Welcome to Scholar Publishing Group

International Journal of Multimedia Computing, 2025, 6(1); doi: 10.38007/IJMC.2025.060108.

Development and Function Extension Analysis of Computer Platform Based on JSP and JavaScript

Author(s)

Jiaji Zhou

Corresponding Author:
Jiaji Zhou
Affiliation(s)

College of Art and Design, Changchun Humanities and Sciences College, Changchun 130000, Jilin, China

Abstract

With the development of big data, cloud computing, and artificial intelligence technologies, web applications have become important carriers of human-computer interaction. However, their security threats continue to escalate, with attack types expanding from traditional SQL injection and cross site scripting (XSS) to new types of file free attacks, deserialization vulnerability exploitation, etc. The security of software supply chains is out of control, attack methods are diversified, and attack targets are shifting towards data trafficking and malicious code implantation, posing serious challenges to the security of individuals, enterprises, and critical infrastructure. This article is based on the development and functional extension analysis of computer platforms using JSP and JavaScript, focusing on two main threats: web vulnerabilities and web malicious code. Combining traditional program analysis and machine learning techniques, innovative detection methods are proposed: for traditional web vulnerabilities (such as XSS), a gray box fuzzy testing method based on reinforcement learning is proposed. Through static analysis to locate injection points, structured partitioning of attack payloads, and optimization of reinforcement learning models, the experimental detection rate reaches 93.75%, which is better than mainstream scanners; To address the new Java deserialization vulnerability, a hybrid attribute graph model was constructed and the exploitation chain was searched, achieving a detection rate of 80%; Targeting traditional file based malicious code (JavaScript), combining semantic analysis with BiLSTM model, generating semantic slices through program dependency graph and optimizing input with optimal accuracy; A hybrid method of dynamic monitoring, security sensitivity, and lightweight taint analysis was used to detect malicious code on the Java file free web shell, achieving a detection rate of 81.33%. The research aims to improve detection efficiency and accuracy, and respond to the evolving threats of network attacks. Future work will focus on the transferability of detection models, improvement of program analysis accuracy, establishment of standard test sets, and research on code obfuscation mitigation techniques.

Keywords

JavaScript platform development; Web application security detection; Vulnerability detection; Malicious code detection; Mixed attribute graph model

Cite This Paper

Jiaji Zhou. Development and Function Extension Analysis of Computer Platform Based on JSP and JavaScript. International Journal of Multimedia Computing (2025), Vol. 6, Issue 1: 81-92. https://doi.org/10.38007/IJMC.2025.060108.

References

[1] Chen, X. (2025). Research on the Application of Multilingual Natural Language Processing Technology in Smart Home Systems. Journal of Computer, Signal, and System Research, 2(5), 8-14.

[2] Hui, X. (2025). Research on Improving the Matching Efficiency between Cancer Patients and Clinical Trials Based on Machine Learning Algorithms. Journal of Medicine and Life Sciences, 1(3), 74-80.

[3] Pan Y. Research on Cloud Storage Data Access Control Based on the CP-ABE Algorithm[J]. Pinnacle Academic Press Proceedings Series, 2025, 2: 122-129.

[4] Shen, D. (2025). AI-Driven Clinical Decision Support Optimizes Treatment Accuracy for Mental Illness. Journal of Medicine and Life Sciences, 1(3), 81-87.

[5] Yan J. Analysis and Application of Spark Fast Data Recommendation Algorithm Based on Hadoop Platform[C]//2025 Asia-Europe Conference on Cybersecurity, Internet of Things and Soft Computing (CITSC). IEEE, 2025: 872-876.

[6] Huang J. Digital Technologies Enabling Rural Revitalization: The Practice of AI and BIM in the Adaptive Reuse of Historic Buildings[J]. International Journal of Architectural Engineering and Design, 2025, 2(1): 1-8.

[7] Jiang Y. Research on the Optimization of Digital Object System by Integrating Metadata Standard and Machine Learning Algorithm[J]. Procedia Computer Science, 2025, 262: 849-858.

[8] An C. Research on High Frequency Financial Transaction Data Modeling and Cloud Computing Implementation Based on SSA-GA-BP Model[J]. Procedia Computer Science, 2025, 262: 859-867.

[9] Zhang M. Design of Object Segmentation and Feature Extraction Based On Deep Learning for AFM Image Processing and Analysis System[J]. Procedia Computer Science, 2025, 262: 982-991.

[10] Lai L. Research and Design of Data Security Risk Assessment Model Based on Fusion of Deep Learning and Analytic Hierarchy Process (AHP)[J]. Procedia Computer Science, 2025, 262: 747-756.

[11] Cai Y. Design and Implementation of a Cross Platform i0s Application Development Framework Based on YAI Configuration Files[J]. Procedia Computer Science, 2025, 262: 939-947.

[12] Wei X. Research on Preprocessing Techniques for Software Defect Prediction Dataset Based on Hybrid Category Balance and Synthetic Sampling Algorithm[J]. Procedia Computer Science, 2025, 262: 840-848.

[13] Wang C. Research on Modeling and Forecasting High-Frequency Financial Data Based on Histogram Time Series[J]. Procedia Computer Science, 2025, 262: 894-900.

[14] Pan H. Design and Implementation of a Cloud Computing Privacy-Preserving Machine Learning Model for Multi-Key Fully Homomorphic Encryption[J]. Procedia Computer Science, 2025, 262: 887-893.

[15] Zhang Y. Research on the Application and Optimization of Multi Dimensional Data Model Based on Kylin in Enterprise Technology Management[C]//International Conference on Innovative Computing. Springer, Singapore, 2025: 234-241.

[16] Hao, Linfeng. "Research on Automatic Driving Road Object Detection Algorithm Integrating Multi Scale Detection and Boundary Box Regression Optimization." In 2025 4th International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE), pp. 1-6. IEEE, 2025.

[17] Tu, Xinran. "Feature Selection and Classification of Electronic Product Fault Short Text by Integrating TF-IDF and Wor D2vec." In 2025 4th International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE), pp. 1-6. IEEE, 2025.

[18] Jiang, Yixian. "Research on Random Sampling Data Diffusion Technique in the Construction of Digital Object System Test Dataset." In 2025 4th International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE), pp. 1-6. IEEE, 2025.

[19] Fu, Yilin. "Design and Empirical Analysis of Financial Quantitative Trading Model based on VMD-DCNN-SGRU Architecture and Integrated System." In 2025 4th International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE), pp. 1-7. IEEE, 2025.

[20] Zhou, Yixin. "Design and Implementation of Online Log Anomaly Detection Model based on Text CM and Hierarchical Attention Mechanism." In 2025 4th International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE), pp. 1-6. IEEE, 2025.

[21] Yuan S. Design and Optimization of Network Security Situation Awareness Algorithm for Generative Adversarial Networks Targeting Attack Data and Traffic [C]//2025 4th International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE). IEEE, 2025: 1-6.

[22] Guo Y. Research on Investment Bank Risk Monitoring and Early Warning Model Combining Factor Analysis and Artificial Neural Network[J]. Procedia Computer Science, 2025, 262: 878-886.

[23] Cui N. Research and Application of Traffic Simulation Optimization Algorithm Based on Improved Road Network Topology Structure[C]//The International Conference on Cyber Security Intelligence and Analytics. Springer, Cham, 2025: 156-163.

[24] Yang D, Liu X. Collaborative Algorithm for User Trust and Data Security Based on Blockchain and Machine Learning[J]. Procedia Computer Science, 2025, 262: 757-765.

[25] Zhang X. Optimization and Implementation of Time Series Dimensionality Reduction Anti-fraud Model Integrating PCA and LSTM under the Federated Learning Framework[J]. Procedia Computer Science, 2025, 262: 992-1001.

[26] Huang, Jiangnan. "Online Platform user Behavior Prediction and Decision Optimization based on Deep Reinforcement Learning." In 2025 4th International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE), pp. 1-6. IEEE, 2025.

[27] Chen, H., Yang, Y., & Shao, C. (2021). Multi-task learning for data-efficient spatiotemporal modeling of tool surface progression in ultrasonic metal welding. Journal of Manufacturing Systems, 58, 306-315.

[28] Chen, H., Wang, Z., & Han, A. (2024). Guiding Ultrasound Breast Tumor Classification with Human-Specified Regions of Interest: A Differentiable Class Activation Map Approach. In 2024 IEEE Ultrasonics, Ferroelectrics, and Frequency Control Joint Symposium (UFFC-JS) (pp. 1-4). IEEE.

[29] Varatharajah, Y., Chen, H., Trotter, A., & Iyer, R. K. (2020). A Dynamic Human-in-the-loop Recommender System for Evidence-based Clinical Staging of COVID-19. In HealthRecSys@ RecSys (pp. 21-22).

[30] Chen, H., Zuo, J., Zhu, Y., Kabir, M. R., & Han, A. (2024). Polar-Space Frequency-Domain Filtering for Improved Pulse-echo Speed of Sound Imaging with Convex Probes. In 2024 IEEE Ultrasonics, Ferroelectrics, and Frequency Control Joint Symposium (UFFC-JS) (pp. 1-4). IEEE.

[31] Wei Z. Construction of Supply Chain Finance Game Model Based on Blockchain Technology and Nash Equilibrium Analysis[J]. Procedia Computer Science, 2025, 262: 901-908.

[32] Yang, D., & Liu, X. (2025). Research on Large-Scale Data Processing and Dynamic Content Optimization Algorithm Based On Reinforcement Learning. Procedia Computer Science, 261, 458-466.

[33] Ma, Zhuoer. "Research and Development of Financial Contract Text Information Extraction System based on M-BiLSTM and Our-M Models." In 2025 4th International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE), pp. 1-7. IEEE, 2025.

[34] Chen, H., Zhu, Y., Zuo, J., Kabir, M. R., & Han, A. (2024). TranSpeed: Transformer-based Generative Adversarial Network for Speed-of-sound Reconstruction in Pulse-echo Mode. In 2024 IEEE Ultrasonics, Ferroelectrics, and Frequency Control Joint Symposium (UFFC-JS) (pp. 1-4). IEEE.

[35] Chen A. Research on Intelligent Code Search Technology Based on Deep Learning[J]. Pinnacle Academic Press Proceedings Series, 2025, 2: 137-143.

[36] Pan Y. Research on the Design of a Real-Time E-Commerce Recommendation System Based on Spark in the Context of Big Data[C]//2025 IEEE International Conference on Electronics, Energy Systems and Power Engineering (EESPE). IEEE, 2025: 1028-1033.

[37] Xiu L. Research on the Design of Modern Distance Education System Based on Agent Technology[J]. Pinnacle Academic Press Proceedings Series, 2025, 2: 160-169.

[38] Yan J. Research on Application of Big Data Mining and Analysis in Image Processing[J]. Pinnacle Academic Press Proceedings Series, 2025, 2: 130-136.

[39] Xiu L. Analyses of Online Learning Behaviour Based on Linear Regression Algorithm[C]//2025 IEEE International Conference on Electronics, Energy Systems and Power Engineering (EESPE). IEEE, 2025: 1333-1338.

[40] Ren B. Research Progress of Content Generation Model Based on EEG Signals[J]. Journal of Computer, Signal, and System Research, 2025, 2(4): 97-103.

[41] Liu Y. The Impact of Financial Data Automation on the Improvement of Internal Control Quality in Enterprises[J]. European Journal of Business, Economics & Management, 2025, 1(2): 25-31.

[42] Hua X. Optimizing Game Conversion Rates and Market Response Strategies Based on Data Analysis[J]. European Journal of AI, Computing & Informatics, 2025, 1(2): 37-43.

[43] Zhou Y. Research on the Innovative Application of Fintech and AI in Energy Investment[J]. European Journal of Business, Economics & Management, 2025, 1(2): 76-82.

[44] Huang J. Resource Demand Prediction and Optimization Based on Time Series Analysis in Cloud Computing Platform[J]. Journal of Computer, Signal, and System Research, 2025, 2(5): 1-7.

[45] Sheng C. Research on AI-Driven Financial Audit Efficiency Improvement and Financial Report Accuracy[J]. European Journal of Business, Economics & Management, 2025, 1(2): 55-61.