An approach for vulnerability detection in web applications using graph neural networks and transformers
The increasing complexity of software systems and rising security concerns due to open-source package vulnerabilities have made software vulnerability detection a critical priority. Traditional vulnerability detection methods, including static, dynamic, and hybrid approaches, often struggle with hig...
| Main Authors: | Md Sultan, Abu Bakar, Zulzalil, Hazura, Osman, Mohd Hafeez, Tanko, Mohammed Yahaya |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Little Lion Scientific
2024
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/119426/ http://psasir.upm.edu.my/id/eprint/119426/1/119426.pdf |
Similar Items
Towards cross-site scripting vulnerability detection in mobile web applications
by: Hydara, Isatou, et al.
Published: (2018)
by: Hydara, Isatou, et al.
Published: (2018)
Comparing web vulnerability scanners with a new method for SQL injection vulnerabilities detection and removal EPSQLiFix
by: Md Sultan, Abu Bakar, et al.
Published: (2018)
by: Md Sultan, Abu Bakar, et al.
Published: (2018)
On the automation of vulnerabilities fixing for web application
by: Umar, Kabir, et al.
Published: (2014)
by: Umar, Kabir, et al.
Published: (2014)
Comparison of security testing approaches for detection of SQL injection vulnerabilities
by: Mohammed Draib, Najla’a Ateeq, et al.
Published: (2018)
by: Mohammed Draib, Najla’a Ateeq, et al.
Published: (2018)
Security impact of cross-site scripting vulnerabilities on web applications and their awareness
by: Hydara, Isatou, et al.
Published: (2022)
by: Hydara, Isatou, et al.
Published: (2022)
Towards removing cross-site scripting vulnerabilities from mobile web applications
by: Hydara, Isatou, et al.
Published: (2018)
by: Hydara, Isatou, et al.
Published: (2018)
The limitations of cross-site scripting vulnerabilities detection and removal techniques
by: Hydara, Isatou, et al.
Published: (2021)
by: Hydara, Isatou, et al.
Published: (2021)
Preliminary systematic literature review on the adoption of Security as a Service (SECaaS)
by: Tanko, Mohammed Yahaya, et al.
Published: (2023)
by: Tanko, Mohammed Yahaya, et al.
Published: (2023)
Removing cross-site scripting vulnerabilities from web applications using the OWASP ESAPI security guidelines
by: Hydara, Isatou, et al.
Published: (2015)
by: Hydara, Isatou, et al.
Published: (2015)
Removing cross-site scripting vulnerabilities from web applications using the OWASP ESAPI security guidelines
by: Hydara, Isatou, et al.
Published: (2015)
by: Hydara, Isatou, et al.
Published: (2015)
Prevention of attack on Islamic websites by fixing SQL injection vulnerabilities using co-evolutionary search approach
by: Umar, Kabir, et al.
Published: (2014)
by: Umar, Kabir, et al.
Published: (2014)
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
by: Hydara, Isatou
Published: (2015)
by: Hydara, Isatou
Published: (2015)
An approach for cross-site scripting detection and removal based on genetic algorithms.
by: Hydara, Isatou, et al.
Published: (2014)
by: Hydara, Isatou, et al.
Published: (2014)
Neural network approach of harmonics detection
by: Zin, A.A.M, et al.
Published: (1998)
by: Zin, A.A.M, et al.
Published: (1998)
Enhanced pushdown automaton based static analysis for detection of SQL injection Hotspots in web application
by: Umar, Kabir, et al.
Published: (2016)
by: Umar, Kabir, et al.
Published: (2016)
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
Deriving objective navigational measures for web usability
by: Rahmat, Hazwani, et al.
Published: (2013)
by: Rahmat, Hazwani, et al.
Published: (2013)
Vulnerability Prevention Model for Web Browser using Interceptor Approach
by: Ahmad Khan, Nayeem, et al.
Published: (2015)
by: Ahmad Khan, Nayeem, et al.
Published: (2015)
Framework for Aggregating Interactive Multi-Criteria for Web-Based Applications Using Fuzzy Measure and 2-Additive Choquet Integral
by: Zulzalil, Hazura
Published: (2010)
by: Zulzalil, Hazura
Published: (2010)
The rise of software vulnerability: Taxonomy of software vulnerabilities detection and machine learning approaches
by: Hazim, Hanif, et al.
Published: (2021)
by: Hazim, Hanif, et al.
Published: (2021)
Multilayer perceptrons neural network based web spam detection application
by: Goh, K.L., et al.
Published: (2013)
by: Goh, K.L., et al.
Published: (2013)
Structural Convergence of Web Graph, Social Network
and Malaria Network: An Analytical Framework for
Emerging Web-Hybrid Search Engine
by: Eze, Monday, et al.
Published: (2014)
by: Eze, Monday, et al.
Published: (2014)
Towards Vulnerability Prevention Model for Web Browser
using Interceptor Approach
by: Nayeem, Khan, et al.
Published: (2015)
by: Nayeem, Khan, et al.
Published: (2015)
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
by: Hydara, Isatou
Published: (2024)
by: Hydara, Isatou
Published: (2024)
Single-row transformation of complete graphs
by: Salleh, Shahruddin Hussain, et al.
Published: (2005)
by: Salleh, Shahruddin Hussain, et al.
Published: (2005)
Web user navigation pattern mining approach based on graph partitioning algorithm.
by: Jalali, Mehrdad, et al.
Published: (2008)
by: Jalali, Mehrdad, et al.
Published: (2008)
Face detection using artificial neural network approach
by: Khalid, Marzuki, et al.
Published: (2007)
by: Khalid, Marzuki, et al.
Published: (2007)
Detection of vulnerability attack through wireless network on android platform
by: Muhamad Izhan Fakri, Imran
Published: (2014)
by: Muhamad Izhan Fakri, Imran
Published: (2014)
Detection of operating system vulnerabilities and network traffic analysis methods
by: Makulova, A., et al.
Published: (2024)
by: Makulova, A., et al.
Published: (2024)
Determining the optimal number of GAT and GCN layers for node classification in graph neural networks
by: Noor, Humaira, et al.
Published: (2023)
by: Noor, Humaira, et al.
Published: (2023)
Road crash injury severity prediction using a graph neural network framework
by: Sattar, Karim A., et al.
Published: (2024)
by: Sattar, Karim A., et al.
Published: (2024)
Single-row mapping and transformation of connected graphs
by: Salleh, Shaharuddin Hussain, et al.
Published: (2007)
by: Salleh, Shaharuddin Hussain, et al.
Published: (2007)
A Hybrid ACO-Graph Entropy for Functional Modules Detection From Protein-Protein Interaction Network
by: Jamaludin, Sallim, et al.
Published: (2018)
by: Jamaludin, Sallim, et al.
Published: (2018)
Towards comprehensive and disciplined change management strategy in agile transformation process.
by: Gandomani, Taghi Javdani, et al.
Published: (2013)
by: Gandomani, Taghi Javdani, et al.
Published: (2013)
Worst-input mutation approach to web services vulnerability testing based on SOAP messages
by: Chen, Jinfu, et al.
Published: (2014)
by: Chen, Jinfu, et al.
Published: (2014)
The value of vulnerability: the transformative capacity of risky trust
by: Bruni, Luigino, et al.
Published: (2017)
by: Bruni, Luigino, et al.
Published: (2017)
Artificial Neural Network Approaches to Intrusion Detection: A Review
Published: (2009)
Published: (2009)
Artificial Neural Network Approaches to Intrusion Detection: A Review
by: Ahmad, Iftikhar
Published: (2009)
by: Ahmad, Iftikhar
Published: (2009)
Artificial Neural Network Approaches to Intrusion Detection: A Review
by: Ahmad, iftikhar, et al.
Published: (2009)
by: Ahmad, iftikhar, et al.
Published: (2009)
Artificial Neural Network Approaches to Intrusion Detection: A Review
by: I., Ahmad, et al.
Published: (2010)
by: I., Ahmad, et al.
Published: (2010)
Similar Items
-
Towards cross-site scripting vulnerability detection in mobile web applications
by: Hydara, Isatou, et al.
Published: (2018) -
Comparing web vulnerability scanners with a new method for SQL injection vulnerabilities detection and removal EPSQLiFix
by: Md Sultan, Abu Bakar, et al.
Published: (2018) -
On the automation of vulnerabilities fixing for web application
by: Umar, Kabir, et al.
Published: (2014) -
Comparison of security testing approaches for detection of SQL injection vulnerabilities
by: Mohammed Draib, Najla’a Ateeq, et al.
Published: (2018) -
Security impact of cross-site scripting vulnerabilities on web applications and their awareness
by: Hydara, Isatou, et al.
Published: (2022)