Mining Techniques of XSS Vulnerabilities Based on Web Crawler

Article Preview

Abstract:

With the development of society and the progress of technology, the Internet has become an important tool for human to access information. The Internet brings information to the society and greatly facilitates information sharing, but it also brings a lot of security risks. The proportion of cross-site scripting attacks topped the list of web vulnerabilities, so this paper proposes the technology which is called mining techniques of XSS vulnerabilities based on web crawler. It includes web crawler module, code injection module and vulnerability detection module. The experiment results indicate that it has better detection.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

6290-6293

Citation:

Online since:

May 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Xu Siyuan, Zhen Tao, Server - client collaboration to defense cross-site scripting attack, J. Computer Engineering, 37(2011), pp.154-156.

Google Scholar

[2] Zhao Yan, Dynamic detection technology for cross-site scripting vulnerability based on web crawler, M. Southwest Jiaotong University(2011).

Google Scholar

[3] Jin Mei, Research and implementation of web crawler performance and functionality expansion, M. JiLin University(2012).

Google Scholar

[4] Shen Shoutao, Zhang Yuqing, Design and implementation of XSS vulnerability detection tools based on crawler, J. Computer Engineering, 35(2009), pp.151-154.

Google Scholar

[5] Li Xiaoming, Feng Wangshen, Two good effects hash function for URL, J. Journal of Software, 115(2004), pp.179-184.

Google Scholar

[6] Wu Zijing, Zhang Xianzhong, Guan Lei, Hu Guangjun, Mining technology of XSS vulnerabilities based on anti-filtering rule sets and automatic crawlers, J. Journal of Beijing Institute of Technology, 32(2011), pp.395-401.

Google Scholar

[7] OWASP. OWASP Testing Project [EB/OL]. (2008-08-10). http: /www. owasp. org.

Google Scholar

[8] Zhang Yizhi, Zhao Yi, Tang Xiaobin, Research for MD5 Algorithm, J. Computer Science, 38(2008), pp.295-297.

Google Scholar