Yalçinkaya et al., 2024 - Google Patents
Artificial Intelligence and Dynamic Analysis-Based Web Application Vulnerability Scanner.Yalçinkaya et al., 2024
- Document ID
- 3736799433415334557
- Author
- Yalçinkaya M
- Küçüksille E
- Publication year
- Publication venue
- ISeCure
External Links
Snippet
The widespread use of web applications and running on sensitive data has made them one of the most significant targets of cyber attackers. One of the most crucial security measures that can be taken is detecting and closing vulnerabilities on web applications before …
- 238000013473 artificial intelligence 0 title abstract description 7
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Zhang et al. | Crawlphish: Large-scale analysis of client-side cloaking techniques in phishing | |
| Hong et al. | Phishing url detection with lexical features and blacklisted domains | |
| Rao et al. | Detection of phishing websites using an efficient feature-based machine learning framework | |
| Chen et al. | Apt-kgl: An intelligent apt detection system based on threat knowledge and heterogeneous provenance graph learning | |
| Chu et al. | Blog or block: Detecting blog bots through behavioral biometrics | |
| CN101512522A (en) | Systems and methods for analyzing web content | |
| Doran et al. | An integrated method for real time and offline web robot detection | |
| US20210029154A1 (en) | Automated security testing system and method | |
| Subramani et al. | PhishInPatterns: measuring elicited user interactions at scale on phishing websites | |
| Jin et al. | Evasive bots masquerading as human beings on the web | |
| Abuadbba et al. | Towards web phishing detection limitations and mitigation | |
| Rodríguez-Galán et al. | Personal data filtering: a systematic literature review comparing the effectiveness of XSS attacks in web applications vs cookie stealing | |
| Randall et al. | Measuring UID smuggling in the wild | |
| Yalçinkaya et al. | Artificial Intelligence and Dynamic Analysis-Based Web Application Vulnerability Scanner. | |
| Lee et al. | Beneath the phishing scripts: A script-level analysis of phishing kits and their impact on real-world phishing websites | |
| Santander et al. | The evolution from Traditional to Intelligent Web Security: Systematic Literature Review | |
| Campobasso et al. | Caronte: crawling adversarial resources over non-trusted, high-profile environments | |
| Saied et al. | IoT Cybersecurity: On the Use of Boosting-Based Approaches for Botnet Detection | |
| McKenna | Detection and classification of Web robots with honeypots | |
| Li et al. | Scan me if you can: Understanding and detecting unwanted vulnerability scanning | |
| Yasuhara et al. | Challenges in Web Bot Detection and Detection Evasion Technologies | |
| Hariram | Detection of clickjacking using convolutional neural network | |
| Wang et al. | A PU‐learning based approach for cross‐site scripting attacking reality detection | |
| US20240223594A1 (en) | Automated security testing system and method | |
| Herath et al. | NetShield: A User-Centric Deep Learning Framework for Real-Time Network Anomaly Detection and Resolution |