{"title":"网络系统跨站脚本调查收集数字证据对抗网络入侵","authors":"Shiuh-Jeng Wang, Yao-Han Chang, Wen-Ya Chiang, Wen-Shenq Juang","doi":"10.1109/FGCN.2007.156","DOIUrl":null,"url":null,"abstract":"With the Internet's rapid development, government agencies and other private companies are setting up websites for providing information and marketing. However, computer viruses and hackers are omnipresent on Internet. The injection attacks grew exponentially recently. SQL Injection, ASP Injection, PHP Injection are methods of attacks used. The nation's largest Blog website \"Wretch\" and the international largest friend's community website \"MySpace\" were attacked in recent years by Cross-Site Script (XSS) attacks. In this paper, we provide a scheme to know how to collect evidence after suffering XSS attacks from network systems. Furthermore, we give the management strategies to prevent XSS attacks from network intrusions.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"156 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Investigations in Cross-site Script on Web-systems Gathering Digital Evidence against Cyber-Intrusions\",\"authors\":\"Shiuh-Jeng Wang, Yao-Han Chang, Wen-Ya Chiang, Wen-Shenq Juang\",\"doi\":\"10.1109/FGCN.2007.156\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the Internet's rapid development, government agencies and other private companies are setting up websites for providing information and marketing. However, computer viruses and hackers are omnipresent on Internet. The injection attacks grew exponentially recently. SQL Injection, ASP Injection, PHP Injection are methods of attacks used. The nation's largest Blog website \\\"Wretch\\\" and the international largest friend's community website \\\"MySpace\\\" were attacked in recent years by Cross-Site Script (XSS) attacks. In this paper, we provide a scheme to know how to collect evidence after suffering XSS attacks from network systems. Furthermore, we give the management strategies to prevent XSS attacks from network intrusions.\",\"PeriodicalId\":254368,\"journal\":{\"name\":\"Future Generation Communication and Networking (FGCN 2007)\",\"volume\":\"156 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-12-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Future Generation Communication and Networking (FGCN 2007)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/FGCN.2007.156\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Future Generation Communication and Networking (FGCN 2007)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/FGCN.2007.156","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Investigations in Cross-site Script on Web-systems Gathering Digital Evidence against Cyber-Intrusions
With the Internet's rapid development, government agencies and other private companies are setting up websites for providing information and marketing. However, computer viruses and hackers are omnipresent on Internet. The injection attacks grew exponentially recently. SQL Injection, ASP Injection, PHP Injection are methods of attacks used. The nation's largest Blog website "Wretch" and the international largest friend's community website "MySpace" were attacked in recent years by Cross-Site Script (XSS) attacks. In this paper, we provide a scheme to know how to collect evidence after suffering XSS attacks from network systems. Furthermore, we give the management strategies to prevent XSS attacks from network intrusions.