2020
DOI: 10.1007/s11277-020-07243-z
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Method to Detect and Prevent SQLIA Using Ontology to Cloud Web Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 43 publications
(14 citation statements)
references
References 20 publications
0
13
0
1
Order By: Relevance
“…In previous research on PHP web applications, we first demonstrated that many forms of vulnerabilities can be identified using the proposed IVS attributes, including SQL injection bugs, cross-site scripting, remote execution of code, and inclusion of files [7]. We also demonstrated that semi-supervised learning is a realistic alternative to supervised learning with a limited number of sinks with known vulnerabilities available when it comes to training the predictive model [8]. In experiments on eight test subjects, each of the proposed attributes demonstrated a discriminative power for at least one subject between vulnerable and non-vulnerable program statements.…”
Section: Related Workmentioning
confidence: 88%
“…In previous research on PHP web applications, we first demonstrated that many forms of vulnerabilities can be identified using the proposed IVS attributes, including SQL injection bugs, cross-site scripting, remote execution of code, and inclusion of files [7]. We also demonstrated that semi-supervised learning is a realistic alternative to supervised learning with a limited number of sinks with known vulnerabilities available when it comes to training the predictive model [8]. In experiments on eight test subjects, each of the proposed attributes demonstrated a discriminative power for at least one subject between vulnerable and non-vulnerable program statements.…”
Section: Related Workmentioning
confidence: 88%
“…A web application vulnerability allows an intruder to penetrate the web application for performing unwanted aspects on the specified pages of the user. In Durai et al [12], the authors explained the differences between vulnerability assessment and exploitation and the approach of an assessment to be performed for SQL injection attacks, cross-site scripting attacks, and cross-site request forgery attacks. They even mention secured code reviews and penetration testing in the development lifecycle to identify and mitigate significant vulnerabilities in web applications.…”
Section: Related Workmentioning
confidence: 99%
“…This enhanced ABC-based load balancing scheme concentrated on reducing the make-span of tasks with a minimized number of VM migrations. It categorized the underloaded tasks as the food sources and the number of tasks isolated from the overloaded VMs as the honeybees in the implemented algorithm [25]. The foraging activities of the honeybees are included in the load balancing process to effectively balance the load among the available virtual machines in the cloud environment.…”
Section: Related Workmentioning
confidence: 99%