Cross-site scripting attacks: classification, attack, and countermeasures
Social network usage has increased exponentially in recent years. Platforms like Facebook, Twitter, Google+, LinkedIn and Instagram, not only facilitate sharing of personal data but also connect people professionally. However, development of these platforms with more enhanced features like HTML5, CS...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Boca Raton ; London ; New York
CRC Press
2020
|
Ausgabe: | First edition |
Schriftenreihe: | Security, privacy, and trust in mobile communications
|
Schlagworte: | |
Online-Zugang: | BTW01 TUM01 Taylor & Francis http://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9781000049800 EBSCOhost |
Zusammenfassung: | Social network usage has increased exponentially in recent years. Platforms like Facebook, Twitter, Google+, LinkedIn and Instagram, not only facilitate sharing of personal data but also connect people professionally. However, development of these platforms with more enhanced features like HTML5, CSS, XHTML and Java Script expose these sites to various vulnerabilities that may be the root cause of various threats. Therefore, social networking sites have become an attack surface for various cyber-attacks such as XSS attack and SQL Injection. Numerous defensive techniques have been proposed, yet with technology up-gradation current scenarios demand for more efficient and robust solutions. Cross-Site Scripting Attacks: Classification, Attack, and Countermeasures is a comprehensive source which provides an overview of web-based vulnerabilities and explores XSS attack in detail. This book provides a detailed overview of the XSS attack; its classification, recent incidences on various web applications, and impacts of the XSS attack on the target victim. This book addresses the main contributions of various researchers in XSS domain. It provides in-depth analysis of these methods along with their comparative study. The main focus is a novel framework which is based on Clustering and Context based sanitization approach to protect against XSS attack on social network. The implementation details conclude that it is an effective technique to thwart XSS attack. The open challenges and future research direction discussed in this book will help further to the academic researchers and industry specific persons in the domain of security |
Beschreibung: | 1 Online-Ressource |
ISBN: | 9781000049862 1000049868 9781000049800 1000049809 9781000049831 1000049833 0429351321 9780429351327 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV046680725 | ||
003 | DE-604 | ||
005 | 20201105 | ||
007 | cr|uuu---uuuuu | ||
008 | 200421s2020 |||| o||u| ||||||eng d | ||
020 | |a 9781000049862 |9 9781000049862 | ||
020 | |a 1000049868 |9 1000049868 | ||
020 | |a 9781000049800 |9 9781000049800 | ||
020 | |a 1000049809 |9 1000049809 | ||
020 | |a 9781000049831 |9 9781000049831 | ||
020 | |a 1000049833 |9 1000049833 | ||
020 | |a 0429351321 |9 0429351321 | ||
020 | |a 9780429351327 |c Online |9 978-0-429-35132-7 | ||
024 | 7 | |a 10.1201/9780429351327 |2 doi | |
035 | |a (OCoLC)1154005023 | ||
035 | |a (DE-599)BVBBV046680725 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91G |a DE-526 | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a DAT 461f |2 stub | ||
084 | |a DAT 055f |2 stub | ||
100 | 1 | |a Gupta, B. B. |d 1982- |e Verfasser |4 aut | |
245 | 1 | 0 | |a Cross-site scripting attacks |b classification, attack, and countermeasures |c B.B. Gupta and Pooja Chaudhary |
250 | |a First edition | ||
264 | 1 | |a Boca Raton ; London ; New York |b CRC Press |c 2020 | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Security, privacy, and trust in mobile communications | |
520 | 3 | |a Social network usage has increased exponentially in recent years. Platforms like Facebook, Twitter, Google+, LinkedIn and Instagram, not only facilitate sharing of personal data but also connect people professionally. However, development of these platforms with more enhanced features like HTML5, CSS, XHTML and Java Script expose these sites to various vulnerabilities that may be the root cause of various threats. Therefore, social networking sites have become an attack surface for various cyber-attacks such as XSS attack and SQL Injection. Numerous defensive techniques have been proposed, yet with technology up-gradation current scenarios demand for more efficient and robust solutions. Cross-Site Scripting Attacks: Classification, Attack, and Countermeasures is a comprehensive source which provides an overview of web-based vulnerabilities and explores XSS attack in detail. This book provides a detailed overview of the XSS attack; its classification, recent incidences on various web applications, and impacts of the XSS attack on the target victim. This book addresses the main contributions of various researchers in XSS domain. It provides in-depth analysis of these methods along with their comparative study. The main focus is a novel framework which is based on Clustering and Context based sanitization approach to protect against XSS attack on social network. The implementation details conclude that it is an effective technique to thwart XSS attack. The open challenges and future research direction discussed in this book will help further to the academic researchers and industry specific persons in the domain of security | |
653 | 0 | |a World Wide Web / Security measures | |
653 | 0 | |a Web sites / Security measures | |
653 | 0 | |a COMPUTERS / Internet / Security | |
653 | 0 | |a COMPUTERS / Security / General | |
653 | 0 | |a COMPUTERS / Programming / Software Development | |
653 | 0 | |a Web sites / Security measures | |
653 | 0 | |a World Wide Web / Security measures | |
653 | 6 | |a Electronic books | |
700 | 1 | |a Chaudhary, Pooja |e Sonstige |0 (DE-588)1150169583 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781000049862 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Hardcover |z 978-0-36736-770-1 |
856 | 4 | 0 | |u https://www.taylorfrancis.com/books/9780429351327 |3 Taylor & Francis |
856 | 4 | 0 | |u http://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9781000049800 |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=2388138 |3 EBSCOhost |
912 | |a ZDB-7-TFC |a ebook | ||
940 | 1 | |q BTW_TF_KAUF | |
999 | |a oai:aleph.bib-bvb.de:BVB01-032091550 | ||
966 | e | |u https://doi.org/10.1201/9780429351327 |l BTW01 |p ebook |q BTW_TF_KAUF |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1201/9780429351327 |l TUM01 |p ZDB-7-TFC |q TUM_Einzelkauf |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804181402473725952 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Gupta, B. B. 1982- |
author_GND | (DE-588)1150169583 |
author_facet | Gupta, B. B. 1982- |
author_role | aut |
author_sort | Gupta, B. B. 1982- |
author_variant | b b g bb bbg |
building | Verbundindex |
bvnumber | BV046680725 |
classification_rvk | ST 277 |
classification_tum | DAT 461f DAT 055f |
collection | ZDB-7-TFC ebook |
ctrlnum | (OCoLC)1154005023 (DE-599)BVBBV046680725 |
discipline | Informatik |
discipline_str_mv | Informatik |
edition | First edition |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04174nmm a2200637 c 4500</leader><controlfield tag="001">BV046680725</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20201105 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">200421s2020 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781000049862</subfield><subfield code="9">9781000049862</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1000049868</subfield><subfield code="9">1000049868</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781000049800</subfield><subfield code="9">9781000049800</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1000049809</subfield><subfield code="9">1000049809</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781000049831</subfield><subfield code="9">9781000049831</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1000049833</subfield><subfield code="9">1000049833</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0429351321</subfield><subfield code="9">0429351321</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780429351327</subfield><subfield code="c">Online</subfield><subfield code="9">978-0-429-35132-7</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1201/9780429351327</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1154005023</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046680725</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91G</subfield><subfield code="a">DE-526</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 055f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Gupta, B. B.</subfield><subfield code="d">1982-</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cross-site scripting attacks</subfield><subfield code="b">classification, attack, and countermeasures</subfield><subfield code="c">B.B. Gupta and Pooja Chaudhary</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton ; London ; New York</subfield><subfield code="b">CRC Press</subfield><subfield code="c">2020</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Security, privacy, and trust in mobile communications</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">Social network usage has increased exponentially in recent years. Platforms like Facebook, Twitter, Google+, LinkedIn and Instagram, not only facilitate sharing of personal data but also connect people professionally. However, development of these platforms with more enhanced features like HTML5, CSS, XHTML and Java Script expose these sites to various vulnerabilities that may be the root cause of various threats. Therefore, social networking sites have become an attack surface for various cyber-attacks such as XSS attack and SQL Injection. Numerous defensive techniques have been proposed, yet with technology up-gradation current scenarios demand for more efficient and robust solutions. Cross-Site Scripting Attacks: Classification, Attack, and Countermeasures is a comprehensive source which provides an overview of web-based vulnerabilities and explores XSS attack in detail. This book provides a detailed overview of the XSS attack; its classification, recent incidences on various web applications, and impacts of the XSS attack on the target victim. This book addresses the main contributions of various researchers in XSS domain. It provides in-depth analysis of these methods along with their comparative study. The main focus is a novel framework which is based on Clustering and Context based sanitization approach to protect against XSS attack on social network. The implementation details conclude that it is an effective technique to thwart XSS attack. The open challenges and future research direction discussed in this book will help further to the academic researchers and industry specific persons in the domain of security</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">World Wide Web / Security measures</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Web sites / Security measures</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">COMPUTERS / Internet / Security</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">COMPUTERS / Security / General</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">COMPUTERS / Programming / Software Development</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Web sites / Security measures</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">World Wide Web / Security measures</subfield></datafield><datafield tag="653" ind1=" " ind2="6"><subfield code="a">Electronic books</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chaudhary, Pooja</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1150169583</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781000049862</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Hardcover</subfield><subfield code="z">978-0-36736-770-1</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.taylorfrancis.com/books/9780429351327</subfield><subfield code="3">Taylor & Francis</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9781000049800</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=2388138</subfield><subfield code="3">EBSCOhost</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-7-TFC</subfield><subfield code="a">ebook</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">BTW_TF_KAUF</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032091550</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1201/9780429351327</subfield><subfield code="l">BTW01</subfield><subfield code="p">ebook</subfield><subfield code="q">BTW_TF_KAUF</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1201/9780429351327</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-7-TFC</subfield><subfield code="q">TUM_Einzelkauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046680725 |
illustrated | Not Illustrated |
index_date | 2024-07-03T14:23:58Z |
indexdate | 2024-07-10T08:51:05Z |
institution | BVB |
isbn | 9781000049862 1000049868 9781000049800 1000049809 9781000049831 1000049833 0429351321 9780429351327 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032091550 |
oclc_num | 1154005023 |
open_access_boolean | |
owner | DE-91G DE-BY-TUM DE-526 |
owner_facet | DE-91G DE-BY-TUM DE-526 |
physical | 1 Online-Ressource |
psigel | ZDB-7-TFC ebook BTW_TF_KAUF ebook BTW_TF_KAUF ZDB-7-TFC TUM_Einzelkauf |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | CRC Press |
record_format | marc |
series2 | Security, privacy, and trust in mobile communications |
spelling | Gupta, B. B. 1982- Verfasser aut Cross-site scripting attacks classification, attack, and countermeasures B.B. Gupta and Pooja Chaudhary First edition Boca Raton ; London ; New York CRC Press 2020 1 Online-Ressource txt rdacontent c rdamedia cr rdacarrier Security, privacy, and trust in mobile communications Social network usage has increased exponentially in recent years. Platforms like Facebook, Twitter, Google+, LinkedIn and Instagram, not only facilitate sharing of personal data but also connect people professionally. However, development of these platforms with more enhanced features like HTML5, CSS, XHTML and Java Script expose these sites to various vulnerabilities that may be the root cause of various threats. Therefore, social networking sites have become an attack surface for various cyber-attacks such as XSS attack and SQL Injection. Numerous defensive techniques have been proposed, yet with technology up-gradation current scenarios demand for more efficient and robust solutions. Cross-Site Scripting Attacks: Classification, Attack, and Countermeasures is a comprehensive source which provides an overview of web-based vulnerabilities and explores XSS attack in detail. This book provides a detailed overview of the XSS attack; its classification, recent incidences on various web applications, and impacts of the XSS attack on the target victim. This book addresses the main contributions of various researchers in XSS domain. It provides in-depth analysis of these methods along with their comparative study. The main focus is a novel framework which is based on Clustering and Context based sanitization approach to protect against XSS attack on social network. The implementation details conclude that it is an effective technique to thwart XSS attack. The open challenges and future research direction discussed in this book will help further to the academic researchers and industry specific persons in the domain of security World Wide Web / Security measures Web sites / Security measures COMPUTERS / Internet / Security COMPUTERS / Security / General COMPUTERS / Programming / Software Development Electronic books Chaudhary, Pooja Sonstige (DE-588)1150169583 oth Erscheint auch als Druck-Ausgabe 9781000049862 Erscheint auch als Druck-Ausgabe, Hardcover 978-0-36736-770-1 https://www.taylorfrancis.com/books/9780429351327 Taylor & Francis http://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9781000049800 http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=2388138 EBSCOhost |
spellingShingle | Gupta, B. B. 1982- Cross-site scripting attacks classification, attack, and countermeasures |
title | Cross-site scripting attacks classification, attack, and countermeasures |
title_auth | Cross-site scripting attacks classification, attack, and countermeasures |
title_exact_search | Cross-site scripting attacks classification, attack, and countermeasures |
title_exact_search_txtP | Cross-site scripting attacks classification, attack, and countermeasures |
title_full | Cross-site scripting attacks classification, attack, and countermeasures B.B. Gupta and Pooja Chaudhary |
title_fullStr | Cross-site scripting attacks classification, attack, and countermeasures B.B. Gupta and Pooja Chaudhary |
title_full_unstemmed | Cross-site scripting attacks classification, attack, and countermeasures B.B. Gupta and Pooja Chaudhary |
title_short | Cross-site scripting attacks |
title_sort | cross site scripting attacks classification attack and countermeasures |
title_sub | classification, attack, and countermeasures |
url | https://www.taylorfrancis.com/books/9780429351327 http://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9781000049800 http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=2388138 |
work_keys_str_mv | AT guptabb crosssitescriptingattacksclassificationattackandcountermeasures AT chaudharypooja crosssitescriptingattacksclassificationattackandcountermeasures |