Sharma, 2023 - Google Patents
A study of vulnerability scanners for detecting SQL injection and XSS attack in websitesSharma, 2023
View PDF- Document ID
- 15661827855669164683
- Author
- Sharma S
- Publication year
- Publication venue
- Artificial Intelligence and Applications
External Links
Snippet
In the modern world, the internet makes our lives easier. Making use of online services like social media, online banking, and online shopping can provide information while also saving time and resources. As the user's information is then accessible on the website …
- 238000002347 injection 0 title description 17
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2119—Authenticating web pages, e.g. with suspicious links
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Ayeni et al. | Detecting Cross‐Site Scripting in Web Applications Using Fuzzy Inference System | |
| US20120017274A1 (en) | Web scanning site map annotation | |
| Malviya et al. | On security issues in web applications through cross site scripting (XSS) | |
| Nagpal et al. | SECSIX: security engine for CSRF, SQL injection and XSS attacks | |
| Gupta et al. | Automated discovery of JavaScript code injection attacks in PHP web applications | |
| SatheeshKumar et al. | A lightweight and proactive rule-based incremental construction approach to detect phishing scam | |
| Fadlil et al. | Mitigation from SQL Injection Attacks on Web Server using Open Web Application Security Project Framework | |
| Spett | Cross-site scripting | |
| Kollepalli et al. | An Experimental Study on Detecting and Mitigating Vulnerabilities in Web Applications. | |
| Swire et al. | Risks to cybersecurity from data localization, organized by techniques, tactics and procedures | |
| Kshetri et al. | algoXSSF: Detection and analysis of cross-site request forgery (XSRF) and cross-site scripting (XSS) attacks via Machine learning algorithms | |
| Sharma | A study of vulnerability scanners for detecting SQL injection and XSS attack in websites | |
| Al-Sanea et al. | Security evaluation of Saudi Arabia's websites using open source tools | |
| Roopak et al. | On effectiveness of source code and SSL based features for phishing website detection | |
| Anas et al. | Survey on detecting and preventing web application broken access control attacks | |
| Sagala et al. | Testing and comparing result scanning using web vulnerability scanner | |
| Bhalme et al. | Cyber attack detection and implementation of prevention methods for web application | |
| Odion et al. | VulScan: A web-based vulnerability multi-scanner for web application | |
| Muralidharan et al. | W3BnNr: An Automated tool for information gathering, vulnerability scanning, attacking and reporting for injection attacks on web application | |
| Singh et al. | Attacks on vulnerable web applications | |
| Abazi et al. | Practical analysis on the algorithm of the Cross-Site Scripting Attacks | |
| Mehta et al. | Model to prevent websites from xss vulnerabilities | |
| Alanda et al. | Cross-Site Scripting (XSS) Vulnerabilities in Modern Web Applications | |
| Rifat et al. | Vulnerabilities Assessment of Financial and Government Websites: A Developing Country Perspective | |
| Ismaila et al. | Vulnerability assessment of some key nigeria government websites |