skip to main content
research-article

Adaptive cross-site scripting attack detection framework for smart devices security using intelligent filters and attack ontology

Authors Info & Claims
Published:08 December 2022Publication History
Skip Abstract Section

Abstract

Abstract

Smart devices are equipped with technology that facilitates communication among devices connected via the Internet. These devices are shipped with a user interface that enables users to perform administrative activities using a web browser linked to the device’s server. Cross-site scripting (XSS) is the most prevalent web application vulnerability exploited by attackers to compromise smart devices. In this paper, the authors have designed a framework for shielding smart devices from XSS attacks. It is a machine learning-based attack detection framework which employs self-organizing-map (SOM) to classify XSS attack string. The input vector to the SOM is generated based on attack ontology and the changing behavior of the attack strings in different input fields in the device web interface. Additionally, it also sanitizes the injected attack string to neutralize the harmful effects of attack. The experimental results are obtained using the real-world dataset on the XSS attack. We tested the proposed framework on web interface of two smart devices (TP-link Wi-Fi router and HP color printer) containing hidden XSS vulnerabilities. The observed results unveil the robustness of the proposed work against the existing work as it achieves a high accuracy of 0.9904 on the tested dataset. It is a platform-independent attack detection system deployed on the browser or server side.

References

  1. Abd El-Latif AAAbd-El-Atty BVenegas-Andraca SEElwahsh HPiran MJBashir AKet al.Providing end-to-end security using quantum walks in IoT networksIEEE Access20208926879269610.1109/ACCESS.2020.2992820Google ScholarGoogle ScholarCross RefCross Ref
  2. Abdulrahman STout HMourad ATalhi CFedMCCS: multicriteria client selection model for optimal IoT federated learningIEEE Internet Things J2021864723473510.1109/JIOT.2020.3028742Google ScholarGoogle ScholarCross RefCross Ref
  3. Ahmed MAAli FMultiple-path testing for cross site scripting using genetic algorithmsJ Syst Architect201664506210.1016/j.sysarc.2015.11.001Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Arisdakessian SWahab OAMourad AOtrok HGuizani MA survey on IoT intrusion detection: federated learning, game theory, social psychology and explainable AI as future directionsIEEE Internet Things J202210.1109/JIOT.2022.3203249Google ScholarGoogle Scholar
  5. Babun LDenney KCelik ZBMcDaniel PUluagac ASA survey on IoT platforms: Communication, security, and privacy perspectivesComput Netw202119210.1016/j.comnet.2021.108040Google ScholarGoogle Scholar
  6. Banerjee R, Baksi A, Singh N, Bishnu SK (2020) Detection of XSS in web applications using Machine Learning Classifiers. In: 2020 4th international conference on electronics, materials engineering and nano-technology (IEMENTech). IEEE, pp 1–5Google ScholarGoogle Scholar
  7. Richardson L (2007) Beautiful soup documentation. Dosegljivo. https://www.crummy.com/software/BeautifulSoup/bs4/doc/. Accessed 7 Aug 2018Google ScholarGoogle Scholar
  8. Chaudhary PGupta BBSingh AKSecuring heterogeneous embedded devices against XSS attack in intelligent IoT systemComput Secur202211810.1016/j.cose.2022.102710Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Chaudhary P, Gupta S, Gupta BB (2016) Auditing defense against XSS worms in online social network-based web applications. In: Handbook of research on modern cryptographic solutions for computer and cyber security. IGI Global, pp 216–245Google ScholarGoogle Scholar
  10. Chehab MMourad ALP-SBA-XACML: lightweight semantics based scheme enabling intelligent behavior-aware privacy for IoTIEEE Trans Dependable Secure Comput202219116117510.1109/TDSC.2020.2999866Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Chicco DJurman GThe advantages of the Matthews correlation coefficient (MCC) over F1 score and accuracy in binary classification evaluationBMC Genom202021111310.1186/s12864-019-6413-7Google ScholarGoogle ScholarCross RefCross Ref
  12. Kaggle (2019) Cross-site scripting dataset. https://www.kaggle.com/syedsaqlainhussain/cross-site-scripting-xss-dataset-for-deep-learning. Accessed 2 Jan 2022Google ScholarGoogle Scholar
  13. DOMPurify 2.3.0 (2021) https://github.com/cure53/DOMPurify. Accessed 2 Jan 2022Google ScholarGoogle Scholar
  14. Duchene F, Rawat S, Richier JL, Groz R (2014) KameleonFuzz: evolutionary fuzzing for black-box XSS detection. In: Proceedings of the 4th ACM conference on data and application security and privacy, pp 37–48Google ScholarGoogle Scholar
  15. Fang Y, Li Y, Liu L, Huang C (2018). DeepXSS: cross site scripting detection based on deep learning. In Proceedings of the 2018 international conference on computing and artificial intelligence, pp 47–51Google ScholarGoogle Scholar
  16. Github, XSS Payload Dataset (2021) https://github.com/ismailtasdelen/xss-payload-list. Accessed 2 Jan 2022Google ScholarGoogle Scholar
  17. Gupta BBGupta SGangwar SKumar MMeena PKCross-site scripting (XSS) abuse and defense: exploitation on several testing bed environments and its defenseJ Inf Priv Secur2015112118136Google ScholarGoogle ScholarCross RefCross Ref
  18. Gupta BBChaudhary PCross-site scripting attacks: classification, attack, and countermeasures2020CRC Press10.1201/9780429351327Google ScholarGoogle Scholar
  19. Gupta BBChaudhary PGupta SDesigning a XSS defensive framework for web servers deployed in the existing smart city infrastructureJ Organ End User Comput (JOEUC)20203248511110.4018/JOEUC.2020100105Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Gupta SGupta BBDetection, avoidance, and attack pattern mechanisms in modern web application vulnerabilities: present and future challengesInt J Cloud Appl Comput (IJCAC)201773143Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Gupta S, Gupta BB (2015) PHP-sensor: a prototype method to discover workflow violation and XSS vulnerabilities in PHP web applications. In: Proceedings of the 12th ACM international conference on computing frontiers, pp 1–8Google ScholarGoogle Scholar
  22. Gupta SGupta BBXSS-SAFE: a server-side approach to detect and mitigate cross-site scripting (XSS) attacks in JavaScript codeArab J Sci Eng201641389792010.1007/s13369-015-1891-7Google ScholarGoogle ScholarCross RefCross Ref
  23. Gruber TRA translation approach to portable ontology specificationsKnowl Acquis19935219922010.1006/knac.1993.1008Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. HaddadPajouh HDehghantanha AParizi RMAledhari MKarimipour HA survey on internet of things security: Requirements, challenges, and solutionsInternet Things20211410.1016/j.iot.2019.100129Google ScholarGoogle ScholarCross RefCross Ref
  25. Html5lib parser (2020). https://pypi.org/project/html5lib/. Accessed 11 Jan 2022Google ScholarGoogle Scholar
  26. HtmlSanitizer (2020). https://github.com/mganss/HtmlSanitizer. Accessed 11 Jan 2022Google ScholarGoogle Scholar
  27. Kohonen TThe self-organizing mapProc IEEE19907891464148010.1109/5.58325Google ScholarGoogle ScholarCross RefCross Ref
  28. Law KM, Ip AW, Gupta BB, Geng S (eds) (2021) Managing IoT and mobile technologies with innovation, trust, and sustainable computing. CRC PressGoogle ScholarGoogle Scholar
  29. Lei L, Chen M, He C, Li D (2020) XSS detection technology based on LSTM-attention. In: 2020 5th international conference on control, robotics and cybernetics (CRC). IEEE, pp 175–180Google ScholarGoogle Scholar
  30. Lionel Sujay Vailshery (2021) IoT connected devices worldwide 2030. https://www.statista.com/statistics/802690/worldwide-connected-devices-by-access-technology/. Accessed 21 Jan 2022Google ScholarGoogle Scholar
  31. Mokbal FMMDan WXiaoxi WWenbin ZLihua FXGBXSS: an extreme gradient boosting detection framework for cross-site scripting attacks based on hybrid feature selection approach and parameters optimizationJ Inf Secur Appl202158Google ScholarGoogle Scholar
  32. Mrad A, Al-Hilo A, Sharafeddine S, Assi C (2022) NOMA-aided UAV data collection from time-constrained IoT devices. DOI: https://doi.org/10.1109/ICC45855.2022.9838643Google ScholarGoogle Scholar
  33. Nhi NTULe TMVan TTa model of semantic-based image retrieval using C-tree and neighbor graphInt J Semant Web Inf Syst (IJSWIS)20221812310.4018/IJSWIS.295551Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. OWASP Java HTML Sanitizer (2019). https://owasp.org/www-project-java-html-sanitizer/. Accessed 10 Jan 2022Google ScholarGoogle Scholar
  35. OWASP top 10 web application security risks (2021) https://owasp.org/Top10/. Accessed 22 Jan 2022Google ScholarGoogle Scholar
  36. Protégé Tool (2019). https://protege.stanford.edu/. Accessed 10 Jan 2022Google ScholarGoogle Scholar
  37. Rodríguez GETorres JGFlores PBenavides DECross-site scripting (XSS) attacks and mitigation: a surveyComput Netw202016610.1016/j.comnet.2019.106960Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Salas MIPMartins ESecurity testing methodology for vulnerabilities detection of xss in web services and ws-securityElectron Notes Theor Comput Sci201430213315410.1016/j.entcs.2014.01.024Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Samir MAssi CSharafeddine SGhrayeb AOnline altitude control and scheduling policy for minimizing aoi in UAV-assisted IoT wireless networksIEEE Trans Mob Comput20222172493250510.1109/TMC.2020.3042925Google ScholarGoogle Scholar
  40. Sejdiu BIsmaili FAhmedi LIntegration of semantics into sensor data for the IoT: a systematic literature reviewInt J Semant Web Inf Syst (IJSWIS)20201612510.4018/IJSWIS.2020100101Google ScholarGoogle Scholar
  41. Singamaneni KK, Dhiman G, Juneja S, Muhammad G, AlQahtani SA, Zaki J (2022) A novel QKD approach to enhance IIOT privacy and computational knacks. Sensors. DOI: https://doi.org/10.3390/s22186741Google ScholarGoogle Scholar
  42. Singh AGupta BBDistributed denial-of-service (DDoS) attacks and defense mechanisms in various web-enabled computing platforms: issues, challenges, and future research directionsInt J Semant Web Inf Syst (IJSWIS)20221814310.4018/IJSWIS.297143Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Stergiou CLPsannis KEet al.InFeMo: flexible big data management through a federated cloud systemACM Trans Internet Technol (TOIT)202122212210.1145/3426972Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Tewari Aet al.Secure timestamp-based mutual authentication protocol for IoT devices using rfid tagsInt J Semant Web Inf Syst (IJSWIS)2020163203410.4018/IJSWIS.2020070102Google ScholarGoogle Scholar
  45. Tariq ISindhu MAAbbasi RAKhattak ASMaqbool OSiddiqui GFResolving cross-site scripting attacks through genetic algorithm and reinforcement learningExpert Syst Appl202116810.1016/j.eswa.2020.114386Google ScholarGoogle Scholar
  46. Truong TCDiep QBZelinka IArtificial intelligence in the cyber domain: offense and defenseSymmetry202012341010.3390/sym12030410Google ScholarGoogle Scholar
  47. Wang DGu MZhao WCross-site script vulnerability penetration testing technologyJ Harbin Eng Univer2017381117691774Google ScholarGoogle Scholar
  48. Zhang XZhou YPei SZhuge JChen JAdversarial examples detection for XSS attacks based on generative adversarial networksIEEE Access20208109891099610.1109/ACCESS.2020.2965184Google ScholarGoogle Scholar
  49. Zhang WZ, Elgendy IA, Hammad M, Iliyasu AM, Du X, Guizani M, Abd El-Latif AA (2020b) Secure and optimized load balancing for multi-tier IoT and edge-cloud computing systems. IEEE Internet Things J 8(10):8119–8132Google ScholarGoogle Scholar
  50. Zhou YWang PAn ensemble learning approach for XSS attack detection with domain knowledge and threat intelligenceComput Secur20198226126910.1016/j.cose.2018.12.016Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. Zhou Z, Gaurav A, Gupta BB, Lytras MD, Razzak I (2021) A fine-grained access control and security approach for intelligent vehicular transport in 6g communication system. IEEE Trans Intell Transp SystGoogle ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in

Full Access

  • Published in

    cover image Soft Computing - A Fusion of Foundations, Methodologies and Applications
    Soft Computing - A Fusion of Foundations, Methodologies and Applications  Volume 27, Issue 8
    Apr 2023
    829 pages
    ISSN:1432-7643
    EISSN:1433-7479
    Issue’s Table of Contents

    © The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature 2022. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

    Publisher

    Springer-Verlag

    Berlin, Heidelberg

    Publication History

    • Published: 8 December 2022
    • Accepted: 22 November 2022

    Qualifiers

    • research-article
  • Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0

    Other Metrics