2016 International Conference on Inventive Computation Technologies (ICICT) 2016
DOI: 10.1109/inventive.2016.7824873
|View full text |Cite
|
Sign up to set email alerts
|

Design of efficient web vulnerability scanner

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(10 citation statements)
references
References 5 publications
0
10
0
Order By: Relevance
“…43 The introduction of CGI led to the appearance of other web application development tools such as PHP, Perl, Java Server Pages (JSP), JavaScript, and VBScript. 43 Figure 1 shows the evolution of web applications. A web application typically includes a client, a web server, an application server (sometimes several), and a persistent database server, often with a firewall placed between the client and the webserver/application.…”
Section: Background and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…43 The introduction of CGI led to the appearance of other web application development tools such as PHP, Perl, Java Server Pages (JSP), JavaScript, and VBScript. 43 Figure 1 shows the evolution of web applications. A web application typically includes a client, a web server, an application server (sometimes several), and a persistent database server, often with a firewall placed between the client and the webserver/application.…”
Section: Background and Related Workmentioning
confidence: 99%
“…The web application security consortium (WASC) 41 defines a web application as “a software application executed by a web server, which responds to dynamic web page requests over HTTP.” According to Paulson, 42 the turning point in web application development was the introduction of A synchronous JavaScript and X ML (AJAX), a technique for creating better, faster, and more interactive web applications, which helped transition of the old concept of static web pages into a method for deploying interactive web applications. The common gateway interface (CGI) became the first standard environment used to generate dynamic web pages, with the use of CGI for website processing becoming known as web applications 43 . The introduction of CGI led to the appearance of other web application development tools such as PHP, Perl, Java Server Pages (JSP), JavaScript, and VBScript 43 .…”
Section: Background and Related Workmentioning
confidence: 99%
“…Then Appelt et al research mutation testing on SQL injection input values so that it can generate random input to detect the existing vulnerable SQL on the website (Appelt, Nguyen, Briand, & Alshahwan, 2014). Patil et al do research to improve efficiency when scanning vulnerabilities while maintaining low false positives and false negatives (Patil, Marathe, & Padiya, 2016). To analyze the target, Patil's research uses a black box testing approach.…”
Section: B Blind Sql Injectionmentioning
confidence: 99%
“…It became the first standard environment which generates dynamic web pages. It must be noted that the use of CGI for website processing is called Web Application [1].after CGI, there are a lot of web application development tools such as PHP, Active Server Pages (ASP), Perl, Java Server Pages (JSP), JavaScript, VBScript, etc. Some of the broad categories of web application technologies are communication protocols, formats, server-side and clientside scripting languages, browser plug-ins, and web server API and Others framework which are flexible and powerful solution for transforming and managing data within web application as shown in the figure 1 Fig: 1 Flow of development for web application…”
Section: Background Of the Study 31 Overviewmentioning
confidence: 99%
“…The inevitable use of web application in our daily life have also attracted the attention of hackers and intruders whose aim is to target the weaknesses in these databases and exploit it maliciously making the functioning of most web application inefficient and ineffective. The cause of a number of vulnerabilities exploited by these unscrupulous people stems from design flaws or an implementation bugs [1] [2]. There exist a number of vulnerabilities including command injection, buffer overflow, data manipulation, path manipulation, authentication, session hijacking, cookie misinterpretation, and others [3].…”
Section: Introductionmentioning
confidence: 99%