𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Cross-Site Scripting Attacks: Classification, Attack, and Countermeasures (Security, Privacy, and Trust in Mobile Communications)

✍ Scribed by B. B. Gupta, Pooja Chaudhary


Publisher
Taylor & Francis Ltd
Year
2020
Tongue
English
Leaves
171
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Social network usage has increased exponentially in recent years. Platforms like Facebook, Twitter, Google+, LinkedIn and Instagram, not only facilitate sharing of personal data but also connect people professionally. However, development of these platforms with more enhanced features like HTML5, CSS, XHTML and Java Script expose these sites to various vulnerabilities that may be the root cause of various threats. Therefore, social networking sites have become an attack surface for various cyber-attacks such as XSS attack and SQL Injection. Numerous defensive techniques have been proposed, yet with technology up-gradation current scenarios demand for more efficient and robust solutions.


Cross-Site Scripting Attacks: Classification, Attack, and Countermeasures


is a comprehensive source which provides an overview of web-based vulnerabilities and explores XSS attack in detail. This book provides a detailed overview of the XSS attack; its classification, recent incidences on various web applications, and impacts of the XSS attack on the target victim. This book addresses the main contributions of various researchers in XSS domain. It provides in-depth analysis of these methods along with their comparative study. The main focus is a novel framework which is based on Clustering and Context based sanitization approach to protect against XSS attack on social network. The implementation details conclude that it is an effective technique to thwart XSS attack. The open challenges and future research direction discussed in this book will help further to the academic researchers and industry specific persons in the domain of security.

✦ Table of Contents


Cover
Half Title
Series Page
Title Page
Copyright Page
Dedication
Table of Contents


πŸ“œ SIMILAR VOLUMES


Cross-Site Scripting Attacks-Classificat
✍ B. B. Gupta (Author); Pooja Chaudhary (Author) πŸ“‚ Library πŸ“… 2020 πŸ› CRC Press

<p>Social network usage has increased exponentially in recent years. Platforms like Facebook, Twitter, Google+, LinkedIn and Instagram, not only facilitate sharing of personal data but also connect people professionally. However, development of these platforms with more enhanced features like HTML5,

Cross Site Scripting Attacks
✍ Jay Beale πŸ“‚ Library πŸ“… 2004 πŸ› Syngress 🌐 English

Cross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the vario

Cross Site Scripting Attacks: Xss Exploi
✍ Seth Fogie, Jeremiah Grossman, Robert Hansen, Anton Rager, πŸ“‚ Library πŸ“… 2007 🌐 English

Cross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the vario

XSS Attacks: Cross Site Scripting Exploi
✍ Seth Fogie, Jeremiah Grossman, Robert Hansen, Anton Rager, Petko D. Petkov πŸ“‚ Library πŸ“… 2007 πŸ› Syngress 🌐 English

A cross site scripting attack is a very specific type of attack on a web application. It is used by hackers to mimic real sites and fool people into providing personal data. <i>XSSΒ Attacks</i> starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with

XSS Attacks: Cross Site Scripting Exploi
✍ Seth Fogie, Jeremiah Grossman, Robert Hansen, Anton Rager, Petko D. Petkov πŸ“‚ Library πŸ“… 2007 πŸ› Syngress 🌐 English

A cross site scripting attack is a very specific type of attack on a web application. It is used by hackers to mimic real sites and fool people into providing personal data. <i>XSSΒ Attacks</i> starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with