Landscape of automated log analysis: A systematic literature review and mapping study

Ł Korzeniowski, K Goczyła - IEEE Access, 2022 - ieeexplore.ieee.org
Logging is a common practice in software engineering to provide insights into working
systems. The main uses of log files have always been failure identification and root cause …

[HTML][HTML] Systematic review analysis on SQLIA detection and prevention approaches

MS Aliero, KN Qureshi, MF Pasha, I Ghani… - Wireless Personal …, 2020 - Springer
SQL injection attack (SQLIA) is one of the most severe attacks that can be used against web
database driving applications. Attackers use SQLIA to get unauthorized access and perform …

Edge intelligence (EI)-enabled HTTP anomaly detection framework for the Internet of Things (IoT)

Y An, FR Yu, J Li, J Chen… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
In recent years, with the rapid development of the Internet of Things (IoT), various
applications based on IoT have become more and more popular in industrial and living …

An enhanced deep learning based framework for web attacks detection, mitigation and attacker profiling

WB Shahid, B Aslam, H Abbas, SB Khalid… - Journal of Network and …, 2022 - Elsevier
Protecting web applications is becoming challenging every passing day, primarily because
of attack sophistication, omnipresence of web applications and over-reliance on traditional …

Unmasking log4j's vulnerability: protecting systems against exploitation through ethical hacking and cyberlaw perspectives

F Maulana, H Fajri, MF Safitra… - 2023 9th international …, 2023 - ieeexplore.ieee.org
In today's digital landscape, the widespread utilization of the Java library Log4j for storing
error messages in applications is prevalent. However, a recently discovered vulnerability in …

Penetration frameworks and development issues in secure mobile application development: A systematic literature review

IU Haq, TA Khan - IEEE Access, 2021 - ieeexplore.ieee.org
The invention of smartphones has opened a new market for mobile application
development. Amateur android app developers often do not possess knowledge of the latest …

A real-time hypertext transfer protocol intrusion detection system on web server

A Tedyyana, O Ghazali… - … Computing Electronics and …, 2023 - telkomnika.uad.ac.id
Behind the rapid development of the internet in today's era, various types of crime are also
targeting vital players in the internet industry. With many online crime types rampant, an …

Detection of advanced web bots by combining web logs with mouse behavioural biometrics

C Iliou, T Kostoulas, T Tsikrika, V Katos… - Digital threats: research …, 2021 - dl.acm.org
Web bots vary in sophistication based on their purpose, ranging from simple automated
scripts to advanced web bots that have a browser fingerprint, support the main browser …

Towards a framework for detecting advanced web bots

C Iliou, T Kostoulas, T Tsikrika, V Katos… - Proceedings of the 14th …, 2019 - dl.acm.org
Automated programs (bots) are responsible for a large percentage of website traffic. These
bots can either be used for benign purposes, such as Web indexing, Website monitoring …

Web application security education platform based on OWASP API security project

M Idris, I Syarif, I Winarno - EMITTER international journal of …, 2022 - emitter.pens.ac.id
The trend of API-based systems in web applications in the last few years keeps steadily
growing. API allows web applications to interact with external systems to enable business-to …