{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T11:51:56Z","timestamp":1775044316643,"version":"3.50.1"},"reference-count":49,"publisher":"MDPI AG","issue":"12","license":[{"start":{"date-parts":[[2024,12,23]],"date-time":"2024-12-23T00:00:00Z","timestamp":1734912000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Northern Border University, Arar, KSA"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>As the Internet of Things (IoT) expands rapidly and 5G networks become more widespread, the need for strong cybersecurity measures in IoT systems has become increasingly critical. Traditional security methods are no longer sufficient due to the shear volume, diversity, and limited processing capabilities of IoT devices. The high data transmission speeds of 5G networks further intensify the potential risks, making it essential to implement effective security measures. One of the major threats to IoT systems is Cross-Site Scripting (XSS) attacks. To address this issue, we introduce a new machine learning (ML) approach designed to detect and predict XSS attacks on IoT systems operating over 5G networks. By using ML classifiers, particularly the Random Forest classifier, our approach achieves a high classification accuracy of 99.89% in identifying XSS attacks. This research enhances IoT security by addressing the emerging challenges posed by 5G networks and XSS attacks, ensuring the safe operation of IoT devices within the 5G ecosystem through early detection and prevention of vulnerabilities.<\/jats:p>","DOI":"10.3390\/fi16120482","type":"journal-article","created":{"date-parts":[[2024,12,23]],"date-time":"2024-12-23T10:06:52Z","timestamp":1734948412000},"page":"482","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["A Robust Machine Learning Model for Detecting XSS Attacks on IoT over 5G Networks"],"prefix":"10.3390","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-5389-6778","authenticated-orcid":false,"given":"Mahmoud","family":"AlJamal","sequence":"first","affiliation":[{"name":"Department of Cybersecurity, Science and Information Technology, Irbid National University, Irbid 21110, Jordan"},{"name":"Department of Information Technology, Faculty of Prince Al-Hussien bin Abdullah, Hashemite University, Zarqa 13133, Jordan"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-2992-5404","authenticated-orcid":false,"given":"Rabee","family":"Alquran","sequence":"additional","affiliation":[{"name":"Department of Information Technology, Faculty of Prince Al-Hussien bin Abdullah, Hashemite University, Zarqa 13133, Jordan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9075-2828","authenticated-orcid":false,"given":"Ayoub","family":"Alsarhan","sequence":"additional","affiliation":[{"name":"Department of Information Technology, Faculty of Prince Al-Hussien bin Abdullah, Hashemite University, Zarqa 13133, Jordan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9486-3533","authenticated-orcid":false,"given":"Mohammad","family":"Aljaidi","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Faculty of Information Technology, Zarqa University, Zarqa 13110, Jordan"}]},{"given":"Mohammad","family":"Alhmmad","sequence":"additional","affiliation":[{"name":"Department of Information Technology, Faculty of Prince Al-Hussien bin Abdullah, Hashemite University, Zarqa 13133, Jordan"}]},{"given":"Wafa\u2019 Q.","family":"Al-Jamal","sequence":"additional","affiliation":[{"name":"Faculty of Science and Technology (FST), Universiti Sains Islam Malaysia (USIM), Nilai 71800, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5948-4260","authenticated-orcid":false,"given":"Nasser","family":"Albalawi","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Faculty of Computing and Information Technology, Northern Border University, Rafha 91911, Saudi Arabia"}]}],"member":"1968","published-online":{"date-parts":[[2024,12,23]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Ros\u00e1rio, A.T., and Raimundo, R. (2024). Internet of Things and Distributed Computing Systems in Business Models. Future Internet, 16.","DOI":"10.20944\/preprints202409.0052.v1"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"12803","DOI":"10.1109\/TII.2024.3424517","article-title":"IoT-Enabled Real-Time Health Monitoring via Smart Textile Integration With LoRa Technology Across Diverse Environments","volume":"20","author":"Iman","year":"2024","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Djenna, A., Harous, S., and Saidouni, D.E. (2021). Internet of things meet internet of threats: New concern cyber security issues of critical cyber infrastructure. Appl. Sci., 11.","DOI":"10.3390\/app11104580"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Aljaidi, M., Kaiwartya, O., Samara, G., Alsarhan, A., Mahmud, M., Alenezi, S.M., Alazaidah, R., and Lloret, J. (2024). Green Communication in IoT for Enabling Next-Generation Wireless Systems. Computers, 13.","DOI":"10.3390\/computers13100251"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"9304689","DOI":"10.1155\/2022\/9304689","article-title":"Intrusion detection system on IoT with 5G network using deep learning","volume":"2022","author":"Yadav","year":"2022","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Shahjehan, W., Rathore, R.S., Shah, S.W., Aljaidi, M., Sadiq, A.S., and Kaiwartya, O. (2024). A Review on Millimeter-Wave Hybrid Beamforming for Wireless Intelligent Transport Systems. Future Internet, 16.","DOI":"10.3390\/fi16090337"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"1026","DOI":"10.1109\/TGCN.2024.3396454","article-title":"ORAN-B5G: A next generation open radio access network architecture with machine learning for beyond 5G in industrial 5.0","volume":"8","author":"Khan","year":"2024","journal-title":"IEEE Trans. Green Commun. Netw."},{"key":"ref_8","first-page":"201","article-title":"Integrated shared random key agreement protocol for wireless sensor network","volume":"21","author":"Thanganadar","year":"2024","journal-title":"Int. Arab J. Inf. Technol."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Saif, M.B., Migliorini, S., and Spoto, F. (2024). A Survey on Data Availability in Layer 2 Blockchain Rollups: Open Challenges and Future Improvements. Future Internet, 16.","DOI":"10.3390\/fi16090315"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Fakhouri, H.N., Alawadi, S., Awaysheh, F.M., Hani, I.B., Alkhalaileh, M., and Hamad, F. (2023). A comprehensive study on the role of machine learning in 5G security: Challenges, technologies, and solutions. Electronics, 12.","DOI":"10.3390\/electronics12224604"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"13125","DOI":"10.1109\/ACCESS.2024.3352508","article-title":"Towards a secure 5G-enabled Internet of Things: A survey on requirements, privacy, security, challenges, and opportunities","volume":"12","author":"Ahmed","year":"2024","journal-title":"IEEE Access"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"16449","DOI":"10.1109\/TITS.2024.3416300","article-title":"Profit maximization of independent task offloading in MEC-enabled 5G internet of vehicles","volume":"25","author":"Sun","year":"2024","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"1065","DOI":"10.1109\/JSAC.2014.2328098","article-title":"What will 5G be?","volume":"32","author":"Andrews","year":"2014","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1016\/j.future.2019.08.009","article-title":"Intelligence and security in big 5G-oriented IoNT: An overview","volume":"102","year":"2020","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Dolente, F., Garroppo, R.G., and Pagano, M. (2023). A Vulnerability Assessment of Open-Source Implementations of Fifth-Generation Core Network Functions. Future Internet, 16.","DOI":"10.3390\/fi16010001"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"De Donno, M., Giaretta, A., Dragoni, N., Bucchiarone, A., and Mazzara, M. (2019). Cyber-storms come from clouds: Security of cloud computing in the IoT era. Future Internet, 11.","DOI":"10.3390\/fi11060127"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Malik, A., Parihar, V., Bhushan, B., Chaganti, R., Bhatia, S., and Astya, P.N. (2023). Security Services for Wireless 5G Internet of Things (IoT) Systems. 5G and Beyond, Springer Nature.","DOI":"10.1007\/978-981-99-3668-7_9"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"G\u00f3mez, A., and Mu\u00f1oz, A. (2023). Deep learning-based attack detection and classification in Android devices. Electronics, 12.","DOI":"10.3390\/electronics12153253"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"6377","DOI":"10.1109\/TIFS.2024.3414339","article-title":"MTDroid: A Moving Target Defense based Android Malware Detector against Evasion Attacks","volume":"19","author":"Zhou","year":"2024","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"169","DOI":"10.2528\/PIERC24022708","article-title":"Recent Trends in Compact Planar Antennas at 5G Sub-6 GHz and mmWave Frequency Bands for Automotive Wireless Applications: A Review","volume":"143","author":"Kumar","year":"2024","journal-title":"Prog. Electromagn. Res. C"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Madanian, S., Chinbat, T., Subasinghage, M., Airehrour, D., Hassandoust, F., and Yongchareon, S. (2024). Health IoT Threats: Survey of Risks and Vulnerabilities. Future Internet, 16.","DOI":"10.3390\/fi16110389"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Kim, J., and Park, J. (2023). Enhancing security of web-based ioT services via XSS vulnerability detection. Sensors, 23.","DOI":"10.3390\/s23239407"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"2250222","DOI":"10.1142\/S021812662250222X","article-title":"XSS Armor: Constructing XSS defensive framework for preserving big data privacy in internet-of-things (IoT) networks","volume":"31","author":"Chaudhary","year":"2022","journal-title":"J. Circuits, Syst. Comput."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"699","DOI":"10.1109\/TIFS.2022.3228493","article-title":"Application of a dynamic line graph neural network for intrusion detection with semisupervised learning","volume":"18","author":"Duan","year":"2022","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"101685","DOI":"10.1016\/j.phycom.2022.101685","article-title":"Injection attack detection using machine learning for smart IoT applications","volume":"52","author":"Gaber","year":"2022","journal-title":"Phys. Commun."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Rezvy, S., Luo, Y., Petridis, M., Lasebae, A., and Zebin, T. (2019, January 20\u201322). An efficient deep learning model for intrusion classification and prediction in 5G and IoT networks. Proceedings of the 2019 53rd Annual Conference on Information Sciences and Systems (CISS), Baltimore, MD, USA.","DOI":"10.1109\/CISS.2019.8693059"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Awad, M., Fraihat, S., Salameh, K., and Al Redhaei, A. (2022). Examining the suitability of NetFlow features in detecting IoT network intrusions. Sensors, 22.","DOI":"10.3390\/s22166164"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1007\/s11036-021-01843-0","article-title":"Towards a standard feature set for network intrusion detection system datasets","volume":"27","author":"Sarhan","year":"2022","journal-title":"Mob. Netw. Appl."},{"key":"ref_29","unstructured":"Komisarek, M., Pawlicki, M., Simic, T., Kavcnik, D., Kozik, R., and Chora\u015b, M. (September, January 29). Modern netflow network dataset with labeled attacks and detection methods. Proceedings of the 18th International Conference on Availability, Reliability and Security, Benevento, Italy."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"1","DOI":"10.55248\/gengpi.5.1124.3352","article-title":"Predictive Analytics for Cyber Threat Intelligence in Fintech Using Big Data and Machine Learning","volume":"5","author":"Ekundayo","year":"2024","journal-title":"Int. J. Res. Publ. Rev"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Ahmed, T., Arefin, S., Parvez, R., Jahin, F., Sumaiya, F., and Hasan, M. (June, January 30). Advancing Mobile Sensor Data Authentication: Application of Deep Machine Learning Models. Proceedings of the 2024 IEEE International Conference on Electro Information Technology (eIT), Eau Claire, WI, USA.","DOI":"10.1109\/eIT60633.2024.10609953"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"5920716","DOI":"10.1109\/TGRS.2024.3427364","article-title":"A deep learning object detection method for fracture identification using conventional well logs","volume":"62","author":"Dong","year":"2024","journal-title":"IEEE Trans. Geosci. Remote Sens."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Seada, Y., Mohamed, A., Hany, M., Mansour, H., and Elsersy, W. (2024, January 13\u201314). A Machine Learning Approach to SQL Injection Detection in Web Applications. Proceedings of the 2024 Intelligent Methods, Systems, and Applications (IMSA), Giza, Egypt.","DOI":"10.1109\/IMSA61967.2024.10652763"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"12675","DOI":"10.1007\/s00521-023-08383-6","article-title":"Wrapper-based optimized feature selection using nature-inspired algorithms","volume":"35","author":"Karlupia","year":"2023","journal-title":"Neural Comput. Appl."},{"key":"ref_35","first-page":"5006614","article-title":"Angular tracking consistency guided fast feature association for visual-inertial slam","volume":"73","author":"Xie","year":"2024","journal-title":"IEEE Trans. Instrum. Meas."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"149","DOI":"10.3991\/ijim.v18i21.50843","article-title":"Optimizing Electric Vehicle Charging Infrastructure through Machine Learning: A Study of Charging Patterns and Energy Consumption","volume":"18","author":"Alsarhan","year":"2024","journal-title":"Int. J. Interact. Mob. Technol."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"El Aboudi, N., and Benhlima, L. (2016, January 22\u201324). Review on wrapper feature selection approaches. Proceedings of the 2016 International Conference on Engineering & MIS (ICEMIS), Agadir, Morocco.","DOI":"10.1109\/ICEMIS.2016.7745366"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"40281","DOI":"10.1109\/ACCESS.2022.3165809","article-title":"Edge-IIoTset: A new comprehensive realistic cyber security dataset of IoT and IIoT applications for centralized and federated learning","volume":"10","author":"Ferrag","year":"2022","journal-title":"IEEE Access"},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Cherrington, M., Thabtah, F., Lu, J., and Xu, Q. (2019, January 3\u20134). Feature selection: Filter methods performance challenges. Proceedings of the 2019 International Conference on Computer and Information Sciences (ICCIS), Sakaka, Saudi Arabia.","DOI":"10.1109\/ICCISci.2019.8716478"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"86716","DOI":"10.1109\/ACCESS.2024.3416838","article-title":"A Survey of Decision Trees: Concepts, Algorithms, and Applications","volume":"12","author":"Mienye","year":"2024","journal-title":"IEEE Access"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Mienye, I.D., and Jere, N. (2024). Optimized ensemble learning approach with explainable AI for improved heart disease prediction. Information, 15.","DOI":"10.3390\/info15070394"},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Subasi, A., Alickovic, E., and Kevric, J. Diagnosis of chronic kidney disease by using random forest. Proceedings of the CMBEBIH 2017: Proceedings of the International Conference on Medical and Biological Engineering 2017.","DOI":"10.1007\/978-981-10-4166-2_89"},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Rahman, M.M., Gupta, D., Bhatt, S., Shokouhmand, S., and Faezipour, M. (2024). A Comprehensive Review of Machine Learning Approaches for Anomaly Detection in Smart Homes: Experimental Analysis and Future Directions. Future Internet, 16.","DOI":"10.3390\/fi16040139"},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Su, B., and Liang, J. (2024). Research on Secure Community Opportunity Network Based on Trust Model. Future Internet, 16.","DOI":"10.3390\/fi16040121"},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Xia, L., Zheng, P., Herrera, M., Liang, Y., Li, X., and Gao, L. (2024). Graph Embedding-Based Bayesian Network for Fault Isolation in Complex Equipment. IEEE Trans. Reliab., early access.","DOI":"10.1109\/TR.2024.3416064"},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Luo, Y. (2024). Improvement and Research of Naive Bayes Classification Based on Unbalanced Data Sets. International Conference on Computing, Control and Industrial Engineering, Springer Nature.","DOI":"10.1007\/978-981-97-6937-7_3"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"112056","DOI":"10.1016\/j.asoc.2024.112056","article-title":"Advancing cardiac diagnostics: Exceptional accuracy in abnormal ECG signal classification with cascading deep learning and explainability analysis","volume":"165","author":"Zeng","year":"2024","journal-title":"Appl. Soft Comput."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"73481","DOI":"10.1109\/ACCESS.2024.3400211","article-title":"Maloid-DS: Labeled Dataset for Android Malware Forensics","volume":"12","author":"Almomani","year":"2024","journal-title":"IEEE Access"},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Imran, M., Appice, A., and Malerba, D. (2024). Evaluating Realistic Adversarial Attacks against Machine Learning Models for Windows PE Malware Detection. Future Internet, 16.","DOI":"10.3390\/fi16050168"}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/16\/12\/482\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T16:58:38Z","timestamp":1760115518000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/16\/12\/482"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,23]]},"references-count":49,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["fi16120482"],"URL":"https:\/\/doi.org\/10.3390\/fi16120482","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,23]]}}}