dc.contributor.author |
Gupta, Shashank |
|
dc.date.accessioned |
2024-10-29T09:48:04Z |
|
dc.date.available |
2024-10-29T09:48:04Z |
|
dc.date.issued |
2020 |
|
dc.identifier.uri |
https://www.inderscienceonline.com/doi/abs/10.1504/IJICS.2020.105153 |
|
dc.identifier.uri |
http://dspace.bits-pilani.ac.in:8080/jspui/handle/123456789/16279 |
|
dc.description.abstract |
This article presents an enhanced JavaScript feature-injection based framework that obstructs the execution of cross-site scripting (XSS) worms from the virtual machines of cloud-based online social network (OSN). It calculates the features of clustered-sanitised compressed templates of JavaScript attack vectors embedded in the HTTP response messages. Any variation observed in such JavaScript feature set indicates the injection of XSS worms on the cloud-based OSN server. The injected worms will further undergo through the process of nested context-aware sanitisation for its safe interpretation on the web browser. The prototype of our framework was developed in Java and installed in the virtual machines of cloud environment. The experimental evaluation of our framework was performed on the platform of OSN-based web applications deployed in the cloud platform. The performance analysis done revealed that our framework detects the injection of malicious JavaScript code with low false negative rate and acceptable performance overhead. |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
Inder Science |
en_US |
dc.subject |
Computer Science |
en_US |
dc.subject |
Cloud security |
en_US |
dc.subject |
Online social networking security |
en_US |
dc.subject |
XSS worms |
en_US |
dc.subject |
JavaScript code injection attacks |
en_US |
dc.subject |
Context-aware sanitisation |
en_US |
dc.title |
Nested context-aware sanitisation and feature injection in clustered templates of JavaScript worms on the cloud-based OSN |
en_US |
dc.type |
Article |
en_US |