Please use this identifier to cite or link to this item: https://rfos.fon.bg.ac.rs/handle/123456789/2399
Full metadata record
DC FieldValueLanguage
dc.creatorKorać, Dragan
dc.creatorDamjanović, Boris
dc.creatorSimić, Dejan
dc.creatorChoo, K.-K.R.
dc.date.accessioned2023-05-12T11:45:24Z-
dc.date.available2023-05-12T11:45:24Z-
dc.date.issued2022
dc.identifier.issn1319-1578
dc.identifier.urihttps://rfos.fon.bg.ac.rs/handle/123456789/2399-
dc.description.abstractCross-site scripting (XSS) attacks have been extensively studied in the literature, although mitigating such attacks remain a challenge for cyber defenders. In this paper, we survey the existing literature on XSS attacks, focusing on the range of attacks and potential mitigation strategies. Specifically, we review the various XSS attacks from the lens of an attacker. We use a workflow diagram to define the topological relationship among XSS attacks, and to highlight key system weaknesses (e.g., chokepoints). We also present a Hybrid XSS attack (HYXSSA), designed to facilitate the identification of existing and future potential attack vectors in different modalities presented as frameworks (fi). For quantification and visualization of these frameworks, the software application as a rotate view tool is developed. Moreover, we demonstrate how these derived frameworks can be implemented, and provide a guideline to defend against XSS attacks. The implementation results for the given two attack vector shows the feasibility of mapping of attack vectors to actual mathematical vectors. Finally, we present potential challenges and opportunities associated with XSS attacks.en
dc.publisherKing Saud bin Abdulaziz University
dc.rightsopenAccess
dc.rights.urihttps://creativecommons.org/licenses/by/4.0/
dc.sourceJournal of King Saud University - Computer and Information Sciences
dc.subjectWork from homeen
dc.subjectHybrid XSS attack (HYXSSA)en
dc.subjectFusionen
dc.subjectCybersecurityen
dc.subjectCross-site scripting (XSS)en
dc.subjectAttack vectoren
dc.titleA hybrid XSS attack (HYXSSA) based on fusion approach: Challenges, threats and implications in cybersecurityen
dc.typearticle
dc.rights.licenseBY
dc.citation.epage9300
dc.citation.issue10
dc.citation.other34(10): 9284-9300
dc.citation.rankaM21~
dc.citation.spage9284
dc.citation.volume34
dc.identifier.doi10.1016/j.jksuci.2022.09.008
dc.identifier.rcubconv_3741
dc.identifier.scopus2-s2.0-85139300963
dc.identifier.wos000999620800024
dc.type.versionpublishedVersion
item.cerifentitytypePublications-
item.fulltextNo Fulltext-
item.grantfulltextnone-
item.openairetypearticle-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
Appears in Collections:Radovi istraživača / Researchers’ publications
Show simple item record

SCOPUSTM   
Citations

13
checked on Nov 17, 2025

Google ScholarTM

Check

Altmetric


This item is licensed under a Creative Commons License Creative Commons