Results 41 to 50 of about 980 (175)
Analisis Celah Keamanan dan Mitigasi Website E-learning Itera Menggunakan Owasp Zed Attack Proxy
Website kuliah atau E-Learning ITERA merupakan sistem yang mewadahi proses belajar mengajar antara dosen dan mahasiswa. Keamanan informasi dari sistem ini sangat penting mengingat banyaknya data terkait nilai ataupun materi perkuliahan yang ada pada ...
Ilham Firman Ashari +3 more
doaj +1 more source
Identification and Authentication Failures: Foundational Aspects of Strong Detection Mechanisms
A review of recent techniques for detecting Identification and Authentication Failures in online platforms storing sensitive user data. Analyzed methods include biometric, hierarchical, blockchain, IoT‐based, EPICS, and VAP authentication systems. ABSTRACT Online platforms, such as e‐commerce and online apps, have become crucial in daily activities ...
Md. Maruf Hassan +2 more
wiley +1 more source
Blind SQL Injection Attacks Optimization
This paper presents new and evolved methods to perform Blind SQL Injection attacks. These are much faster than the current publicly available tools and techniques due to optimization and redesign ideas that hack databases in more efficient methods, using cleverer injection payloads; this is the result of years of private research.
openaire +1 more source
ABSTRACT As software applications get increasingly connected and complex, cybersecurity becomes more and more important to consider during development and evaluation. Software engineers need to be aware of various security threats and the countermeasures that can be taken to mitigate them.
Raffaela Groner +5 more
wiley +1 more source
GMSA: Gathering Multiple Signatures Approach to Defend Against Code Injection Attacks
Code injection attacks (CIAs) exploit security vulnerabilities and computer bugs that are caused by processing invalid codes. CIA is a problem which hackers attempt to introduce to any new method, their objective being to bypass the protection system. In
Hussein Alnabulsi +2 more
doaj +1 more source
This paper proposes SQLi‐ScanEval Framework, a standardized SQLi detection system that integrates vulnerability and penetration testing scanners into a standardized framework. It tested seven prominent SQLi vulnerability scanners including OWASP ZAP, Wapiti, Vega, Acunetix, Invicti, Burp Suite, and Arachni on two prominent vulnerable testing ...
Hajira Bashir +6 more
wiley +1 more source
HYBRID INTRUSION DETECTION SYSTEM USING FUZZY LOGIC INFERENCE ENGINE FOR SQL INJECTION ATTACK
SQL injection attacks toward web application increasingly prevalent. Testing to the web that will published is the one of preventive measures. However, this method sometimes ineffective because constrained by various things. Instrusion detection system (
Rajif Agung Yunmar
doaj +1 more source
Abstract Submarine groundwater discharge (SGD) is a significant source of nutrients to continental shelf waters. Increasing evidence suggests that most of this flow is saline (∼seawater salinity) and occurs across broad continental shelves, making it challenging to observe.
Jacob Vincent +7 more
wiley +1 more source
Toward an SDN-Based Web Application Firewall: Defending against SQL Injection Attacks
Web attacks pose a significant threat to enterprises, as attackers often target web applications first. Various solutions have been proposed to mitigate and reduce the severity of these threats, such as web application firewalls (WAFs). On the other hand,
Fahad M. Alotaibi +1 more
doaj +1 more source
Framework of SQL Injection Attack
With the changing demographics of globalization, the emergence and prevalence of web application have acquired a central and pivotal role in the domains of technology and advancements. It thus becomes imperative to probe deeply into the architecture, significance and different facets of usages.
Patwari, Neha, Bhurani, Parvati
openaire +2 more sources

