{"id":"https://openalex.org/W4396918317","doi":"https://doi.org/10.1109/isdfs60797.2024.10527278","title":"AlgoXSSF: Detection and Analysis of Cross-Site Request Forgery (XSRF) and Cross-Site Scripting (XSS) Attacks via Machine Learning Algorithms","display_name":"AlgoXSSF: Detection and Analysis of Cross-Site Request Forgery (XSRF) and Cross-Site Scripting (XSS) Attacks via Machine Learning Algorithms","publication_year":2024,"publication_date":"2024-04-29","ids":{"openalex":"https://openalex.org/W4396918317","doi":"https://doi.org/10.1109/isdfs60797.2024.10527278"},"language":"en","primary_location":{"id":"doi:10.1109/isdfs60797.2024.10527278","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isdfs60797.2024.10527278","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 12th International Symposium on Digital Forensics and Security (ISDFS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5040347462","display_name":"Naresh Kshetri","orcid":"https://orcid.org/0000-0002-3282-7331"},"institutions":[{"id":"https://openalex.org/I93131583","display_name":"Emporia State University","ror":"https://ror.org/04e6r1478","country_code":"US","type":"education","lineage":["https://openalex.org/I93131583"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Naresh Kshetri","raw_affiliation_strings":["School of Business &#x0026; Technology, Emporia State University,Emporia,KS,USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Business &#x0026; Technology, Emporia State University,Emporia,KS,USA","institution_ids":["https://openalex.org/I93131583"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100711571","display_name":"Dilip Kumar","orcid":"https://orcid.org/0000-0002-7407-9271"},"institutions":[{"id":"https://openalex.org/I9579091","display_name":"Indian Institute of Technology Mandi","ror":"https://ror.org/05r9r2f34","country_code":"IN","type":"education","lineage":["https://openalex.org/I9579091"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Dilip Kumar","raw_affiliation_strings":["Laboratory of Applied Cryptology and Security (LACS), Indian Institute of Technology,Mandi,India","Laboratory of Applied Cryptology and Security (LACS), Indian Institute of Technology, Mandi, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Laboratory of Applied Cryptology and Security (LACS), Indian Institute of Technology,Mandi,India","institution_ids":["https://openalex.org/I9579091"]},{"raw_affiliation_string":"Laboratory of Applied Cryptology and Security (LACS), Indian Institute of Technology, Mandi, India","institution_ids":["https://openalex.org/I9579091"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052787141","display_name":"James Hutson","orcid":"https://orcid.org/0000-0002-0578-6052"},"institutions":[{"id":"https://openalex.org/I98865867","display_name":"Lindenwood University","ror":"https://ror.org/01qf95793","country_code":"US","type":"education","lineage":["https://openalex.org/I98865867"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"James Hutson","raw_affiliation_strings":["Lindenwood University,Department of Art History &#x0026; Culture,Saint Charles,Missouri"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Lindenwood University,Department of Art History &#x0026; Culture,Saint Charles,Missouri","institution_ids":["https://openalex.org/I98865867"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046290333","display_name":"Navneet Kaur","orcid":"https://orcid.org/0000-0001-9086-4352"},"institutions":[{"id":"https://openalex.org/I208333798","display_name":"University of Missouri\u2013St. Louis","ror":"https://ror.org/037cnag11","country_code":"US","type":"education","lineage":["https://openalex.org/I208333798"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Navneet Kaur","raw_affiliation_strings":["University of Missouri,Department of Computer Science,St. Louis,Missouri,USA","Department of Computer Science, University of Missouri, St. Louis, Missouri, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of Missouri,Department of Computer Science,St. Louis,Missouri,USA","institution_ids":["https://openalex.org/I208333798"]},{"raw_affiliation_string":"Department of Computer Science, University of Missouri, St. Louis, Missouri, USA","institution_ids":["https://openalex.org/I208333798"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5070955272","display_name":"Omar Faruq Osama","orcid":null},"institutions":[{"id":"https://openalex.org/I123946342","display_name":"Binghamton University","ror":"https://ror.org/008rmbt77","country_code":"US","type":"education","lineage":["https://openalex.org/I123946342"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Omar Faruq Osama","raw_affiliation_strings":["Binghamton University, SUNY,Department of Systems Science and Industrial Engineering,Binghamton,NY,USA","Department of Systems Science and Industrial Engineering, Binghamton University, SUNY, Binghamton, NY, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Binghamton University, SUNY,Department of Systems Science and Industrial Engineering,Binghamton,NY,USA","institution_ids":["https://openalex.org/I123946342"]},{"raw_affiliation_string":"Department of Systems Science and Industrial Engineering, Binghamton University, SUNY, Binghamton, NY, USA","institution_ids":["https://openalex.org/I123946342"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5040347462"],"corresponding_institution_ids":["https://openalex.org/I93131583"],"apc_list":null,"apc_paid":null,"fwci":2.6302,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.9007223,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cross-site-scripting","display_name":"Cross-site scripting","score":0.9461326599121094},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8403302431106567},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6761414408683777},{"id":"https://openalex.org/keywords/scripting-language","display_name":"Scripting language","score":0.5537593364715576},{"id":"https://openalex.org/keywords/false-positive-paradox","display_name":"False positive paradox","score":0.5337698459625244},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.485157310962677},{"id":"https://openalex.org/keywords/plug-in","display_name":"Plug-in","score":0.4771648943424225},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.43872392177581787},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.3733569383621216},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3601931929588318},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.35969817638397217},{"id":"https://openalex.org/keywords/web-application-security","display_name":"Web application security","score":0.31481489539146423},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.16389566659927368},{"id":"https://openalex.org/keywords/web-development","display_name":"Web development","score":0.1636401116847992}],"concepts":[{"id":"https://openalex.org/C39569185","wikidata":"https://www.wikidata.org/wiki/Q371199","display_name":"Cross-site scripting","level":5,"score":0.9461326599121094},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8403302431106567},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6761414408683777},{"id":"https://openalex.org/C61423126","wikidata":"https://www.wikidata.org/wiki/Q187432","display_name":"Scripting language","level":2,"score":0.5537593364715576},{"id":"https://openalex.org/C64869954","wikidata":"https://www.wikidata.org/wiki/Q1859747","display_name":"False positive paradox","level":2,"score":0.5337698459625244},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.485157310962677},{"id":"https://openalex.org/C4924752","wikidata":"https://www.wikidata.org/wiki/Q184148","display_name":"Plug-in","level":2,"score":0.4771648943424225},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.43872392177581787},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3733569383621216},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3601931929588318},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.35969817638397217},{"id":"https://openalex.org/C59241245","wikidata":"https://www.wikidata.org/wiki/Q4781497","display_name":"Web application security","level":4,"score":0.31481489539146423},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.16389566659927368},{"id":"https://openalex.org/C79373723","wikidata":"https://www.wikidata.org/wiki/Q386275","display_name":"Web development","level":3,"score":0.1636401116847992}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isdfs60797.2024.10527278","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isdfs60797.2024.10527278","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 12th International Symposium on Digital Forensics and Security (ISDFS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W1985998952","https://openalex.org/W2801883820","https://openalex.org/W2943467804","https://openalex.org/W2986807064","https://openalex.org/W3001944142","https://openalex.org/W3040127995","https://openalex.org/W3105981741","https://openalex.org/W3117848542","https://openalex.org/W3129846904","https://openalex.org/W3203612496","https://openalex.org/W3209731134","https://openalex.org/W3214771494","https://openalex.org/W4214947963","https://openalex.org/W4220768885","https://openalex.org/W4221137753","https://openalex.org/W4280604635","https://openalex.org/W4304956792","https://openalex.org/W4309874936","https://openalex.org/W4312530169","https://openalex.org/W4312863304","https://openalex.org/W4315606660","https://openalex.org/W4319075937","https://openalex.org/W4321843734","https://openalex.org/W4365440968","https://openalex.org/W4367623515","https://openalex.org/W4380089473","https://openalex.org/W4381435645","https://openalex.org/W4382982141","https://openalex.org/W4384039673","https://openalex.org/W4386004672","https://openalex.org/W4386961654","https://openalex.org/W4388270261","https://openalex.org/W4388858768","https://openalex.org/W4388958968","https://openalex.org/W4391531604","https://openalex.org/W4391857533","https://openalex.org/W4394911250","https://openalex.org/W6851952108","https://openalex.org/W6857044740"],"related_works":["https://openalex.org/W1975357770","https://openalex.org/W2548409577","https://openalex.org/W3180404666","https://openalex.org/W1531015913","https://openalex.org/W2407701912","https://openalex.org/W1484631816","https://openalex.org/W2167752994","https://openalex.org/W2907218437","https://openalex.org/W2117221897","https://openalex.org/W2181766705"],"abstract_inverted_index":{"The":[0,36],"global":[1],"rise":[2],"in":[3,14,81,85],"online":[4,174],"users":[5],"and":[6,16,21,29,42,53,60,100,110,147,173],"devices":[7],"has":[8,95],"led":[9],"to":[10,32,50,88,98,141],"a":[11,91,161],"corresponding":[12],"surge":[13],"cybercrimes":[15],"attacks,":[17,167,170],"demanding":[18],"advanced":[19],"technology":[20,48],"algorithms":[22],"like":[23,105],"Artificial":[24],"Intelligence":[25],"(AI),":[26],"Deep":[27],"Learning,":[28],"Machine":[30],"Learning":[31],"bolster":[33],"web":[34,65],"security.":[35],"unprecedented":[37],"increase":[38],"rate":[39],"of":[40,155],"cybercrime":[41],"website":[43],"attacks":[44],"urged":[45],"for":[46],"new":[47],"consideration":[49],"protect":[51],"data":[52,69,76],"information":[54],"online.":[55],"There":[56],"have":[57],"been":[58,96],"recent":[59],"continuous":[61],"cyberattacks":[62],"on":[63,78],"websites,":[64],"domains":[66],"with":[67],"ongoing":[68],"breaches":[70],"including":[71,168],"-":[72,126],"GitHub":[73],"account":[74],"hack,":[75],"leaks":[77],"Twitter,":[79],"malware":[80],"WordPress":[82],"plugins,":[83],"vulnerability":[84],"Tomcat":[86],"server":[87],"name":[89],"just":[90],"few.":[92],"Extensive":[93],"research":[94],"conducted":[97],"detect":[99],"analyze":[101],"prevalent":[102],"cyber":[103,123,177],"threats":[104],"cross-site":[106,111],"request":[107],"forgery":[108],"(XSRF)":[109],"scripting":[112],"(XSS)":[113],"attacks.":[114],"Leveraging":[115],"machine":[116,156],"learning":[117],"algorithms,":[118],"particularly":[119],"through":[120],"the":[121,153],"developed":[122],"defense":[124,163],"framework":[125],"algoXSSF,":[127],"offers":[128],"numerous":[129],"benefits.":[130],"AlgoXSSF":[131],"enhances":[132],"detection":[133],"accuracy,":[134],"facilitates":[135],"real-time":[136],"threat":[137],"response,":[138],"autonomously":[139],"adapts":[140],"evolving":[142],"threats,":[143],"minimizes":[144],"false":[145],"positives,":[146],"streamlines":[148],"security":[149],"operations.":[150],"By":[151],"harnessing":[152],"power":[154],"learning,":[157],"algoXSSF":[158],"serves":[159],"as":[160],"robust":[162],"mechanism":[164],"against":[165,176],"malicious":[166],"Man-in-the-Middle":[169],"reinforcing":[171],"websites":[172],"platforms":[175],"threats.":[178]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":6}],"updated_date":"2026-05-08T15:41:06.802602","created_date":"2025-10-10T00:00:00"}
