201/9780367822750 10.1145/2557547.2557550 10.1109/ICC45855.2022.9838643 10.1145/2742854.2745719 10.4018/978-1-5225-0105-3.ch010 10.1145/3194452.3194469 10.3390/s22186741 10.1109/CRC51253.2020.9253484 |
| ContentType | Journal Article |
| Copyright | The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature 2022. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law. |
| Copyright_xml | – notice: The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature 2022. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law. |
| DBID | AAYXX CITATION |
| DOI | 10.1007/s00500-022-07697-2 |
| DatabaseName | CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering Computer Science |
| EISSN | 1433-7479 |
| EndPage | 4608 |
| ExternalDocumentID | 10_1007_s00500_022_07697_2 |
| GroupedDBID | -5B -5G -BR -EM -Y2 -~C .86 .VR 06D 0R~ 0VY 1N0 1SB 203 29~ 2J2 2JN 2JY 2KG 2LR 2P1 2VQ 2~H 30V 4.4 406 408 409 40D 40E 5VS 67Z 6NX 8TC 8UJ 95- 95. 95~ 96X AAAVM AABHQ AACDK AAHNG AAIAL AAJBT AAJKR AANZL AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYQN AAYTO AAYZH ABAKF ABBBX ABBXA ABDZT ABECU ABFTD ABFTV ABHLI ABHQN ABJNI ABJOX ABKCH ABKTR ABMNI ABMQK ABNWP ABQBU ABQSL ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABWNU ABXPI ACAOD ACBXY ACDTI ACGFS ACHSB ACHXU ACKNC ACMDZ ACMLO ACOKC ACOMO ACPIV ACSNA ACZOJ ADHHG ADHIR ADINQ ADKNI ADKPE ADRFC ADTPH ADURQ ADYFF ADZKW AEBTG AEFQL AEGAL AEGNC AEJHL AEJRE AEKMD AEMSY AENEX AEOHA AEPYU AESKC AETLH AEVLU AEXYK AFBBN AFGCZ AFKRA AFLOW AFQWF AFWTZ AFZKB AGAYW AGDGC AGGDS AGJBK AGMZJ AGQEE AGQMX AGRTI AGWIL AGWZB AGYKE AHAVH AHBYD AHSBF AHYZX AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJRNO AJZVZ ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMXSW AMYLF AMYQR AOCGG ARAPS ARMRJ ASPBG AVWKF AXYYD AYJHY AZFZN B-. BA0 BDATZ BENPR BGLVJ BGNMA BSONS CAG CCPQU COF CS3 CSCUP DDRTE DL5 DNIVK DPUIP DU5 EBLON EBS EIOEI EJD ESBYG FEDTE FERAY FFXSO FIGPU FINBP FNLPD FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNWQR GQ6 GQ7 GQ8 GXS H13 HCIFZ HF~ HG5 HG6 HMJXF HQYDN HRMNR HVGLF HZ~ I09 IHE IJ- IKXTQ IWAJR IXC IXD IXE IZIGR IZQ I~X I~Z J-C J0Z JBSCW JCJTX JZLTJ K7- KDC KOV LAS LLZTM M4Y MA- N2Q NB0 NPVJJ NQJWS NU0 O9- O93 O9J OAM P2P P9P PF0 PT4 PT5 QOS R89 R9I RIG RNI ROL RPX RSV RZK S16 S1Z S27 S3B SAP SDH SEG SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 TSG TSK TSV TUC U2A UG4 UOJIU UTJUX UZXMN VC2 VFIZW W23 W48 WK8 YLTOR Z45 Z5O Z7R Z7X Z7Y Z7Z Z81 Z83 Z88 ZMTXR AAPKM AAYXX ABBRH ABDBE ABFSG ABRTQ ACSTC ADHKG ADKFA AEZWR AFDZB AFFHD AFHIU AFOHR AGQPQ AHPBZ AHWEU AIXLP ATHPR AYFIA CITATION PHGZM PHGZT PQGLB |
| ID | FETCH-LOGICAL-c291t-3047dcb23d54f1ff74ebc9a0c27ffdd270225045e992a721e7a61aede9c7a3df3 |
| IEDL.DBID | RSV |
| ISICitedReferencesCount | 6 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000895666600002&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1432-7643 |
| IngestDate | Sat Nov 29 03:36:21 EST 2025 Tue Nov 18 21:15:49 EST 2025 Fri Feb 21 02:43:35 EST 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 8 |
| Keywords | Cross-site scripting (XSS) attack Attack ontology Self-organizing map algorithm Internet-of-things (IoT) network Smart devices Smart device security |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c291t-3047dcb23d54f1ff74ebc9a0c27ffdd270225045e992a721e7a61aede9c7a3df3 |
| PageCount | 16 |
| ParticipantIDs | crossref_primary_10_1007_s00500_022_07697_2 crossref_citationtrail_10_1007_s00500_022_07697_2 springer_journals_10_1007_s00500_022_07697_2 |
| PublicationCentury | 2000 |
| PublicationDate | 20230400 2023-04-00 |
| PublicationDateYYYYMMDD | 2023-04-01 |
| PublicationDate_xml | – month: 4 year: 2023 text: 20230400 |
| PublicationDecade | 2020 |
| PublicationPlace | Berlin/Heidelberg |
| PublicationPlace_xml | – name: Berlin/Heidelberg |
| PublicationSubtitle | A Fusion of Foundations, Methodologies and Applications |
| PublicationTitle | Soft computing (Berlin, Germany) |
| PublicationTitleAbbrev | Soft Comput |
| PublicationYear | 2023 |
| Publisher | Springer Berlin Heidelberg |
| Publisher_xml | – name: Springer Berlin Heidelberg |
| References | Tariq, Sindhu, Abbasi, Khattak, Maqbool, Siddiqui (CR45) 2021; 168 Tewari (CR44) 2020; 16 Wang, Gu, Zhao (CR47) 2017; 38 Zhou, Wang (CR50) 2019; 82 CR36 CR35 CR34 Singh, Gupta (CR42) 2022; 18 CR32 Chaudhary, Gupta, Singh (CR8) 2022; 118 CR30 Gruber (CR23) 1993; 5 Gupta, Gupta (CR22) 2016; 41 Ahmed, Ali (CR3) 2016; 64 Gupta, Chaudhary, Gupta (CR19) 2020; 32 CR6 CR7 CR9 CR49 Babun, Denney, Celik, McDaniel, Uluagac (CR5) 2021; 192 Sejdiu, Ismaili, Ahmedi (CR40) 2020; 16 Nhi, Le, Van (CR33) 2022; 18 CR41 Zhang, Zhou, Pei, Zhuge, Chen (CR48) 2020; 8 Truong, Diep, Zelinka (CR46) 2020; 12 Abdulrahman, Tout, Mourad, Talhi (CR2) 2021; 8 Stergiou, Psannis (CR43) 2021; 22 Chehab, Mourad (CR10) 2022; 19 Gupta, Chaudhary (CR18) 2020 Gupta, Gupta, Gangwar, Kumar, Meena (CR17) 2015; 11 Kohonen (CR27) 1990; 78 Mokbal, Dan, Xiaoxi, Wenbin, Lihua (CR31) 2021; 58 Samir, Assi, Sharafeddine, Ghrayeb (CR39) 2022; 21 CR16 HaddadPajouh, Dehghantanha, Parizi, Aledhari, Karimipour (CR24) 2021; 14 CR15 CR14 CR13 CR12 Rodríguez, Torres, Flores, Benavides (CR37) 2020; 166 CR51 Abd El-Latif, Abd-El-Atty, Venegas-Andraca, Elwahsh, Piran, Bashir (CR1) 2020; 8 CR29 CR28 CR26 Gupta, Gupta (CR20) 2017; 7 CR25 Arisdakessian, Wahab, Mourad, Otrok, Guizani (CR4) 2022 CR21 Chicco, Jurman (CR11) 2020; 21 Salas, Martins (CR38) 2014; 302 MA Ahmed (7697_CR3) 2016; 64 A Tewari (7697_CR44) 2020; 16 D Wang (7697_CR47) 2017; 38 7697_CR29 B Sejdiu (7697_CR40) 2020; 16 A Singh (7697_CR42) 2022; 18 MIP Salas (7697_CR38) 2014; 302 AA Abd El-Latif (7697_CR1) 2020; 8 7697_CR21 7697_CR28 7697_CR26 I Tariq (7697_CR45) 2021; 168 7697_CR25 H HaddadPajouh (7697_CR24) 2021; 14 7697_CR51 GE Rodríguez (7697_CR37) 2020; 166 Y Zhou (7697_CR50) 2019; 82 7697_CR13 D Chicco (7697_CR11) 2020; 21 7697_CR12 X Zhang (7697_CR48) 2020; 8 7697_CR16 BB Gupta (7697_CR18) 2020 7697_CR15 7697_CR14 7697_CR9 7697_CR41 L Babun (7697_CR5) 2021; 192 7697_CR6 TC Truong (7697_CR46) 2020; 12 7697_CR7 M Chehab (7697_CR10) 2022; 19 TR Gruber (7697_CR23) 1993; 5 T Kohonen (7697_CR27) 1990; 78 CL Stergiou (7697_CR43) 2021; 22 S Gupta (7697_CR20) 2017; 7 M Samir (7697_CR39) 2022; 21 BB Gupta (7697_CR19) 2020; 32 7697_CR49 S Gupta (7697_CR22) 2016; 41 P Chaudhary (7697_CR8) 2022; 118 7697_CR30 S Abdulrahman (7697_CR2) 2021; 8 BB Gupta (7697_CR17) 2015; 11 7697_CR35 7697_CR34 S Arisdakessian (7697_CR4) 2022 FMM Mokbal (7697_CR31) 2021; 58 7697_CR32 NTU Nhi (7697_CR33) 2022; 18 7697_CR36 |
| References_xml | – volume: 302 start-page: 133 year: 2014 end-page: 154 ident: CR38 article-title: Security testing methodology for vulnerabilities detection of xss in web services and ws-security publication-title: Electron Notes Theor Comput Sci doi: 10.1016/j.entcs.2014.01.024 – volume: 82 start-page: 261 year: 2019 end-page: 269 ident: CR50 article-title: An ensemble learning approach for XSS attack detection with domain knowledge and threat intelligence publication-title: Comput Secur doi: 10.1016/j.cose.2018.12.016 – volume: 78 start-page: 1464 issue: 9 year: 1990 end-page: 1480 ident: CR27 article-title: The self-organizing map publication-title: Proc IEEE doi: 10.1109/5.58325 – ident: CR49 – volume: 21 start-page: 1 issue: 1 year: 2020 end-page: 13 ident: CR11 article-title: The advantages of the Matthews correlation coefficient (MCC) over F1 score and accuracy in binary classification evaluation publication-title: BMC Genom doi: 10.1186/s12864-019-6413-7 – year: 2020 ident: CR18 publication-title: Cross-site scripting attacks: classification, attack, and countermeasures doi: 10.1201/9780429351327 – ident: CR16 – ident: CR51 – ident: CR12 – ident: CR35 – volume: 12 start-page: 410 issue: 3 year: 2020 ident: CR46 article-title: Artificial intelligence in the cyber domain: offense and defense publication-title: Symmetry doi: 10.3390/sym12030410 – ident: CR29 – volume: 16 start-page: 1 year: 2020 end-page: 25 ident: CR40 article-title: Integration of semantics into sensor data for the IoT: a systematic literature review publication-title: Int J Semant Web Inf Syst (IJSWIS) doi: 10.4018/IJSWIS.2020100101 – volume: 19 start-page: 161 issue: 1 year: 2022 end-page: 175 ident: CR10 article-title: LP-SBA-XACML: lightweight semantics based scheme enabling intelligent behavior-aware privacy for IoT publication-title: IEEE Trans Dependable Secure Comput doi: 10.1109/TDSC.2020.2999866 – volume: 16 start-page: 20 issue: 3 year: 2020 end-page: 34 ident: CR44 article-title: Secure timestamp-based mutual authentication protocol for IoT devices using rfid tags publication-title: Int J Semant Web Inf Syst (IJSWIS) doi: 10.4018/IJSWIS.2020070102 – volume: 118 year: 2022 ident: CR8 article-title: Securing heterogeneous embedded devices against XSS attack in intelligent IoT system publication-title: Comput Secur doi: 10.1016/j.cose.2022.102710 – volume: 166 year: 2020 ident: CR37 article-title: Cross-site scripting (XSS) attacks and mitigation: a survey publication-title: Comput Netw doi: 10.1016/j.comnet.2019.106960 – ident: CR25 – volume: 32 start-page: 85 issue: 4 year: 2020 end-page: 111 ident: CR19 article-title: Designing a XSS defensive framework for web servers deployed in the existing smart city infrastructure publication-title: J Organ End User Comput (JOEUC) doi: 10.4018/JOEUC.2020100105 – volume: 8 start-page: 10989 year: 2020 end-page: 10996 ident: CR48 article-title: Adversarial examples detection for XSS attacks based on generative adversarial networks publication-title: IEEE Access doi: 10.1109/ACCESS.2020.2965184 – ident: CR21 – volume: 21 start-page: 2493 issue: 7 year: 2022 end-page: 2505 ident: CR39 article-title: Online altitude control and scheduling policy for minimizing aoi in UAV-assisted IoT wireless networks publication-title: IEEE Trans Mob Comput doi: 10.1109/TMC.2020.3042925 – volume: 22 start-page: 1 issue: 2 year: 2021 end-page: 22 ident: CR43 article-title: InFeMo: flexible big data management through a federated cloud system publication-title: ACM Trans Internet Technol (TOIT) doi: 10.1145/3426972 – ident: CR15 – year: 2022 ident: CR4 article-title: A survey on IoT intrusion detection: federated learning, game theory, social psychology and explainable AI as future directions publication-title: IEEE Internet Things J doi: 10.1109/JIOT.2022.3203249 – ident: CR9 – volume: 5 start-page: 199 issue: 2 year: 1993 end-page: 220 ident: CR23 article-title: A translation approach to portable ontology specifications publication-title: Knowl Acquis doi: 10.1006/knac.1993.1008 – volume: 18 start-page: 1 year: 2022 end-page: 43 ident: CR42 article-title: Distributed denial-of-service (DDoS) attacks and defense mechanisms in various web-enabled computing platforms: issues, challenges, and future research directions publication-title: Int J Semant Web Inf Syst (IJSWIS) doi: 10.4018/IJSWIS.297143 – ident: CR32 – volume: 41 start-page: 897 issue: 3 year: 2016 end-page: 920 ident: CR22 article-title: XSS-SAFE: a server-side approach to detect and mitigate cross-site scripting (XSS) attacks in JavaScript code publication-title: Arab J Sci Eng doi: 10.1007/s13369-015-1891-7 – ident: CR36 – volume: 168 year: 2021 ident: CR45 article-title: Resolving cross-site scripting attacks through genetic algorithm and reinforcement learning publication-title: Expert Syst Appl doi: 10.1016/j.eswa.2020.114386 – ident: CR26 – volume: 8 start-page: 92687 year: 2020 end-page: 92696 ident: CR1 article-title: Providing end-to-end security using quantum walks in IoT networks publication-title: IEEE Access doi: 10.1109/ACCESS.2020.2992820 – ident: CR14 – ident: CR30 – volume: 64 start-page: 50 year: 2016 end-page: 62 ident: CR3 article-title: Multiple-path testing for cross site scripting using genetic algorithms publication-title: J Syst Architect doi: 10.1016/j.sysarc.2015.11.001 – volume: 7 start-page: 1 issue: 3 year: 2017 end-page: 43 ident: CR20 article-title: Detection, avoidance, and attack pattern mechanisms in modern web application vulnerabilities: present and future challenges publication-title: Int J Cloud Appl Comput (IJCAC) – ident: CR6 – volume: 14 year: 2021 ident: CR24 article-title: A survey on internet of things security: Requirements, challenges, and solutions publication-title: Internet Things doi: 10.1016/j.iot.2019.100129 – volume: 18 start-page: 1 year: 2022 end-page: 23 ident: CR33 article-title: a model of semantic-based image retrieval using C-tree and neighbor graph publication-title: Int J Semant Web Inf Syst (IJSWIS) doi: 10.4018/IJSWIS.295551 – volume: 192 year: 2021 ident: CR5 article-title: A survey on IoT platforms: Communication, security, and privacy perspectives publication-title: Comput Netw doi: 10.1016/j.comnet.2021.108040 – volume: 58 year: 2021 ident: CR31 article-title: XGBXSS: an extreme gradient boosting detection framework for cross-site scripting attacks based on hybrid feature selection approach and parameters optimization publication-title: J Inf Secur Appl – ident: CR13 – volume: 8 start-page: 4723 issue: 6 year: 2021 end-page: 4735 ident: CR2 article-title: FedMCCS: multicriteria client selection model for optimal IoT federated learning publication-title: IEEE Internet Things J doi: 10.1109/JIOT.2020.3028742 – ident: CR34 – ident: CR7 – ident: CR28 – ident: CR41 – volume: 11 start-page: 118 issue: 2 year: 2015 end-page: 136 ident: CR17 article-title: Cross-site scripting (XSS) abuse and defense: exploitation on several testing bed environments and its defense publication-title: J Inf Priv Secur – volume: 38 start-page: 1769 issue: 11 year: 2017 end-page: 1774 ident: CR47 article-title: Cross-site script vulnerability penetration testing technology publication-title: J Harbin Eng Univer – ident: 7697_CR36 – ident: 7697_CR49 doi: 10.1109/JIOT.2020.3042433 – ident: 7697_CR13 – volume: 302 start-page: 133 year: 2014 ident: 7697_CR38 publication-title: Electron Notes Theor Comput Sci doi: 10.1016/j.entcs.2014.01.024 – volume: 8 start-page: 4723 issue: 6 year: 2021 ident: 7697_CR2 publication-title: IEEE Internet Things J doi: 10.1109/JIOT.2020.3028742 – volume: 78 start-page: 1464 issue: 9 year: 1990 ident: 7697_CR27 publication-title: Proc IEEE doi: 10.1109/5.58325 – ident: 7697_CR51 doi: 10.1109/TITS.2021.3106825 – ident: 7697_CR6 doi: 10.1109/IEMENTech51367.2020.9270052 – volume: 38 start-page: 1769 issue: 11 year: 2017 ident: 7697_CR47 publication-title: J Harbin Eng Univer – volume: 11 start-page: 118 issue: 2 year: 2015 ident: 7697_CR17 publication-title: J Inf Priv Secur – year: 2022 ident: 7697_CR4 publication-title: IEEE Internet Things J doi: 10.1109/JIOT.2022.3203249 – ident: 7697_CR16 – ident: 7697_CR28 doi: 10.1201/9780367822750 – volume: 19 start-page: 161 issue: 1 year: 2022 ident: 7697_CR10 publication-title: IEEE Trans Dependable Secure Comput doi: 10.1109/TDSC.2020.2999866 – ident: 7697_CR12 – volume: 22 start-page: 1 issue: 2 year: 2021 ident: 7697_CR43 publication-title: ACM Trans Internet Technol (TOIT) doi: 10.1145/3426972 – ident: 7697_CR7 – volume: 8 start-page: 10989 year: 2020 ident: 7697_CR48 publication-title: IEEE Access doi: 10.1109/ACCESS.2020.2965184 – volume: 21 start-page: 1 issue: 1 year: 2020 ident: 7697_CR11 publication-title: BMC Genom doi: 10.1186/s12864-019-6413-7 – ident: 7697_CR26 – volume-title: Cross-site scripting attacks: classification, attack, and countermeasures year: 2020 ident: 7697_CR18 doi: 10.1201/9780429351327 – volume: 58 year: 2021 ident: 7697_CR31 publication-title: J Inf Secur Appl – ident: 7697_CR14 doi: 10.1145/2557547.2557550 – volume: 21 start-page: 2493 issue: 7 year: 2022 ident: 7697_CR39 publication-title: IEEE Trans Mob Comput doi: 10.1109/TMC.2020.3042925 – ident: 7697_CR34 – volume: 41 start-page: 897 issue: 3 year: 2016 ident: 7697_CR22 publication-title: Arab J Sci Eng doi: 10.1007/s13369-015-1891-7 – volume: 16 start-page: 1 year: 2020 ident: 7697_CR40 publication-title: Int J Semant Web Inf Syst (IJSWIS) doi: 10.4018/IJSWIS.2020100101 – ident: 7697_CR32 doi: 10.1109/ICC45855.2022.9838643 – ident: 7697_CR25 – volume: 8 start-page: 92687 year: 2020 ident: 7697_CR1 publication-title: IEEE Access doi: 10.1109/ACCESS.2020.2992820 – volume: 14 year: 2021 ident: 7697_CR24 publication-title: Internet Things doi: 10.1016/j.iot.2019.100129 – volume: 32 start-page: 85 issue: 4 year: 2020 ident: 7697_CR19 publication-title: J Organ End User Comput (JOEUC) doi: 10.4018/JOEUC.2020100105 – volume: 118 year: 2022 ident: 7697_CR8 publication-title: Comput Secur doi: 10.1016/j.cose.2022.102710 – ident: 7697_CR35 – ident: 7697_CR21 doi: 10.1145/2742854.2745719 – ident: 7697_CR9 doi: 10.4018/978-1-5225-0105-3.ch010 – ident: 7697_CR15 doi: 10.1145/3194452.3194469 – volume: 16 start-page: 20 issue: 3 year: 2020 ident: 7697_CR44 publication-title: Int J Semant Web Inf Syst (IJSWIS) doi: 10.4018/IJSWIS.2020070102 – volume: 192 year: 2021 ident: 7697_CR5 publication-title: Comput Netw doi: 10.1016/j.comnet.2021.108040 – volume: 12 start-page: 410 issue: 3 year: 2020 ident: 7697_CR46 publication-title: Symmetry doi: 10.3390/sym12030410 – ident: 7697_CR41 doi: 10.3390/s22186741 – volume: 166 year: 2020 ident: 7697_CR37 publication-title: Comput Netw doi: 10.1016/j.comnet.2019.106960 – volume: 7 start-page: 1 issue: 3 year: 2017 ident: 7697_CR20 publication-title: Int J Cloud Appl Comput (IJCAC) – volume: 5 start-page: 199 issue: 2 year: 1993 ident: 7697_CR23 publication-title: Knowl Acquis doi: 10.1006/knac.1993.1008 – volume: 18 start-page: 1 year: 2022 ident: 7697_CR33 publication-title: Int J Semant Web Inf Syst (IJSWIS) doi: 10.4018/IJSWIS.295551 – ident: 7697_CR29 doi: 10.1109/CRC51253.2020.9253484 – volume: 82 start-page: 261 year: 2019 ident: 7697_CR50 publication-title: Comput Secur doi: 10.1016/j.cose.2018.12.016 – ident: 7697_CR30 – volume: 64 start-page: 50 year: 2016 ident: 7697_CR3 publication-title: J Syst Architect doi: 10.1016/j.sysarc.2015.11.001 – volume: 18 start-page: 1 year: 2022 ident: 7697_CR42 publication-title: Int J Semant Web Inf Syst (IJSWIS) doi: 10.4018/IJSWIS.297143 – volume: 168 year: 2021 ident: 7697_CR45 publication-title: Expert Syst Appl doi: 10.1016/j.eswa.2020.114386 |
| SSID | ssj0021753 |
| Score | 2.3648682 |
| Snippet | Smart devices are equipped with technology that facilitates communication among devices connected via the Internet. These devices are shipped with a user... |
| SourceID | crossref springer |
| SourceType | Enrichment Source Index Database Publisher |
| StartPage | 4593 |
| SubjectTerms | Artificial Intelligence Computational Intelligence Control Data Analytics and Machine Learning Engineering Mathematical Logic and Foundations Mechatronics Robotics |
| Title | Adaptive cross-site scripting attack detection framework for smart devices security using intelligent filters and attack ontology |
| URI | https://link.springer.com/article/10.1007/s00500-022-07697-2 |
| Volume | 27 |
| WOSCitedRecordID | wos000895666600002&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVPQU databaseName: Advanced Technologies & Aerospace Database customDbUrl: eissn: 1433-7479 dateEnd: 20241214 omitProxy: false ssIdentifier: ssj0021753 issn: 1432-7643 databaseCode: P5Z dateStart: 20090101 isFulltext: true titleUrlDefault: https://search.proquest.com/hightechjournals providerName: ProQuest – providerCode: PRVPQU databaseName: Computer Science Database customDbUrl: eissn: 1433-7479 dateEnd: 20241214 omitProxy: false ssIdentifier: ssj0021753 issn: 1432-7643 databaseCode: K7- dateStart: 20090101 isFulltext: true titleUrlDefault: http://search.proquest.com/compscijour providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: eissn: 1433-7479 dateEnd: 20241214 omitProxy: false ssIdentifier: ssj0021753 issn: 1432-7643 databaseCode: BENPR dateStart: 20090101 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVAVX databaseName: SpringerLINK Contemporary 1997-Present customDbUrl: eissn: 1433-7479 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0021753 issn: 1432-7643 databaseCode: RSV dateStart: 19970401 isFulltext: true titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22 providerName: Springer Nature |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LSwMxEB60etCD1apYHyUHbxrYZ7M5FrEIShF80NuSZynqWrqrd_-5SZpdLEhBT3vYbDZkJvPIzHwDcJ4qlQpJEqziPscJ4wFmQZbgOO1LoQhNmXSUviOjUTYe03tfFFbW2e51SNJJ6qbYzUKVBNhmnxvfmxJsBO9GatFmrI_-8Ny4WR570hgCxnY0CteXyvw-x7I6Wo6FOhUzbP9vcbuw401KNFjwwB6sqaID7bpdA_KntwPbP7AH9-FrINnMyjrkVoZtFBl5GVJMEKsqJl6QVJXL1SqQrrO4kDFzUflmWM68dXIGlb4JHrJZ9BM0bWA-K6SnNhxfIlbIek6LmGDv8g_gaXj9eHWDfT8GLCIaVthG6KTgUSzTRIdak0RxQVkgIqK1lLayzQKipYrSiBnPUhHWD5mSigrCYqnjQ2gV74U6AhRLLjNClGTcGkA8i7RIKQ_Ng5OAqC6ENVly4cHKbc-M17yBWXY7nptf5m7H86gLF803swVUx8rRlzUlc39syxXDj_82_AS2bF_6RYrPKbSq-Yc6g03xWU3LeQ_WbwnuOa79BtJ_6Tc |
| linkProvider | Springer Nature |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LSwMxEB6kCurB-sT6zMGbBvbZNMciFsVaBKv0tuRZirqW7urdf26SZhcLIuhpD5vNhsxkHpmZbwDOUqVSIUmCVdzmOGE8wCzoJDhO21IoQlMmHaX7ZDDojEb03heFFVW2exWSdJK6LnazUCUBttnnxvemBBvBu5zYNjvWR394qt0sjz1pDAFjOxqF60tlfp5jUR0txkKdiuk1_7e4TdjwJiXqznlgC5ZUvg3Nql0D8qd3G9a_YQ_uwGdXsqmVdcitDNsoMvIyJB8jVpZMPCOpSperlSNdZXEhY-ai4tWwnHnr5AwqfBM8ZLPox2hSw3yWSE9sOL5ALJfVnBYxwd7l78Jj72p4eY19PwYsIhqW2EbopOBRLNNEh1qTRHFBWSAiorWUtrLNAqKlitKIGc9SEdYOmZKKCsJiqeM9aORvudoHFEsuO4Qoybg1gHgn0iKlPDQPTgKiWhBWZMmEByu3PTNeshpm2e14Zn6ZuR3Pohac199M51Adv46-qCiZ-WNb_DL84G_DT2H1enjXz_o3g9tDWLM96ufpPkfQKGfv6hhWxEc5KWYnjne_AEyU60s |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LSwMxEA5SRfRgtSrWZw7eNHSfzeZY1KJYSvFFb0uepahr6a7e_ecmaXZpQQriaQ-bzYZMMpnJfPMNAOexlDEXOEIybDMUUeYh6iURCuO24BKTmAor6R7u95PhkAzmsvgt2r0MSc5yGgxLU1a0JkK1qsQ3Q1viIYNE1344wUgr4dVIezIG1PXw-FK5XI6HUhsF2o7Uh69Lm_m9j8WjaTEuao-bbv3_A90GW87UhJ3Z2tgBKzJrgHpZxgG6Xd0Am3OchLvguyPoxOhAaEeJTHQZOt2SjSAtCspfoZCFxXBlUJXoLqjNX5i_66Wo31r9A3NXHA8adP0Ijiv6zwKqsQnT55BmouzTMCmYO_498Ny9ebq6Ra5OA-IB8QtkIneCsyAUcaR8pXAkGSfU4wFWSgiT8WaI0mJJSEC1xykxbftUCkk4pqFQ4T6oZR-ZPAAwFEwkGEtBmTGMWBIoHhPm6wfDHpZN4JciSrkjMTe1NN7Sin7Zzniqf5naGU-DJriovpnMKDyWtr4spZq67ZwvaX74t-ZnYH1w3U17d_37I7BhStfPUEDHoFZMP-UJWONfxTifntpl_AN-bPQv |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Adaptive+cross-site+scripting+attack+detection+framework+for+smart+devices+security+using+intelligent+filters+and+attack+ontology&rft.jtitle=Soft+computing+%28Berlin%2C+Germany%29&rft.au=Chaudhary%2C+Pooja&rft.au=Gupta%2C+B.+B.&rft.au=Singh%2C+A.+K.&rft.date=2023-04-01&rft.issn=1432-7643&rft.eissn=1433-7479&rft.volume=27&rft.issue=8&rft.spage=4593&rft.epage=4608&rft_id=info:doi/10.1007%2Fs00500-022-07697-2&rft.externalDBID=n%2Fa&rft.externalDocID=10_1007_s00500_022_07697_2 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1432-7643&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1432-7643&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1432-7643&client=summon |