Malicious XSS Code Detection with Decision Tree

被引:2
|
作者
Kasim, Omer [1 ]
机构
[1] Dumlupinar Univ, Simav Technol Fac, Elect & Elect Engn, Kutahya, Turkey
来源
关键词
Security vulnerability; XSS attacks; feature extraction; decision tree;
D O I
10.2339/politeknik.470332
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Dynamic applications such as e-commerce, blogs, forums, e-governance, e-banking and portals that are in these platforms have become a part of our lives. However, a tremendous increase in the use of dynamic web and mobile applications has resulted in security vulnerabilities originating from the Hypertext Markup Language (HTML) coding system. Site-to-site Script Execution (XSS) attack is the largest contributors to security exploits. There are different models according to the dynamic content that XSS attacks use. The interest of the study is composed of attacks on visual content with the "img" tag. In study, an algorithm has been developed to detect XSS attacks with the decision tree which is motivated by the fact that they tend to be easier to implement and interpret than other quantitative data-driven methods. The algorithm that successfully classifies 392 of 400 malicious and clean codes in the data set with 8 different features. This result contributes to the use of secure internet without XSS attacks that use visual content..
引用
收藏
页码:67 / 72
页数:6
相关论文
共 50 条
  • [1] Malicious Domain Detection Based on Decision Tree
    Thein, Thin Tharaphe
    Shiraishi, Yoshiaki
    Morii, Masakatu
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2023, E106D (09) : 1490 - 1494
  • [2] Malicious Code Detection Using Opcode Running Tree Representation
    Ding Yuxin
    Dai Wei
    Zhang Yibin
    Xue Chenglong
    [J]. 2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2014, : 616 - 621
  • [3] Malicious Code Utilization Chain Detection Scheme based on Abstract Syntax Tree
    Si, Guanlin
    Zhang, Yue
    Li, Min
    Jing, Sen
    [J]. 2022 IEEE 6TH ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC), 2022, : 1108 - 1111
  • [4] Malicious URLs Detection Using Decision Tree Classifiers and Majority Voting Technique
    Patil, Dharmaraj R.
    Patil, J. B.
    [J]. CYBERNETICS AND INFORMATION TECHNOLOGIES, 2018, 18 (01) : 11 - 29
  • [5] An Improved Malicious Behaviour Detection Via k-Means and Decision Tree
    Yassin, Warusia
    Rahayu, Siti
    Abdollah, Faizal
    Zin, Hazlin
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (12) : 206 - 212
  • [6] Malicious Code Detection Based on Code Semantic Features
    Zhang, Yu
    Li, Binglong
    [J]. IEEE ACCESS, 2020, 8 : 176728 - 176737
  • [7] Detection of malicious code in user mode
    Sangeetha, R.
    [J]. 2013 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2013, : 146 - 149
  • [8] Malicious code detection for open firmware
    Adelstein, F
    Stillerman, M
    Kozen, D
    [J]. 18TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2002, : 403 - 412
  • [9] An improved malicious code intrusion detection method based on target tree for space information network
    She, Chundong
    Ma, Yaqi
    Wang, Jingchao
    Jia, Luting
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2017, 13 (12):
  • [10] Detection technology of malicious code based on semantic
    Lu, Qingmei
    Wang, Yulin
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (19) : 19543 - 19555