A Comprehensive Study of XSS Attack and the Digital Forensic Models to Gather the Evidence
Cyber Crime and fraud are growing at a rapid rate and the law practitioners require proper methodology to collect the digital evidences. When the criminals use digital platform in order to commit the crime, forensic examiners apply practical frameworks and methods to collect digital evidences. Digit...
Saved in:
Published in | ECS transactions Vol. 107; no. 1; pp. 7153 - 7163 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
The Electrochemical Society, Inc
24.04.2022
|
Online Access | Get full text |
Cover
Loading…
Abstract | Cyber Crime and fraud are growing at a rapid rate and the law practitioners require proper methodology to collect the digital evidences. When the criminals use digital platform in order to commit the crime, forensic examiners apply practical frameworks and methods to collect digital evidences. Digital forensics method involves the analysis of network traffic for detecting intrusions and investigating them. Different models have been proposed for the cyber crime investigation with the merits and demerit. This research paper explores cross-site scripting (XSS) attacks, features of the existing digital forensic investigation models and discusses some of the issues related to digital forensic research. |
---|---|
AbstractList | Cyber Crime and fraud are growing at a rapid rate and the law practitioners require proper methodology to collect the digital evidences. When the criminals use digital platform in order to commit the crime, forensic examiners apply practical frameworks and methods to collect digital evidences. Digital forensics method involves the analysis of network traffic for detecting intrusions and investigating them. Different models have been proposed for the cyber crime investigation with the merits and demerit. This research paper explores cross-site scripting (XSS) attacks, features of the existing digital forensic investigation models and discusses some of the issues related to digital forensic research. |
Author | Kumar, Saurabh Pathak, S.K. Singh, Jagendra |
Author_xml | – sequence: 1 givenname: Saurabh surname: Kumar fullname: Kumar, Saurabh organization: Dr. K.N. Modi University, Newai – sequence: 2 givenname: S.K. surname: Pathak fullname: Pathak, S.K. organization: Dr. K.N. Modi University, Newai – sequence: 3 givenname: Jagendra surname: Singh fullname: Singh, Jagendra organization: Bennett University, Greater Noida |
BookMark | eNp1kM9LwzAUx4NMcJtePecmCK1N0yXtccxtChMPUxAvIc0Pl9k1JckG--9tt3kRd3oP3ufzeO87AL3a1gqAW5TECGXFA0pogmKKRlgJHy5AHxU4jwjFtHfqRzlJr8DA-3WSkNahffA5hhO7aZxaqdqbnYLLsJV7aDX8WC7hOAQuviGvJQwrBR_Nlwm8gjPrOlrAFytV5WGwcM5bwB2o6c5IVQt1DS41r7y6OdUheJ9N3yZP0eJ1_jwZLyKRpihEhBCeSSl0iSlJM15gQbNCcpJkKNeFEIXmI5yKFCMsMlrSkuSoyDWlZanyMsdDkB33Cme9d0oz0V4ZjK2D46ZiKGFdPuyQD_vNp9XiP1rjzIa7_Xnh_igY27C13bq6_eo8fPcP3I06kh1J1kiNfwAZrITK |
CitedBy_id | crossref_primary_10_2174_0118763863291395240516093102 crossref_primary_10_3390_electronics13224546 crossref_primary_10_1007_s10515_024_00430_3 crossref_primary_10_1109_TDSC_2024_3451129 |
ContentType | Journal Article |
Copyright | 2022 ECS - The Electrochemical Society |
Copyright_xml | – notice: 2022 ECS - The Electrochemical Society |
DBID | AAYXX CITATION |
DOI | 10.1149/10701.7153ecst |
DatabaseName | CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | CrossRef |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Chemistry |
EISSN | 1938-6737 |
EndPage | 7163 |
ExternalDocumentID | 10_1149_10701_7153ecst 10.1149/10701.7153ecst |
GroupedDBID | 0R~ 29G AATNI ABDNZ ABJNI ACHIP ADNWM AKPSB ALMA_UNASSIGNED_HOLDINGS AOAED ATQHT CJUJL EBS EJD IOP JGOPE KOT MV1 N5L NFQFE REC RHI RNS ROL RPA AAYXX ADEQX CITATION |
ID | FETCH-LOGICAL-c221t-666a4ddcfb37624a93c749da60418f9cc9fa532c2313c47b7b68198f77bbe8b83 |
IEDL.DBID | IOP |
ISSN | 1938-5862 |
IngestDate | Thu Apr 24 23:11:31 EDT 2025 Tue Jul 01 03:47:26 EDT 2025 Wed Aug 21 03:33:28 EDT 2024 Wed May 04 00:50:18 EDT 2022 |
IsPeerReviewed | false |
IsScholarly | true |
Issue | 1 |
Language | English |
License | This article is available under the terms of the IOP-Standard License. |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c221t-666a4ddcfb37624a93c749da60418f9cc9fa532c2313c47b7b68198f77bbe8b83 |
PageCount | 11 |
ParticipantIDs | iop_journals_10_1149_10701_7153ecst crossref_primary_10_1149_10701_7153ecst crossref_citationtrail_10_1149_10701_7153ecst |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 20220424 |
PublicationDateYYYYMMDD | 2022-04-24 |
PublicationDate_xml | – month: 04 year: 2022 text: 20220424 day: 24 |
PublicationDecade | 2020 |
PublicationTitle | ECS transactions |
PublicationTitleAlternate | ECS Trans |
PublicationYear | 2022 |
Publisher | The Electrochemical Society, Inc |
Publisher_xml | – name: The Electrochemical Society, Inc |
SSID | ssj0061147 |
Score | 2.4893053 |
Snippet | Cyber Crime and fraud are growing at a rapid rate and the law practitioners require proper methodology to collect the digital evidences. When the criminals use... |
SourceID | crossref iop |
SourceType | Enrichment Source Index Database Publisher |
StartPage | 7153 |
Title | A Comprehensive Study of XSS Attack and the Digital Forensic Models to Gather the Evidence |
URI | https://iopscience.iop.org/article/10.1149/10701.7153ecst |
Volume | 107 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1bS8MwGA1eHvTFu3gnoOBTRpumSfM4vE3BC8zB8KU0Xxodk21s3YP-epOmlakI4lNLOW3Dl-TLKc13DkInUkhhh0lAQhCa2OwXEsklkIjxAExOtQFX73x7x1sddtONuzNWX73hqEr9DXvqhYJ9CCthW2mPIggbwk7VHCbFPFqMEs6decH1_UOdhLlFCv9D2RUWcVrpNf68_8t6NG_fObO8XK6ip7phfldJvzEtVAPev2k2_qvla2ilIp246YHraC4fbKCls9rrbRM9NbFLDOP8xe9nx2574RseGtxtt3GzKDLo42ygsaWL-Lz37JxGsHP1tGjAzk_tdYKLIb4q-WSJqu1Kt1Dn8uLxrEUq1wUClIYFsd8zGdMajLK5h7JMRiCY1BkPWJgYCSBNFkcULDGMgAklFLesIjFCKJUnKom20cJgOMh3ELbdHauYCuGE2VSiExWaUOexMhqyIFa7iNSxT6GSJHfOGK-pL5eWaRmxtI7YLjr9xI-8GMevyGPbCWk1Hye_ovAXlLvmIKmHpCNt9v70oH20TF1ZRMAIZQdooRhP80NLVgp1VA7LD4B84sw |
linkProvider | IOP Publishing |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1bS-QwFA5eYHdfVl1XdL0FXNinzLZp2jSPgzredWAcGHwpzUmjMjIzOPVh_fWeNK14QVh8aikfaTknOTkl53wfIb-VVBKnScBCkIZh9AuZShSwSCQB2IIbC67f-ew8OeyL40E8qGtzql6Y8aQO_S289UTB3oQ1sa3CqwzClsSlWsC0_DsxdpbMx1ESOer8o4tuE4gTREt_qOyaixJecza-H-PVnjSL732xxXQWvI7qtGImdJUlw9ZDqVvw-Ia38dNfv0i-18knbXvwEpkpRj_I191G822ZXLWpCxD3xY2va6euzPAfHVs66PVouyxzGNJ8ZCimjXTv9topjlCn7olooE5X7W5KyzE9qPLKCtXIlv4k_c7-5e4hq9UXGHAelgz_a3JhDFiNMYiLXEUghTJ5EogwtQpA2TyOOGCCGIGQWuoEs4vUSql1keo0WiFzo_GoWCUU3R7rmEvpCNp0alId2tAUsbYG8iDWa4Q19s-gpiZ3Chl3mW-bVllltayx2hr584yfeFKOD5E76IisXpfTD1H0Fco9c5DMQzJ00q__GmibfOnudbLTo_OTdfKNu06JQDAuNshcef9QbGL-UuqtapY-AbR36DA |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Comprehensive+Study+of+XSS+Attack+and+the+Digital+Forensic+Models+to+Gather+the+Evidence&rft.jtitle=ECS+transactions&rft.au=Kumar%2C+Saurabh&rft.au=Pathak%2C+S.K.&rft.au=Singh%2C+Jagendra&rft.date=2022-04-24&rft.issn=1938-5862&rft.eissn=1938-6737&rft.volume=107&rft.issue=1&rft.spage=7153&rft.epage=7163&rft_id=info:doi/10.1149%2F10701.7153ecst&rft.externalDBID=n%2Fa&rft.externalDocID=10_1149_10701_7153ecst |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1938-5862&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1938-5862&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1938-5862&client=summon |