Cross-Site Scripting (XSS) vulnerabilities continue to pose a formidable challenge in the realm of web application security due to their prevalence. despite the development of various defense mechanisms, including inp...
详细信息
ISBN:
(数字)9798331506209
ISBN:
(纸本)9798331506216
Cross-Site Scripting (XSS) vulnerabilities continue to pose a formidable challenge in the realm of web application security due to their prevalence. despite the development of various defense mechanisms, including input validation techniques and code differentiation strategies, these solutions have struggled to achieve broad adoption in real-world environments due to persistent issues such as unreliable detection, high computational overhead, scalability limitations, and compatibility concerns. This paper introduces a novel managed proxy-based framework for XSS defense, positioned strategically between the web browser and the web server. This framework employs a tag-based XSS protection mechanism alongside a defense-in-depth strategy, providing robust protection not only against XSS attacks but also against other web threats. Furthermore, the framework integrates advanced web front-end hardening techniques to significantly complicate the exploitation of potential vulnerabilities. Comprehensive practical evaluations indicate that the proposed framework is both flexible and effective, demonstrating outstanding performance across multiple dimensions.
Cross-Site Scripting (XSS) vulnerabilities continue to pose a formidable challenge in the realm of web application security due to their prevalence. despite the development of various defense mechanisms, including inp...
详细信息
As network applications are increasingly offloaded to the programmable switches, program fitting problems come to the fore, which means effectively mapping the programming entities into the hardware resources. However...
详细信息
As network applications are increasingly offloaded to the programmable switches, program fitting problems come to the fore, which means effectively mapping the programming entities into the hardware resources. However...
详细信息
The next generation of wireless technology, 6G, will likely incorporate advanced technologies such as extremely large-scale antenna arrays (ELAA) and millimeter wave (mmWave) communication. These cutting-edge features...
详细信息
The rise of network function virtualization (NFV) technology makes the realization of network function change from hardware middleware to virtual network function (VNF). The existing methods allocate fixedresources t...
详细信息
ISBN:
(纸本)9781450397148
The rise of network function virtualization (NFV) technology makes the realization of network function change from hardware middleware to virtual network function (VNF). The existing methods allocate fixedresources to each VNF instance, but this resource allocation method will cause resource waste, which will affect the quality of service. The resource requirements prediction model solves the resource allocation problem by predicting the change of resource requirements. In this paper, deep learning is used to solve the regression prediction problem, and a VNF resource requirements prediction model based on convolutional neural network (CNN) and gatedrecurrent unit (GrU) is proposed. Compared with other single model and combined model, the experimental results show that the prediction errorrate of the proposed model is reduced by 23.3%.
Website security detection is important for Internet security. Existing machine learning-based malicious UrL detection methods have a low accuracy and weak generalization ability. Thus, we proposed a new multi-feature...
Website security detection is important for Internet security. Existing machine learning-based malicious UrL detection methods have a low accuracy and weak generalization ability. Thus, we proposed a new multi-feature fusion malicious website detection model BGresNet by integrating the advantages of Bidirectional Encoderrepresentations from Transformers (BErT), Graph Convolutional Network (GCN), andresidual neural network (resNet). The method integrates three features: Uniform resource Locator (UrL) creator, rule features, and website titles. First, we used BGresNet to process UrL characters and website titles separately, transforming them into vectorrepresentations. Then, these two vectors were fused with UrL rule vectors. Finally, we employed the softmax function to realize the detection of malicious websites. The experimental results showed that the proposed model exhibited significant superiority in detecting malicious websites, providing a new and effective method for malicious UrL detection in Internet security.
dynamic metasurface antenna (dMA) array is a new type of array structure with low complexity and low cost, which is emerging as a promising technique for next-generation wireless networks. In this paper, a downlink mu...
dynamic metasurface antenna (dMA) array is a new type of array structure with low complexity and low cost, which is emerging as a promising technique for next-generation wireless networks. In this paper, a downlink multi-user MISO system based on dMA arrays is investigated, and the mean square error (MSE) is chosen as a performance metric to characterize the transmission reliability. The beamforming performance of dMA arrays is investigated using the minimum mean square error (MMSE) criterion. For the multiuser scenario, the optimization problem minimizes MSE by jointly optimizing the transmit precoder anddMA weights while satisfying the transmit power constraint. Our numerical results show that the proposed MMSE scheme converges fast and performs close to full digital beamforming.
In the past decade, Fake Base Stations (FBS) have been consistently employed by criminals to target mobile users through spam text messages. despite the introduction of several techniques to mitigate this problem, spa...
In the past decade, Fake Base Stations (FBS) have been consistently employed by criminals to target mobile users through spam text messages. despite the introduction of several techniques to mitigate this problem, spam messages remain a persistent and challenging issue in some countries, such as China, resulting in billions of dollars in annual economic losses. Therefore, this paper proposes an algorithm named BErT-GCN that combines large-scale pre-training models with Graph Convolutional Networks (GCN) for multi-class detection of fraudulent base station telecommunications scams in Chinese text messages. First, BErT (Bidirectional Encoderrepresentation from Transformers) is used to encode the corpus and generate word embeddings. Subsequently, the generated word embeddings are fed into GCN for training. Finally, a Softmax layer is employed to perform multi-class detection on fraudulent base station telecommunications scams in Chinese text messages. Experimental results demonstrate that the proposed model achieves favorable performance on the FBS-SMS-dataset and exhibits outstanding performance in the domain of multi-class detection.
Aiming at the shortcomings of existing user profile construction algorithms that do not fully utilize contextual structural information and multidimensional feature information., a user profile construction model base...
Aiming at the shortcomings of existing user profile construction algorithms that do not fully utilize contextual structural information and multidimensional feature information., a user profile construction model based on the pre-training model NEZHA, deep Pyramidal Convolutional Neural Networks (dPCNN), Gatedrecurrent Unit (GrU), and attention mechanism is proposed, NCdGA. The method uses multiple channels to process the text, capturing different dimensions of information and constructing features to reduce the prediction bias that occurs when a single model captures a single feature. The experimental results show that the NCdGA model has better accuracy and effectiveness compared with other modeling methods.
暂无评论