An effectual mechanism for injected vulnerability scrutiny of web application using hybrid aco algorithm

Malignant clients can attack Web based applications, exploiting infusion vulnerabilities in the programming statements. This paper address the test of identifying infused vulnerabilities in source code of Web based applications effectively. A incorporated system is established (executed in JOACO ins...

Full description

Saved in:
Bibliographic Details
Published inAIP conference proceedings Vol. 2790; no. 1
Main Authors Rahmansait, Rokaya Shafrin, Lazar, Jabasheela
Format Journal Article Conference Proceeding
LanguageEnglish
Published Melville American Institute of Physics 24.08.2023
Subjects
Online AccessGet full text
ISSN0094-243X
1551-7616
DOI10.1063/5.0152871

Cover

Abstract Malignant clients can attack Web based applications, exploiting infusion vulnerabilities in the programming statements. This paper address the test of identifying infused vulnerabilities in source code of Web based applications effectively. A incorporated system is established (executed in JOACO instrument) that merges security cutting with constraint solving. We use static investigation to produce little program cuts pertinent into security from Web based activities for creating attack conditions.Now constraint resolving technique for distinguishing attack conditions and to recognize the weakness in a program. The test outcomes, utilizing a standard of different Web organizations/administrations as well as secured standard applications, telling the methodology is essentially great convincing in identifying infusion vulnerabilities rather cutting edge draws near 98% review. The web applications shows that our methodology is more viable in distinguishing infusion vulnerabilities without creating any misleading problem.
AbstractList Malignant clients can attack Web based applications, exploiting infusion vulnerabilities in the programming statements. This paper address the test of identifying infused vulnerabilities in source code of Web based applications effectively. A incorporated system is established (executed in JOACO instrument) that merges security cutting with constraint solving. We use static investigation to produce little program cuts pertinent into security from Web based activities for creating attack conditions.Now constraint resolving technique for distinguishing attack conditions and to recognize the weakness in a program. The test outcomes, utilizing a standard of different Web organizations/administrations as well as secured standard applications, telling the methodology is essentially great convincing in identifying infusion vulnerabilities rather cutting edge draws near 98% review. The web applications shows that our methodology is more viable in distinguishing infusion vulnerabilities without creating any misleading problem.
Author Rahmansait, Rokaya Shafrin
Lazar, Jabasheela
Author_xml – sequence: 1
  givenname: Rokaya Shafrin
  surname: Rahmansait
  fullname: Rahmansait, Rokaya Shafrin
  organization: Dept. of CSE, Panimalar Engineering College, Chennai, TamilNadu, India
– sequence: 2
  givenname: Jabasheela
  surname: Lazar
  fullname: Lazar, Jabasheela
  email: ljsheela@gmail.com
  organization: Dept. of CSE, Panimalar Engineering College, Chennai, TamilNadu, India
BookMark eNotkEtLAzEAhINUsK0e_AcBb8LWPDbZ9FiKLyh4UfC2ZPPopuwma5JV9t9bbU8Dw8fMMAsw88EbAG4xWmHE6QNbIcyIqPAFmGPGcFFxzGdgjtC6LEhJP6_AIqUDQmRdVWIO2o2Hxlqj8ig72BvVSu9SD22I0PnD0Tcafo-dN1E2rnN5gknFMTs_wWDhj2mgHIbOKZld8HBMzu9hOzXRaShVgLLbh-hy21-DSyu7ZG7OugQfT4_v25di9_b8ut3sigFTmgvGrdSlIIqskWCowZpobonkrCGYmUZQTgypFF6XlmpWCl0pxLVBjJkKKUuX4O6UO8TwNZqU60MYoz9W1kQwzrFAJTpS9ycqKZf_p9dDdL2MU41R_fdkzerzk_QXH6BodA
CODEN APCPCS
ContentType Journal Article
Conference Proceeding
Copyright AIP Publishing LLC
2023 AIP Publishing LLC.
Copyright_xml – notice: AIP Publishing LLC
– notice: 2023 AIP Publishing LLC.
DBID 8FD
H8D
L7M
DOI 10.1063/5.0152871
DatabaseName Technology Research Database
Aerospace Database
Advanced Technologies Database with Aerospace
DatabaseTitle Technology Research Database
Aerospace Database
Advanced Technologies Database with Aerospace
DatabaseTitleList
Technology Research Database
DeliveryMethod fulltext_linktorsrc
Discipline Physics
EISSN 1551-7616
Editor Balas, Valentina Emilia
Al-Turjman, Fadi
Kumar, V. D. Ambeth
Malathi, S.
Rodrigues, Joel J. P. C.
Editor_xml – sequence: 1
  givenname: V. D. Ambeth
  surname: Kumar
  fullname: Kumar, V. D. Ambeth
  organization: Panimalar Engineering College
– sequence: 2
  givenname: Joel J. P. C.
  surname: Rodrigues
  fullname: Rodrigues, Joel J. P. C.
  organization: Federal University of Piauí (UFPI)
– sequence: 3
  givenname: S.
  surname: Malathi
  fullname: Malathi, S.
  organization: Panimalar Engineering College
– sequence: 4
  givenname: Valentina Emilia
  surname: Balas
  fullname: Balas, Valentina Emilia
  organization: Aurel Vlaicu University of Arad
– sequence: 5
  givenname: Fadi
  surname: Al-Turjman
  fullname: Al-Turjman, Fadi
  organization: Near East University
ExternalDocumentID acp
Genre Conference Proceeding
GroupedDBID -~X
23M
5GY
AAAAW
AABDS
AAEUA
AAPUP
AAYIH
ABJNI
ACBRY
ACZLF
ADCTM
AEJMO
AFATG
AFHCQ
AGKCL
AGLKD
AGMXG
AGTJO
AHSDT
AJJCW
ALEPV
ALMA_UNASSIGNED_HOLDINGS
ATXIE
AWQPM
BPZLN
F5P
FDOHQ
FFFMQ
HAM
M71
M73
RIP
RQS
SJN
~02
8FD
ABJGX
ADMLS
H8D
L7M
ID FETCH-LOGICAL-p133t-56fad482c290850b1d2d6f2a65b215eb8362e27c194f3d548d7c06de055e70cf3
ISSN 0094-243X
IngestDate Sun Jun 29 16:21:16 EDT 2025
Fri Jun 21 00:15:23 EDT 2024
IsPeerReviewed true
IsScholarly true
Issue 1
Language English
LinkModel OpenURL
MeetingName 5TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING: IConIC 2K22
MergedId FETCHMERGED-LOGICAL-p133t-56fad482c290850b1d2d6f2a65b215eb8362e27c194f3d548d7c06de055e70cf3
Notes ObjectType-Conference Proceeding-1
SourceType-Conference Papers & Proceedings-1
content type line 21
PQID 2856618040
PQPubID 2050672
PageCount 9
ParticipantIDs proquest_journals_2856618040
scitation_primary_10_1063_5_0152871
PublicationCentury 2000
PublicationDate 20230824
PublicationDateYYYYMMDD 2023-08-24
PublicationDate_xml – month: 08
  year: 2023
  text: 20230824
  day: 24
PublicationDecade 2020
PublicationPlace Melville
PublicationPlace_xml – name: Melville
PublicationTitle AIP conference proceedings
PublicationYear 2023
Publisher American Institute of Physics
Publisher_xml – name: American Institute of Physics
SSID ssj0029778
Score 2.3328176
Snippet Malignant clients can attack Web based applications, exploiting infusion vulnerabilities in the programming statements. This paper address the test of...
SourceID proquest
scitation
SourceType Aggregation Database
Publisher
SubjectTerms Algorithms
Applications programs
Security
Source code
Title An effectual mechanism for injected vulnerability scrutiny of web application using hybrid aco algorithm
URI http://dx.doi.org/10.1063/5.0152871
https://www.proquest.com/docview/2856618040
Volume 2790
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVEBS
  databaseName: Inspec with Full Text
  customDbUrl:
  eissn: 1551-7616
  dateEnd: 20241102
  omitProxy: false
  ssIdentifier: ssj0029778
  issn: 0094-243X
  databaseCode: ADMLS
  dateStart: 20000101
  isFulltext: true
  titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text
  providerName: EBSCOhost
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Za9tAEF5ah9K-9UhpmrQstPTFqJV2tToeTZuQBicN1Aa_idUekakju44ccH59Z3SbhEL7IoSwJbHfas5vZgj5qLhnYp9rRyLLweeYJPRU7EQiTrXmkdAcC5zPL4LTqX82E7MuFVNWlxTpZ3X3YF3J_6AK1wBXrJL9B2Tbm8IFOAd84QgIw_E-xg-qmtH3SySON81iu9_c9PfCKK95G1WtCBb74mwMW3LRMRADVuftZoENqEuu7HYIwgTeOy_T71jN2MtzDzdleCHbYq3XEATqUC6ulut5kV13SaPsGseQz4uKvP1LbiW2hrbreccAkndyPTyToEYzYxayH35gHOOprAs_tnmlHW5DyV5V_WgjeJHwt3L0L6idWtYKzwmDqtSyEcYsrKaH9rfdPSkPZhVAg_1WBTp8nSpr0vcXP5KT6XicTI5nk0-r3w4OGcNkfD1x5THZYxxE3YDsjb6dj3-2HjoYw5Xqrt-2aUUV8C_t03Zckadgp1SUiZ5VMnlO9rt6TXrZQv-CPDL5S_KkXp5XJBvltMWftvhTwJ82-NMd_GmDP11aCvjTHv60xJ9W-FPAn7b475PpyfHk66lTT9hwVh7nhSMCK7UfMcVibF2YeprpwDIZiBRMQZNGYN4YFiov9i3X4NzqULmBNq4QJnSV5a_JIF_m5g2hMtLKhw_ehtb3pedKVynjpZGxrjKu0gfkqFm2pP6EbhIWgTfhRaBIDsiHdimTVdVoJSkJEgFPRFKv_du_3-SQPOu26BEZFOuNeQc2Y5G-r5H-A4EzdtM
linkProvider EBSCOhost
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=proceeding&rft.title=AIP+conference+proceedings&rft.atitle=An+effectual+mechanism+for+injected+vulnerability+scrutiny+of+web+application+using+hybrid+aco+algorithm&rft.au=Rahmansait%2C+Rokaya+Shafrin&rft.au=Lazar+Jabasheela&rft.date=2023-08-24&rft.pub=American+Institute+of+Physics&rft.issn=0094-243X&rft.eissn=1551-7616&rft.volume=2790&rft.issue=1&rft_id=info:doi/10.1063%2F5.0152871&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0094-243X&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0094-243X&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0094-243X&client=summon