36
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Count vectorizer model based web application vulnerability detection using artificial intelligence approach

&

References

  • B. Zukran and M. M. Siraj, “Performance Comparison on SQL Injection and XSS Detection using Open Source Vulnerability Scanners,” 2021 International Conference on Data Science and Its Applications (ICoDSA), 2021, pp. 61-65, doi: 10.1109/ICoDSA53588.2021.9617484.
  • C. Zhang, X. Lin, J. Chen and Y. Geng, “Dirmap: Web Application Vulnerability Detection Platform Based on Script Code,” 2021 IEEE 21st International Conference on Software Quality, Reliability and Security Companion (QRS-C), 2021, pp. 148-151, doi: 10.1109/QRS-C55045.2021.00030.
  • E. Shaji and N. Subramanian, “Assessing Non-Intrusive Vulnerability Scanning Methodologies for Detecting Web Application Vulnerabilities on Large Scale,” 2021 International Conference on System, Computation, Automation and Networking (ICSCAN), 2021, pp. 1-5, doi: 10.1109/ICSCAN53069.2021.9526423.
  • S. Manhas, “Ontology of XSS Vulnerabilities and its Detection using XENOTIX Framework,” 2021 10th International Conference on System Modeling & Advancement in Research Trends (SMART), 2021, pp. 320-323, doi: 10.1109/SMART52563.2021.9676332.
  • A. Kalim, C. K. Jha, D. S. Tomar and D. R. Sahu, “Novel Detection Technique For Framejacking Vulnerabilities In Web Applications,” 2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM), 2021, pp. 265-270, doi: 10.1109/ICCAKM50778.2021.9357764.
  • Lokesh Raju S.; Santosh Sheshware; Ruchit R. Patel, “8 Use ModSecurity Web Application Firewall to Mitigate OWASP’s Top 10 Web Application Vulnerabilities,” in Implementing Enterprise Cybersecurity with Open-Source Software and Standard Architecture, River Publishers, 2021, pp.193-235.
  • V. Prokhorenko, K.-K.-R. Choo and H. Ashman, “Context-oriented Web application protection model”, Appl. Math. Comput., vol. 285, pp. 59-78, Jul. 2016. doi: 10.1016/j.amc.2016.03.026
  • J. Thome, “A scalable and accurate hybrid vulnerability analysis framework”, Proc. IEEE Int. Symp. Softw. Rel. Eng. Workshops (ISSREW), pp. 2-5, Nov. 2015.
  • N. Palsetia, G. Deepa, F. Ahmed Khan, P. S. Thilagam and A. R. Pais, “Securing native XML database-driven Web applications from XQuery injection vulnerabilities”, J. Syst. Softw., vol. 122, pp. 93-109, Dec. 2016. doi: 10.1016/j.jss.2016.08.094
  • N. Balaji, “Appraisal and analysis on diversified Web service selection techniques based on QoS factors”, Int. J. Eng. Technol., vol. 5, no. 3, pp. 3012-3019, 2013.
  • B. Natarajan, M. S. Obaidat, B. Sadoun, R. Manoharan, S. Ramachandran and N. Velusamy, “New clustering-based semantic service selection and user preferential model”, IEEE Syst. J., pp. 1-9, 2020.
  • S. Calzavara, R. Focardi, M. Squarcina and M. Tempesta, “Surviving the Web : A Journey into Web Session Security Surviving the Web”, ACM Comput. Surv, vol. 50, no. 1, pp. 1-34, 2017. doi: 10.1145/3038923
  • R. Kumar, K. Indraveni and A. K. Goel, “Automated Session Fixation Vulnerability Detection in Web Applications using the Set-Cookie HTTP response header in cookies”, Proceedings of the 7th International Conference on Security of Information and Networks, pp. 351-354, 2014.
  • R. Lukanta, Y. Asnar and A. I. Kistijantoro, “A vulnerability scanning tool for session management vulnerabilities”, in 2014 International Conference on Data and Software Engineering (ICODSE), pp. 1-6, 2014.
  • Y. Takamatsu, Y. Kosuga and K. Kono, “Automated detection of session fixation vulnerabilities”, WWW‘10 Proceedings of the 19th international conference on World wide web, pp. 1191-1192, 2010.
  • S. Calzavara, R. Focardi, M. Squarcina and M. Tempesta, “Surviving the Web : A Journey into Web Session Security Surviving the Web”, ACM Comput. Surv, vol. 50, no. 1, pp. 1-34, 2017. doi: 10.1145/3038923

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.