[go: up one dir, main page]

Chughtai et al., 2024 - Google Patents

Deep learning trends and future perspectives of web security and vulnerabilities

Chughtai et al., 2024

View PDF @Full View
Document ID
14068984863245617976
Author
Chughtai M
Bibi I
Karim S
Shah S
Laghari A
Khan A
Publication year
Publication venue
Journal of High Speed Networks

External Links

Snippet

Web applications play a vital role in modern digital world. Their pervasiveness is mainly underpinned by numerous technological advances that can often lead to misconfigurations, thereby opening a way for a variety of attack vectors. The rapid development of E-commerce …
Continue reading at journals.sagepub.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Similar Documents

Publication Publication Date Title
Abikoye et al. A novel technique to prevent SQL injection and cross-site scripting attacks using Knuth-Morris-Pratt string match algorithm
US11621953B2 (en) Dynamic risk detection and mitigation of compromised customer log-in credentials
Kumari et al. Verification and validation techniques for streaming big data analytics in internet of things environment
Alani Big data in cybersecurity: a survey of applications and future trends
US20210058395A1 (en) Protection against phishing of two-factor authentication credentials
US20190243951A1 (en) Stateless web content anti-automation
US20200053111A1 (en) Artifact modification and associated abuse detection
US20210203693A1 (en) Phishing detection based on modeling of web page content
Gupta et al. Cross-site scripting attacks: classification, attack, and countermeasures
Ávila et al. Use of security logs for data leak detection: a systematic literature review
Kellezi et al. Securing Open Banking with Model‐View‐Controller Architecture and OWASP
US11470114B2 (en) Malware and phishing detection and mediation platform
Ahmed et al. PhishCatcher: client-side defense against web spoofing attacks using machine learning
Nagpal et al. SECSIX: security engine for CSRF, SQL injection and XSS attacks
Chughtai et al. Deep learning trends and future perspectives of web security and vulnerabilities
Aswathy et al. Privacy breaches through cyber vulnerabilities: Critical issues, open challenges, and possible countermeasures for the future
Rana et al. Ransomware attacks in cyber-physical systems: countermeasure of attack vectors through automated web defenses
Gehling et al. eCommerce security
Perumal et al. Cybercrime issues in smart cities networks and prevention using ethical hacking
Kshetri et al. algoXSSF: Detection and analysis of cross-site request forgery (XSRF) and cross-site scripting (XSS) attacks via Machine learning algorithms
Shahriar et al. Mobile anti-phishing: Approaches and challenges
Debnath et al. A comprehensive survey on mobile browser security issues, challenges and solutions
Zhao et al. Network security model based on active defense and passive defense hybrid strategy
Varshney et al. Detecting spying and fraud browser extensions: Short paper
Qiu et al. Covering the Monitoring Network: A Unified Framework to Protect E‐Commerce Security