Securing web applications from injection and logic vulnerabilities: Approaches and challenges

G Deepa, PS Thilagam - Information and Software Technology, 2016 - Elsevier
Context: Web applications are trusted by billions of users for performing day-to-day activities.
Accessibility, availability and omnipresence of web applications have made them a prime …

Content delivery network security: A survey

M Ghaznavi, E Jalalpour… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
A content delivery network (CDN) is a distributed infrastructure to deliver digital contents to
end users with high performance. CDNs are critical to provide and protect the availability of …

An ensemble learning approach for XSS attack detection with domain knowledge and threat intelligence

Y Zhou, P Wang - Computers & Security, 2019 - Elsevier
Cross-site scripting (XSS) attack is one of the most dangerous attacks for web security.
Traditional XSS detection methods mainly focus on the vulnerability itself, relying on static …

Semantic query-featured ensemble learning model for SQL-injection attack detection in IoT-ecosystems

M Gowtham, HB Pramod - IEEE Transactions on Reliability, 2021 - ieeexplore.ieee.org
Structured query language (SQL) has emerged as one of the most used databases, serving
an array of Internet-of-Things (IoTs)-enabled services including web-transactions, grid …

Cross Channel Scripting and Code Injection Attacks on Web and Cloud-Based Applications: A Comprehensive Review

M Kaur, M Raj, HN Lee - Sensors, 2022 - mdpi.com
Cross channel scripting (XCS) is a common web application vulnerability, which is a variant
of a cross-site scripting (XSS) attack. An XCS attack vector can be injected through network …

Detection of SQL injection attacks by removing the parameter values of SQL query

RA Katole, SS Sherekar… - 2018 2nd International …, 2018 - ieeexplore.ieee.org
Internet users are increasing day by day. The web services and mobile web applications or
desktop web application's demands are also increasing. The chances of a system being …

Web application security: An investigation on static analysis with other algorithms to detect cross site scripting

AW Marashdih, ZF Zaaba, K Suwais… - Procedia Computer …, 2019 - Elsevier
Among web application vulnerabilities, XSS is the most frequently occurring. Where a web
application accepts a user-input, it is possible for such vulnerability to inject malicious …

Web application vulnerabilities-the hacker's treasure

K Nirmal, B Janet, R Kumar - 2018 International Conference on …, 2018 - ieeexplore.ieee.org
In today's online era, a web application is an integral part of every business. A web
application may be a single page HTML website or a large web portal that offers various …

Profiling android vulnerabilities

M Jimenez, M Papadakis… - … on software quality …, 2016 - ieeexplore.ieee.org
In widely used mobile operating systems a single vulnerability can threaten the security and
privacy of billions of users. Therefore, identifying vulnerabilities and fortifying software …

SEPTIC: detecting injection attacks and vulnerabilities inside the DBMS

I Medeiros, M Beatriz, N Neves… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Databases continue to be the most commonly used backend storage in enterprises, but they
are often integrated with vulnerable applications, such as web frontends, which allow …