Cross-site scripting (XSS) attacks and mitigation: A survey

被引:73
作者
Rodriguez, German E. [1 ,2 ]
Torres, Jenny G. [1 ]
Flores, Pamela [1 ]
Benavides, Diego E. [1 ,2 ]
机构
[1] Escuela Politec Nacl, Fac Ingn Sistemas Ladron Guevara & Roca, Quito, Ecuador
[2] Univ Fuerzas Armadas ESPE, Dept Ciencias Comp, Latacunga, Ecuador
关键词
XSS; Cookies; DOM-XSS; DEFENSE; VULNERABILITIES; FRAMEWORK; INJECTION;
D O I
10.1016/j.comnet.2019.106960
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The results of the Cisco 2018 Annual Security Report show that all analyzed web applications have at least one vulnerability. It also shows that web attacks are becoming more frequent, specific and sophisticated. According to this report, 40% of all attack attempts lead to a method known as Cross-Site Scripting (XSS), which was the most widely used technique. According to the OWASP Top 10 - 2017 security risk, this type of attack is ranked No. 7, and it is noted that XSS is present in approximately two thirds of all web applications. This attack occurs when a malicious user uses a web application to execute or send malicious code on another user's computer. Also, Cross Site Scripting is a type of cyber attack by which vulnerabilities are searched in a web application to introduce a harmful script. This implies that user information can be affected by stealing cookies, phishing, or attacking a company's entire network. In this context, we have analyzed a total of 67 documents to collect information of the tools and methods that the scientific community has used to detect and mitigate these type of attack. It has been hypothesized that the trend in the proposal of traditional methods to mitigate XSS attacks is greater than the proposals that use some artificial intelligence technique. Our results show that the trend is increasing in the proposals that analyze the content of web pages (13.20%), as well as those that serve as a toolkit for web browsers (16.98%). Also, we have found that there is a low tendency in the use of artificial intelligence techniques to detect or mitigate this attack, using Web Classifiers (9.43%). (C) 2019 Elsevier B.V. All rights reserved.
引用
收藏
页数:23
相关论文
共 96 条
[61]  
OWASP, 2018, PROYECT OW SEG EMPR
[62]   Detecting DOM-Sourced Cross-Site Scripting in Browser Extensions [J].
Pan, Jinkun ;
Mao, Xiaoguang .
2017 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME), 2017, :24-34
[63]  
Pan JK, 2016, IEEE TRUST BIG, P208, DOI [10.1109/TrustCom.2016.0065, 10.1109/TrustCom.2016.64]
[64]  
PandaSecurity, 2018, EQ FUE CAS AISL PEL
[65]  
Pandurang RM, 2015, 2015 IEEE BOMBAY SECTION SYMPOSIUM (IBSS)
[66]  
Panja B, 2015, 2015 1ST CONFERENCE ON MOBILE AND SECURE SERVICES (MOBISECSERV), P29
[67]  
Parvez M, 2015, INT CONF INTERNET, P186, DOI 10.1109/ICITST.2015.7412085
[68]  
Pranathi K., 2018, 2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA), P1754, DOI 10.1109/ICECA.2018.8474765
[69]  
Rexha B, 2015, 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER GRAPHICS, VISION AND INFORMATION SECURITY (CGVIS), P61, DOI 10.1109/CGVIS.2015.7449894
[70]   ETSSDetector: a tool to automatically detect Cross-Site Scripting vulnerabilities [J].
Rocha, Thiago S. ;
Souto, Eduardo .
2014 IEEE 13TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA 2014), 2014, :306-309