期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Cross-Site Scripting Attacks and Defensive Techniques: A Comprehensive Survey* 被引量:1
1
作者 Sonkarlay J. Y. Weamie 《International Journal of Communications, Network and System Sciences》 2022年第8期126-148,共23页
The advancement of technology and the digitization of organizational functions and services have propelled the world into a new era of computing capability and sophistication. The proliferation and usability of such c... The advancement of technology and the digitization of organizational functions and services have propelled the world into a new era of computing capability and sophistication. The proliferation and usability of such complex technological services raise several security concerns. One of the most critical concerns is cross-site scripting (XSS) attacks. This paper has concentrated on revealing and comprehensively analyzing XSS injection attacks, detection, and prevention concisely and accurately. I have done a thorough study and reviewed several research papers and publications with a specific focus on the researchers’ defensive techniques for preventing XSS attacks and subdivided them into five categories: machine learning techniques, server-side techniques, client-side techniques, proxy-based techniques, and combined approaches. The majority of existing cutting-edge XSS defensive approaches carefully analyzed in this paper offer protection against the traditional XSS attacks, such as stored and reflected XSS. There is currently no reliable solution to provide adequate protection against the newly discovered XSS attack known as DOM-based and mutation-based XSS attacks. After reading all of the proposed models and identifying their drawbacks, I recommend a combination of static, dynamic, and code auditing in conjunction with secure coding and continuous user awareness campaigns about XSS emerging attacks. 展开更多
关键词 XSS Attacks defensive techniques VULNERABILITIES Web Application Security
在线阅读 下载PDF
Security Safety Call for Papers
2
《Security and Safety》 2025年第1期107-110,共4页
Special issue on Security and Safety in Network Simulation and Evaluation Background Cyberspace technology has already penetrated various areas such as science,economy,politics as well as defense and military.Cyberspa... Special issue on Security and Safety in Network Simulation and Evaluation Background Cyberspace technology has already penetrated various areas such as science,economy,politics as well as defense and military.Cyberspace has now become one of the most important areas which draws attention from both academics,professionals,and industrial communities.With the emergence of new technologies and applications in cyberspace,cyberspace security has been also facing great challenges.On the one hand,new technologies emerged with the prevalence of data science and artificial intelligence can largely advance and exceed the traditional security technologies,which largely improve the security defense capability of cyberspace.On the other hand,the malicious usage of new technologies,or exploiting the defects in new technologies and new applications have further exacerbated the security threat of cyberspace.To better handle the security risks caused by the new technologies and new applications and develop effective approaches and techniques for defending such potential security concerns,the network simulation technology can realize the security evaluation of these technologies by simulating in a controllable network environment,which has significant research value and great social benefit. 展开更多
关键词 cyberspace technology security threats data science defense techniques new technologies network simulation artificial intelligence cyberspace security
原文传递
A survey on membership inference attacks and defenses in machine learning 被引量:2
3
作者 Jun Niu Peng Liu +7 位作者 Xiaoyan Zhu Kuo Shen Yuecong Wang Haotian Chi Yulong Shen Xiaohong Jiang Jianfeng Ma Yuqing Zhang 《Journal of Information and Intelligence》 2024年第5期404-454,共51页
Membership inference(MI)attacks mainly aim to infer whether a data record was used to train a target model or not.Due to the serious privacy risks,MI attacks have been attracting a tremendous amount of attention in th... Membership inference(MI)attacks mainly aim to infer whether a data record was used to train a target model or not.Due to the serious privacy risks,MI attacks have been attracting a tremendous amount of attention in the research community.One existing work conducted-to our best knowledge the first dedicated survey study in this specific area:The survey provides a comprehensive review of the literature during the period of 2017~2021(e.g.,over 100 papers).However,due to the tremendous amount of progress(i.e.,176 papers)made in this area since 2021,the survey conducted by the one existing work has unfortunately already become very limited in the following two aspects:(1)Although the entire literature from 2017~2021 covers 18 ways to categorize(all the proposed)MI attacks,the literature during the period of 2017~2021,which was reviewed in the one existing work,only covered 5 ways to categorize MI attacks.With 13 ways missing,the survey conducted by the one existing work only covers 27%of the landscape(in terms of how to categorize MI attacks)if a retrospective view is taken.(2)Since the literature during the period of 2017~2021 only covers 27%of the landscape(in terms of how to categorize),the number of new insights(i.e.,why an MI attack could succeed)behind all the proposed MI attacks has been significantly increasing since year 2021.As a result,although none of the previous work has made the insights as a main focus of their studies,we found that the various insights leveraged in the literature can be broken down into 10 groups.Without making the insights as a main focus,a survey study could fail to help researchers gain adequate intellectual depth in this area of research.In this work,we conduct a systematic study to address these limitations.In particular,in order to address the first limitation,we make the 13 newly emerged ways to categorize MI attacks as a main focus on the study.In order to address the second limitation,we provide-to our best knowledge-the first review of the various insights leveraged in the entire literature.We found that the various insights leveraged in the literature can be broken down into 10 groups.Moreover,our survey also provides a comprehensive review of the existing defenses against MI attacks,the existing applications of MI attacks,the widely used datasets(e.g.,107 new datasets),and the eva luation metrics(e.g.,20 new evaluation metrics). 展开更多
关键词 Machine learning Privacy and security Membership inference attacks defensive techniques
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部