首页> 外文期刊>International Journal of Innovative Computing and Applications >RAJIVE: restricting the abuse of JavaScript injection vulnerabilities on cloud data centre by sensing the violation in expected workflow of web applications
【24h】

RAJIVE: restricting the abuse of JavaScript injection vulnerabilities on cloud data centre by sensing the violation in expected workflow of web applications

机译:Rajive:通过在Web应用程序的预期工作流程中感测违规行为来限制云数据中心上的JavaScript注入漏洞

获取原文
获取原文并翻译 | 示例
           

摘要

This article introduces a novel defensive framework that detects and obstructs the exploitation of malicious JavaScript (JS) injection by spotting the violation in the expected workflow of web applications deployed on the cloud data centres. The framework initially generates some categories of axioms by examining the strings of HTTP request and response. Likewise, it detects the deviation in the intended workflow of web application by examining the violation in such generated axioms. The prototype of our work was developed in Java development framework and installed on the virtual machines of cloud data centres located at the core of network. Susceptible web applications were utilised for evaluating the workflow violation detection capability in order to obstruct the execution of XSS worms on the cloud data centres. Evaluation result revealed that framework detects the injection of XSS worms with high precision rate and lesser rate of false positives and false negatives.
机译:本文介绍了一种新颖的防御框架,通过在云数据中心部署的Web应用程序的预期工作流程中发现违规来检测和阻止对恶意JavaScript(JS)注射的开发。 该框架通过检查HTTP请求的字符串和响应来最初地生成某些类别的公理。 同样,它通过检查这种产生的公理中的违规来检测Web应用程序的预期工作流程中的偏差。 我们工作的原型是在Java开发框架中开发的,并安装在位于网络核心的云数据中心的虚拟机上。 用于评估工作流违规检测能力的易感Web应用程序,以妨碍云数据中心的XSS蠕虫的执行。 评估结果表明,框架检测XSS蠕虫的注射,具有高精度率和较小的误报率和假底片。

著录项

相似文献

  • 外文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号