Prevention of attack on Islamic websites by fixing SQL injection vulnerabilities using co-evolutionary search approach
In recent times, there is an alarming increase in web application attacks, with significant cases, specifically, targeting Islamic websites. Since 2004, SQL Injection Vulnerabilities (SQLIVs) remains the most serious software security loopholes via which web applications are exploited. Fixing SQLIVs...
| Main Authors: | Umar, Kabir, Md. Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia, Abdullah @ Selimun, Mohd Taufik |
|---|---|
| Format: | Conference or Workshop Item |
| Published: |
IEEE (IEEE Xplore)
2014
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/38838/ |
Similar Items
SQL Injection attack roadmap and fusion
by: Umar, Kabir, et al.
Published: (2016)
by: Umar, Kabir, et al.
Published: (2016)
Comparing web vulnerability scanners with a new method for SQL injection vulnerabilities detection and removal EPSQLiFix
by: Md Sultan, Abu Bakar, et al.
Published: (2018)
by: Md Sultan, Abu Bakar, et al.
Published: (2018)
On the automation of vulnerabilities fixing for web application
by: Umar, Kabir, et al.
Published: (2014)
by: Umar, Kabir, et al.
Published: (2014)
Enhanced pushdown automaton based static analysis for detection of SQL injection Hotspots in web application
by: Umar, Kabir, et al.
Published: (2016)
by: Umar, Kabir, et al.
Published: (2016)
Comparison of security testing approaches for detection of SQL injection vulnerabilities
by: Mohammed Draib, Najla’a Ateeq, et al.
Published: (2018)
by: Mohammed Draib, Najla’a Ateeq, et al.
Published: (2018)
A Survey on SQL injection: vulnerabilities, attacks, and prevention techniques
by: Kindy, Diallo Abdoulaye, et al.
Published: (2011)
by: Kindy, Diallo Abdoulaye, et al.
Published: (2011)
Systematic literature review on SQL injection attack
by: Aminu, Lawal Muhammad, et al.
Published: (2016)
by: Aminu, Lawal Muhammad, et al.
Published: (2016)
A walk through SQL injection: vulnerabilities, attacks, and countermeasures in current and future networks
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
A detailed survey on various aspects of SQL Injection: vulnerabilities, innovative attacks, and remedies
by: Diallo , Abdoulaye Kindy, et al.
Published: (2011)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2011)
Defining fitness function for search based assessment of grammar reachability
by: Umar, Kabir, et al.
Published: (2018)
by: Umar, Kabir, et al.
Published: (2018)
A detailed survey on various aspects of SQL injection in web applications: vulnerabilities, innovative attacks and remedies
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
Detection of SQL injection attack using machine learning
by: Tung, Tean Thong
Published: (2024)
by: Tung, Tean Thong
Published: (2024)
Application of machine learning and artificial intelligence in detecting SQL injection attacks
by: Md Sultan, Abu Bakar, et al.
Published: (2024)
by: Md Sultan, Abu Bakar, et al.
Published: (2024)
The limitations of cross-site scripting vulnerabilities detection and removal techniques
by: Hydara, Isatou, et al.
Published: (2021)
by: Hydara, Isatou, et al.
Published: (2021)
Towards removing cross-site scripting vulnerabilities from mobile web applications
by: Hydara, Isatou, et al.
Published: (2018)
by: Hydara, Isatou, et al.
Published: (2018)
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
Towards cross-site scripting vulnerability detection in mobile web applications
by: Hydara, Isatou, et al.
Published: (2018)
by: Hydara, Isatou, et al.
Published: (2018)
Security impact of cross-site scripting vulnerabilities on web applications and their awareness
by: Hydara, Isatou, et al.
Published: (2022)
by: Hydara, Isatou, et al.
Published: (2022)
Removing cross-site scripting vulnerabilities from web applications using the OWASP ESAPI security guidelines
by: Hydara, Isatou, et al.
Published: (2015)
by: Hydara, Isatou, et al.
Published: (2015)
Removing cross-site scripting vulnerabilities from web applications using the OWASP ESAPI security guidelines
by: Hydara, Isatou, et al.
Published: (2015)
by: Hydara, Isatou, et al.
Published: (2015)
Penetration testing using Kali Linux: SQL injection, XSS, Wordpress, and WPA2 attacks
by: Gunawan, Teddy Surya, et al.
Published: (2018)
by: Gunawan, Teddy Surya, et al.
Published: (2018)
SQL injection penetration testing tutorial
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
Review of SQL injection : problems and prevention
by: Mohd Yunus, Mohd Amin, et al.
Published: (2018)
by: Mohd Yunus, Mohd Amin, et al.
Published: (2018)
Taxonomy of SQL Injection: ML Trends & Open Challenges
by: Abobakr Busaeed, Raed Abdullah, et al.
Published: (2023)
by: Abobakr Busaeed, Raed Abdullah, et al.
Published: (2023)
Lethality of SQL injection against current and future Internet-technologies
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
Restaurant O SIX JOINT online ordering system with anti-SQL injection
by: Tang, Jie Yi, et al.
Published: (2021)
by: Tang, Jie Yi, et al.
Published: (2021)
An approach for cross-site scripting detection and removal based on genetic algorithms.
by: Hydara, Isatou, et al.
Published: (2014)
by: Hydara, Isatou, et al.
Published: (2014)
LogiQL and SQL
by: Halpin, Terry, et al.
Published: (2015)
by: Halpin, Terry, et al.
Published: (2015)
Metric's thresholds for encoding evolutionary computing representation in software engineering problem
by: Md Sultan, Abu Bakar, et al.
Published: (2015)
by: Md Sultan, Abu Bakar, et al.
Published: (2015)
Current state of research on cross-site scripting (XSS) – a systematic literature review
by: Hydara, Isatou, et al.
Published: (2015)
by: Hydara, Isatou, et al.
Published: (2015)
Cross-site scripting detection based on an enhanced genetic algorithm
by: Hydara, Isatou, et al.
Published: (2015)
by: Hydara, Isatou, et al.
Published: (2015)
SQL-injection vulnerability scanning tool for automatic creation of SQL-injection attacks
by: Bashah Mat Ali, Abdul, et al.
Published: (2011)
by: Bashah Mat Ali, Abdul, et al.
Published: (2011)
SQL-injection vulnerability scanning tool for automatic creation of SQL-injection attacks
by: Mat Ali, Abdul Bashah, et al.
Published: (2011)
by: Mat Ali, Abdul Bashah, et al.
Published: (2011)
Attacks, vulnerabilities and security requirements in smart metering networks
by: Abdullah, Muhammad Daniel Hafiz, et al.
Published: (2015)
by: Abdullah, Muhammad Daniel Hafiz, et al.
Published: (2015)
Vehicle keyless entry system vulnerable to 'relay attacks'
by: Mohd Rashidi, Qirana Nabilla
Published: (2024)
by: Mohd Rashidi, Qirana Nabilla
Published: (2024)
An approach for vulnerability detection in web applications using graph neural networks and transformers
by: Md Sultan, Abu Bakar, et al.
Published: (2024)
by: Md Sultan, Abu Bakar, et al.
Published: (2024)
Website detection for phishing attack by using browser extension
by: Putera Nuriqmar Iskandar, Ahmad Basri
Published: (2018)
by: Putera Nuriqmar Iskandar, Ahmad Basri
Published: (2018)
SQL-Injection Vulnerability Scanner Using Automatic Creation of SQL-Injection Attacks (MySqlinjector)
by: Shakhatreh, Ala' Yaseen Ibrahim
Published: (2010)
by: Shakhatreh, Ala' Yaseen Ibrahim
Published: (2010)
Detection of vulnerability attack through wireless network on android platform
by: Muhamad Izhan Fakri, Imran
Published: (2014)
by: Muhamad Izhan Fakri, Imran
Published: (2014)
Evolutionary cost cognizant regression test prioritization for object-oriented programs based on fault dependency
by: Bello, AbdulKarim, et al.
Published: (2018)
by: Bello, AbdulKarim, et al.
Published: (2018)
Similar Items
-
SQL Injection attack roadmap and fusion
by: Umar, Kabir, et al.
Published: (2016) -
Comparing web vulnerability scanners with a new method for SQL injection vulnerabilities detection and removal EPSQLiFix
by: Md Sultan, Abu Bakar, et al.
Published: (2018) -
On the automation of vulnerabilities fixing for web application
by: Umar, Kabir, et al.
Published: (2014) -
Enhanced pushdown automaton based static analysis for detection of SQL injection Hotspots in web application
by: Umar, Kabir, et al.
Published: (2016) -
Comparison of security testing approaches for detection of SQL injection vulnerabilities
by: Mohammed Draib, Najla’a Ateeq, et al.
Published: (2018)