Cross-Site Scripting Attacks: Classification, Attack, and Countermeasures PDF

Cross-Site Scripting Attacks: Classification, Attack, and Countermeasures PDF

Name:
Cross-Site Scripting Attacks: Classification, Attack, and Countermeasures PDF

Published Date:
03/12/2020

Status:
[ Active ]

Description:

Publisher:
CRC Press Books

Document status:
Active

Format:
Electronic (PDF)

Delivery time:
10 minutes

Delivery time (for Russian version):
200 business days

SKU:

Choose Document Language:
$21.6
Need Help?
ISBN: 9781000049800

Social network usage has increased exponentially in recent years. Platforms like Facebook, Twitter, Google+, LinkedIn and Instagram, not only facilitate sharing of personal data but also connect people professionally. However, development of these platforms with more enhanced features like HTML5, CSS, XHTML and Java Script expose these sites to various vulnerabilities that may be the root cause of various threats. Therefore, social networking sites have become an attack surface for various cyber-attacks such as XSS attack and SQL Injection. Numerous defensive techniques have been proposed, yet with technology up-gradation current scenarios demand for more efficient and robust solutions.

Cross-Site Scripting Attacks: Classification, Attack, and Countermeasures is a comprehensive source which provides an overview of web-based vulnerabilities and explores XSS attack in detail. This book provides a detailed overview of the XSS attack; its classification, recent incidences on various web applications, and impacts of the XSS attack on the target victim. This book addresses the main contributions of various researchers in XSS domain. It provides in-depth analysis of these methods along with their comparative study. The main focus is a novel framework which is based on Clustering and Context based sanitization approach to protect against XSS attack on social network. The implementation details conclude that it is an effective technique to thwart XSS attack. The open challenges and future research direction discussed in this book will help further to the academic researchers and industry specific persons in the domain of security.

Authors: B. B. Gupta, Pooja Chaudhary

 


Edition : 1
Number of Pages : 171
Published : 03/12/2020
isbn : 9781000049800

History


Related products


Best-Selling Products

SN-ISO/IEC TR 19788-11:2017
Published Date: 11/01/2017
Information technology — Learning, education and training — Metadata for learning resources — Part 11: Migration from LOM to MLR
SN-ISO/IEC TR 20000-10:2013
Published Date: 05/27/2014
Information technology — Service management — Part 10: Concepts and terminology
SN-ISO/IEC TR 20000-10:2015
Published Date: 02/01/2016
Information technology — Service management — Part 10: Concepts and terminology
SN-ISO/IEC TR 20000-4:2010
Published Date: 05/27/2014
Information technology — Service management — Part 4: Process reference model
SN-ISO/IEC TR 20000-5:2013
Published Date: 05/27/2014
Information technology - Service management - Part 5: Exemplar implementation plan for ISO/IEC 20000-1
SN-ISO/IEC TR 20000-9:2015
Published Date: 03/01/2015
Information technology — Service management — Part 9: Guidance on the application of ISO/IEC 20000-1 to cloud services