skip to main content
10.1145/3627341.3630377acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccvitConference Proceedingsconference-collections
research-article

Research on xss Detection based on ALSTM Model and Traditional Feature Engineering

Published:15 December 2023Publication History

ABSTRACT

This paper proposes an XSS attack detection method based on hybrid LSTM-Attention model combined with traditional feature engineering. In this method, Long Short-Term Memory (LSTM) model was used to capture sequence features, and Attention mechanism was introduced to automatically learn the weights of key features. By combining LSTM and Attention, the model is better able to handle the sequential nature of XSS attacks and is able to focus attention on the features that are most important for detection. At the same time, combined with the traditional XSS feature selection, special symbols and special words are added to the detection standard.The experimental results show that compared with traditional methods, this method can more accurately detect cross site attacks.The innovation of this paper is to combine the LSTM-Attention model combined with traditional feature engineering to XSS attack detection, thereby improving the accuracy and performance of XSS attack detection.Key words: XSS attack; LSTM-Attention; Feature engineering

References

  1. Li, Xiaowei, and Yuan Xue. "A survey on server-side approaches to securing web applications." ACM Computing Surveys (CSUR) 46.4 (2014): 1-29.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Zhao Cheng, Chen Junxin, Yao Minghai. XSS Attack detection Technology Based on SVM Classifier [J]. Computer Science,2018,45(S2):356-360.Google ScholarGoogle Scholar
  3. Li Kezi, Xu Yang, Zhang Qingling, Zhang Sicong. XSS Attack Detection Method Based on BiLSTM-Attention-CNN [J]. Journal of guizhou normal university (natural science edition), 2022, 40 (4) : 76-83. The DOI: 10.16614 / j.g znuj. ZRB. 2022.04.013.Google ScholarGoogle Scholar
  4. Li Renjie, Hua Chi, Lu Zhiping. Research on cross-site Scripting Attack Detection Based on SVM Classifier Optimized by FP-growth [J]. Information Security Research,2020,6(09):766-774.Google ScholarGoogle Scholar
  5. Mikolov T, Sutskever I, Chen K, Distributed representations of words and phrases and their compositionality[J]. Advances in neural information processing systems, 2013, 26.Google ScholarGoogle Scholar
  6. Yu Y, Si X, Hu C, A review of recurrent neural networks:LSTM cells and network architectures[J]. Neural computation, 2019,31(7):1235-1270.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Lei,Li, "XSS detection technology based on LSTM-attention." 2020 5th International Conference on Control, Robotics and Cybernetics (CRC). IEEE, 2020.Google ScholarGoogle Scholar
  8. Nilavarasan, G. S., and T. Balachander. "XSS Attack Detection using Convolution Neural Network." 2023 International Conference on Artificial Intelligence and Knowledge Discovery in Concurrent Engineering (ICECONF). IEEE, 2023.Google ScholarGoogle Scholar
  9. Wang R, Jia X, Li Q, Machine learning based cross-site scripting detection in online social network[C]//2014 IEEE Intl Conf on High Performance Computing and Communications, 2014 IEEE 6th Intl Symp on Cyberspace Safety and Security, 2014 IEEE 11th Intl Conf on Embedded Software and Syst (HPCC, CSS, ICESS). IEEE, 2014: 823-826.Google ScholarGoogle Scholar

Index Terms

  1. Research on xss Detection based on ALSTM Model and Traditional Feature Engineering
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        ICCVIT '23: Proceedings of the 2023 International Conference on Computer, Vision and Intelligent Technology
        August 2023
        378 pages
        ISBN:9798400708701
        DOI:10.1145/3627341

        Copyright © 2023 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 15 December 2023

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited

        Acceptance Rates

        ICCVIT '23 Paper Acceptance Rate54of142submissions,38%Overall Acceptance Rate54of142submissions,38%
      • Article Metrics

        • Downloads (Last 12 months)8
        • Downloads (Last 6 weeks)2

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format .

      View HTML Format