[go: up one dir, main page]

Yalçinkaya et al., 2024 - Google Patents

Artificial Intelligence and Dynamic Analysis-Based Web Application Vulnerability Scanner.

Yalçinkaya et al., 2024

Document ID
3736799433415334557
Author
Yalçinkaya M
Küçüksille E
Publication year
Publication venue
ISeCure

External Links

Snippet

The widespread use of web applications and running on sensitive data has made them one of the most significant targets of cyber attackers. One of the most crucial security measures that can be taken is detecting and closing vulnerabilities on web applications before …
Continue reading at search.ebscohost.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image

Similar Documents

Publication Publication Date Title
Zhang et al. Crawlphish: Large-scale analysis of client-side cloaking techniques in phishing
Hong et al. Phishing url detection with lexical features and blacklisted domains
Rao et al. Detection of phishing websites using an efficient feature-based machine learning framework
Chen et al. Apt-kgl: An intelligent apt detection system based on threat knowledge and heterogeneous provenance graph learning
Chu et al. Blog or block: Detecting blog bots through behavioral biometrics
CN101512522A (en) Systems and methods for analyzing web content
Doran et al. An integrated method for real time and offline web robot detection
US20210029154A1 (en) Automated security testing system and method
Subramani et al. PhishInPatterns: measuring elicited user interactions at scale on phishing websites
Jin et al. Evasive bots masquerading as human beings on the web
Abuadbba et al. Towards web phishing detection limitations and mitigation
Rodríguez-Galán et al. Personal data filtering: a systematic literature review comparing the effectiveness of XSS attacks in web applications vs cookie stealing
Randall et al. Measuring UID smuggling in the wild
Yalçinkaya et al. Artificial Intelligence and Dynamic Analysis-Based Web Application Vulnerability Scanner.
Lee et al. Beneath the phishing scripts: A script-level analysis of phishing kits and their impact on real-world phishing websites
Santander et al. The evolution from Traditional to Intelligent Web Security: Systematic Literature Review
Campobasso et al. Caronte: crawling adversarial resources over non-trusted, high-profile environments
Saied et al. IoT Cybersecurity: On the Use of Boosting-Based Approaches for Botnet Detection
McKenna Detection and classification of Web robots with honeypots
Li et al. Scan me if you can: Understanding and detecting unwanted vulnerability scanning
Yasuhara et al. Challenges in Web Bot Detection and Detection Evasion Technologies
Hariram Detection of clickjacking using convolutional neural network
Wang et al. A PU‐learning based approach for cross‐site scripting attacking reality detection
US20240223594A1 (en) Automated security testing system and method
Herath et al. NetShield: A User-Centric Deep Learning Framework for Real-Time Network Anomaly Detection and Resolution