Personal data filtering: a systematic literature review comparing the effectiveness of XSS attacks in web applications vs cookie stealing

G Rodríguez-Galán, J Torres - Annals of Telecommunications, 2024 - Springer
Cross-site scripting (XSS) attacks pose a significant threat to the security of web
applications, as they compromise personal information by stealing cookies. This study …

A novel system for detecting and preventing SQL injection and cross-site-script

P Tanakas, A Ilias, N Polemi - 2021 International Conference …, 2021 - ieeexplore.ieee.org
SQL Injection and Cross-Site Scripting are the two most common attacks in database-based
web applications. In this paper we propose a system to detect different types of SQL injection …

A Hybrid Machine Learning Model to Detect Reflected XSS Attack

B Buz, B Gülçiçek, Ş Bahtiyar - Balkan Journal of Electrical and …, 2021 - dergipark.org.tr
Since web technologies are getting more advanced with longer codes, the number of
vulnerabilities has increased considerably. Cross-site scripting (XSS) attacks are one of the …

BOOKIE: Cookie Theft through XSS Attacks and its Relationship with Personal Data Leakage: a Framework to Demonstrate it to University Students.

GE Rodríguez Galán - 2024 - bibdigital.epn.edu.ec
This doctoral thesis addresses web security, focusing on leaking personal data by stealing
cookies via XSS attacks. A comprehensive analysis between 2013 and 2023 revealed …

Análisis y optimización del proceso de validación de ataques de secuencia de comandos en sitios cruzados (XSS) empleando Burp Suite para evadir medidas de …

TN Bolivar, MSA Delgado, YAT Flores… - Revista Ibérica de …, 2021 - search.proquest.com
Palabras-clave: Secuencia de comandos en sitios cruzados (XSS), Burp Suite, Evasión de
seguridad Abstract: Currently Cross Site Scripting (XSS) attacks are one of the main threats …

Identifying XSS Attack using Combined Machine Learning Classifier.

HS Jayanna - Grenze International Journal of Engineering …, 2023 - search.ebscohost.com
In recent years the number of cyber-attacks is being increased rapidly. There are many
unique cyber-attacks emerging day by day that require more attention. One such attack is …