A Comprehensive Study of XSS Attack and the Digital Forensic Models to Gather the Evidence

Cyber Crime and fraud are growing at a rapid rate and the law practitioners require proper methodology to collect the digital evidences. When the criminals use digital platform in order to commit the crime, forensic examiners apply practical frameworks and methods to collect digital evidences. Digit...

Full description

Saved in:
Bibliographic Details
Published inECS transactions Vol. 107; no. 1; pp. 7153 - 7163
Main Authors Kumar, Saurabh, Pathak, S.K., Singh, Jagendra
Format Journal Article
LanguageEnglish
Published The Electrochemical Society, Inc 24.04.2022
Online AccessGet full text

Cover

Loading…
Abstract Cyber Crime and fraud are growing at a rapid rate and the law practitioners require proper methodology to collect the digital evidences. When the criminals use digital platform in order to commit the crime, forensic examiners apply practical frameworks and methods to collect digital evidences. Digital forensics method involves the analysis of network traffic for detecting intrusions and investigating them. Different models have been proposed for the cyber crime investigation with the merits and demerit. This research paper explores cross-site scripting (XSS) attacks, features of the existing digital forensic investigation models and discusses some of the issues related to digital forensic research.
AbstractList Cyber Crime and fraud are growing at a rapid rate and the law practitioners require proper methodology to collect the digital evidences. When the criminals use digital platform in order to commit the crime, forensic examiners apply practical frameworks and methods to collect digital evidences. Digital forensics method involves the analysis of network traffic for detecting intrusions and investigating them. Different models have been proposed for the cyber crime investigation with the merits and demerit. This research paper explores cross-site scripting (XSS) attacks, features of the existing digital forensic investigation models and discusses some of the issues related to digital forensic research.
Author Kumar, Saurabh
Pathak, S.K.
Singh, Jagendra
Author_xml – sequence: 1
  givenname: Saurabh
  surname: Kumar
  fullname: Kumar, Saurabh
  organization: Dr. K.N. Modi University, Newai
– sequence: 2
  givenname: S.K.
  surname: Pathak
  fullname: Pathak, S.K.
  organization: Dr. K.N. Modi University, Newai
– sequence: 3
  givenname: Jagendra
  surname: Singh
  fullname: Singh, Jagendra
  organization: Bennett University, Greater Noida
BookMark eNp1kM9LwzAUx4NMcJtePecmCK1N0yXtccxtChMPUxAvIc0Pl9k1JckG--9tt3kRd3oP3ufzeO87AL3a1gqAW5TECGXFA0pogmKKRlgJHy5AHxU4jwjFtHfqRzlJr8DA-3WSkNahffA5hhO7aZxaqdqbnYLLsJV7aDX8WC7hOAQuviGvJQwrBR_Nlwm8gjPrOlrAFytV5WGwcM5bwB2o6c5IVQt1DS41r7y6OdUheJ9N3yZP0eJ1_jwZLyKRpihEhBCeSSl0iSlJM15gQbNCcpJkKNeFEIXmI5yKFCMsMlrSkuSoyDWlZanyMsdDkB33Cme9d0oz0V4ZjK2D46ZiKGFdPuyQD_vNp9XiP1rjzIa7_Xnh_igY27C13bq6_eo8fPcP3I06kh1J1kiNfwAZrITK
CitedBy_id crossref_primary_10_2174_0118763863291395240516093102
crossref_primary_10_3390_electronics13224546
crossref_primary_10_1007_s10515_024_00430_3
crossref_primary_10_1109_TDSC_2024_3451129
ContentType Journal Article
Copyright 2022 ECS - The Electrochemical Society
Copyright_xml – notice: 2022 ECS - The Electrochemical Society
DBID AAYXX
CITATION
DOI 10.1149/10701.7153ecst
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList CrossRef
DeliveryMethod fulltext_linktorsrc
Discipline Chemistry
EISSN 1938-6737
EndPage 7163
ExternalDocumentID 10_1149_10701_7153ecst
10.1149/10701.7153ecst
GroupedDBID 0R~
29G
AATNI
ABDNZ
ABJNI
ACHIP
ADNWM
AKPSB
ALMA_UNASSIGNED_HOLDINGS
AOAED
ATQHT
CJUJL
EBS
EJD
IOP
JGOPE
KOT
MV1
N5L
NFQFE
REC
RHI
RNS
ROL
RPA
AAYXX
ADEQX
CITATION
ID FETCH-LOGICAL-c221t-666a4ddcfb37624a93c749da60418f9cc9fa532c2313c47b7b68198f77bbe8b83
IEDL.DBID IOP
ISSN 1938-5862
IngestDate Thu Apr 24 23:11:31 EDT 2025
Tue Jul 01 03:47:26 EDT 2025
Wed Aug 21 03:33:28 EDT 2024
Wed May 04 00:50:18 EDT 2022
IsPeerReviewed false
IsScholarly true
Issue 1
Language English
License This article is available under the terms of the IOP-Standard License.
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c221t-666a4ddcfb37624a93c749da60418f9cc9fa532c2313c47b7b68198f77bbe8b83
PageCount 11
ParticipantIDs iop_journals_10_1149_10701_7153ecst
crossref_primary_10_1149_10701_7153ecst
crossref_citationtrail_10_1149_10701_7153ecst
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 20220424
PublicationDateYYYYMMDD 2022-04-24
PublicationDate_xml – month: 04
  year: 2022
  text: 20220424
  day: 24
PublicationDecade 2020
PublicationTitle ECS transactions
PublicationTitleAlternate ECS Trans
PublicationYear 2022
Publisher The Electrochemical Society, Inc
Publisher_xml – name: The Electrochemical Society, Inc
SSID ssj0061147
Score 2.4893053
Snippet Cyber Crime and fraud are growing at a rapid rate and the law practitioners require proper methodology to collect the digital evidences. When the criminals use...
SourceID crossref
iop
SourceType Enrichment Source
Index Database
Publisher
StartPage 7153
Title A Comprehensive Study of XSS Attack and the Digital Forensic Models to Gather the Evidence
URI https://iopscience.iop.org/article/10.1149/10701.7153ecst
Volume 107
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1bS8MwGA1eHvTFu3gnoOBTRpumSfM4vE3BC8zB8KU0Xxodk21s3YP-epOmlakI4lNLOW3Dl-TLKc13DkInUkhhh0lAQhCa2OwXEsklkIjxAExOtQFX73x7x1sddtONuzNWX73hqEr9DXvqhYJ9CCthW2mPIggbwk7VHCbFPFqMEs6decH1_UOdhLlFCv9D2RUWcVrpNf68_8t6NG_fObO8XK6ip7phfldJvzEtVAPev2k2_qvla2ilIp246YHraC4fbKCls9rrbRM9NbFLDOP8xe9nx2574RseGtxtt3GzKDLo42ygsaWL-Lz37JxGsHP1tGjAzk_tdYKLIb4q-WSJqu1Kt1Dn8uLxrEUq1wUClIYFsd8zGdMajLK5h7JMRiCY1BkPWJgYCSBNFkcULDGMgAklFLesIjFCKJUnKom20cJgOMh3ELbdHauYCuGE2VSiExWaUOexMhqyIFa7iNSxT6GSJHfOGK-pL5eWaRmxtI7YLjr9xI-8GMevyGPbCWk1Hye_ovAXlLvmIKmHpCNt9v70oH20TF1ZRMAIZQdooRhP80NLVgp1VA7LD4B84sw
linkProvider IOP Publishing
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1bS-QwFA5eYHdfVl1XdL0FXNinzLZp2jSPgzredWAcGHwpzUmjMjIzOPVh_fWeNK14QVh8aikfaTknOTkl53wfIb-VVBKnScBCkIZh9AuZShSwSCQB2IIbC67f-ew8OeyL40E8qGtzql6Y8aQO_S289UTB3oQ1sa3CqwzClsSlWsC0_DsxdpbMx1ESOer8o4tuE4gTREt_qOyaixJecza-H-PVnjSL732xxXQWvI7qtGImdJUlw9ZDqVvw-Ia38dNfv0i-18knbXvwEpkpRj_I191G822ZXLWpCxD3xY2va6euzPAfHVs66PVouyxzGNJ8ZCimjXTv9topjlCn7olooE5X7W5KyzE9qPLKCtXIlv4k_c7-5e4hq9UXGHAelgz_a3JhDFiNMYiLXEUghTJ5EogwtQpA2TyOOGCCGIGQWuoEs4vUSql1keo0WiFzo_GoWCUU3R7rmEvpCNp0alId2tAUsbYG8iDWa4Q19s-gpiZ3Chl3mW-bVllltayx2hr584yfeFKOD5E76IisXpfTD1H0Fco9c5DMQzJ00q__GmibfOnudbLTo_OTdfKNu06JQDAuNshcef9QbGL-UuqtapY-AbR36DA
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Comprehensive+Study+of+XSS+Attack+and+the+Digital+Forensic+Models+to+Gather+the+Evidence&rft.jtitle=ECS+transactions&rft.au=Kumar%2C+Saurabh&rft.au=Pathak%2C+S.K.&rft.au=Singh%2C+Jagendra&rft.date=2022-04-24&rft.issn=1938-5862&rft.eissn=1938-6737&rft.volume=107&rft.issue=1&rft.spage=7153&rft.epage=7163&rft_id=info:doi/10.1149%2F10701.7153ecst&rft.externalDBID=n%2Fa&rft.externalDocID=10_1149_10701_7153ecst
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1938-5862&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1938-5862&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1938-5862&client=summon