An effectual mechanism for injected vulnerability scrutiny of web application using hybrid aco algorithm
Malignant clients can attack Web based applications, exploiting infusion vulnerabilities in the programming statements. This paper address the test of identifying infused vulnerabilities in source code of Web based applications effectively. A incorporated system is established (executed in JOACO ins...
Saved in:
| Published in | AIP conference proceedings Vol. 2790; no. 1 |
|---|---|
| Main Authors | , |
| Format | Journal Article Conference Proceeding |
| Language | English |
| Published |
Melville
American Institute of Physics
24.08.2023
|
| Subjects | |
| Online Access | Get full text |
| ISSN | 0094-243X 1551-7616 |
| DOI | 10.1063/5.0152871 |
Cover
| Abstract | Malignant clients can attack Web based applications, exploiting infusion vulnerabilities in the programming statements. This paper address the test of identifying infused vulnerabilities in source code of Web based applications effectively. A incorporated system is established (executed in JOACO instrument) that merges security cutting with constraint solving. We use static investigation to produce little program cuts pertinent into security from Web based activities for creating attack conditions.Now constraint resolving technique for distinguishing attack conditions and to recognize the weakness in a program. The test outcomes, utilizing a standard of different Web organizations/administrations as well as secured standard applications, telling the methodology is essentially great convincing in identifying infusion vulnerabilities rather cutting edge draws near 98% review. The web applications shows that our methodology is more viable in distinguishing infusion vulnerabilities without creating any misleading problem. |
|---|---|
| AbstractList | Malignant clients can attack Web based applications, exploiting infusion vulnerabilities in the programming statements. This paper address the test of identifying infused vulnerabilities in source code of Web based applications effectively. A incorporated system is established (executed in JOACO instrument) that merges security cutting with constraint solving. We use static investigation to produce little program cuts pertinent into security from Web based activities for creating attack conditions.Now constraint resolving technique for distinguishing attack conditions and to recognize the weakness in a program. The test outcomes, utilizing a standard of different Web organizations/administrations as well as secured standard applications, telling the methodology is essentially great convincing in identifying infusion vulnerabilities rather cutting edge draws near 98% review. The web applications shows that our methodology is more viable in distinguishing infusion vulnerabilities without creating any misleading problem. |
| Author | Rahmansait, Rokaya Shafrin Lazar, Jabasheela |
| Author_xml | – sequence: 1 givenname: Rokaya Shafrin surname: Rahmansait fullname: Rahmansait, Rokaya Shafrin organization: Dept. of CSE, Panimalar Engineering College, Chennai, TamilNadu, India – sequence: 2 givenname: Jabasheela surname: Lazar fullname: Lazar, Jabasheela email: ljsheela@gmail.com organization: Dept. of CSE, Panimalar Engineering College, Chennai, TamilNadu, India |
| BookMark | eNotkEtLAzEAhINUsK0e_AcBb8LWPDbZ9FiKLyh4UfC2ZPPopuwma5JV9t9bbU8Dw8fMMAsw88EbAG4xWmHE6QNbIcyIqPAFmGPGcFFxzGdgjtC6LEhJP6_AIqUDQmRdVWIO2o2Hxlqj8ig72BvVSu9SD22I0PnD0Tcafo-dN1E2rnN5gknFMTs_wWDhj2mgHIbOKZld8HBMzu9hOzXRaShVgLLbh-hy21-DSyu7ZG7OugQfT4_v25di9_b8ut3sigFTmgvGrdSlIIqskWCowZpobonkrCGYmUZQTgypFF6XlmpWCl0pxLVBjJkKKUuX4O6UO8TwNZqU60MYoz9W1kQwzrFAJTpS9ycqKZf_p9dDdL2MU41R_fdkzerzk_QXH6BodA |
| CODEN | APCPCS |
| ContentType | Journal Article Conference Proceeding |
| Copyright | AIP Publishing LLC 2023 AIP Publishing LLC. |
| Copyright_xml | – notice: AIP Publishing LLC – notice: 2023 AIP Publishing LLC. |
| DBID | 8FD H8D L7M |
| DOI | 10.1063/5.0152871 |
| DatabaseName | Technology Research Database Aerospace Database Advanced Technologies Database with Aerospace |
| DatabaseTitle | Technology Research Database Aerospace Database Advanced Technologies Database with Aerospace |
| DatabaseTitleList | Technology Research Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Physics |
| EISSN | 1551-7616 |
| Editor | Balas, Valentina Emilia Al-Turjman, Fadi Kumar, V. D. Ambeth Malathi, S. Rodrigues, Joel J. P. C. |
| Editor_xml | – sequence: 1 givenname: V. D. Ambeth surname: Kumar fullname: Kumar, V. D. Ambeth organization: Panimalar Engineering College – sequence: 2 givenname: Joel J. P. C. surname: Rodrigues fullname: Rodrigues, Joel J. P. C. organization: Federal University of Piauí (UFPI) – sequence: 3 givenname: S. surname: Malathi fullname: Malathi, S. organization: Panimalar Engineering College – sequence: 4 givenname: Valentina Emilia surname: Balas fullname: Balas, Valentina Emilia organization: Aurel Vlaicu University of Arad – sequence: 5 givenname: Fadi surname: Al-Turjman fullname: Al-Turjman, Fadi organization: Near East University |
| ExternalDocumentID | acp |
| Genre | Conference Proceeding |
| GroupedDBID | -~X 23M 5GY AAAAW AABDS AAEUA AAPUP AAYIH ABJNI ACBRY ACZLF ADCTM AEJMO AFATG AFHCQ AGKCL AGLKD AGMXG AGTJO AHSDT AJJCW ALEPV ALMA_UNASSIGNED_HOLDINGS ATXIE AWQPM BPZLN F5P FDOHQ FFFMQ HAM M71 M73 RIP RQS SJN ~02 8FD ABJGX ADMLS H8D L7M |
| ID | FETCH-LOGICAL-p133t-56fad482c290850b1d2d6f2a65b215eb8362e27c194f3d548d7c06de055e70cf3 |
| ISSN | 0094-243X |
| IngestDate | Sun Jun 29 16:21:16 EDT 2025 Fri Jun 21 00:15:23 EDT 2024 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 1 |
| Language | English |
| LinkModel | OpenURL |
| MeetingName | 5TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING: IConIC 2K22 |
| MergedId | FETCHMERGED-LOGICAL-p133t-56fad482c290850b1d2d6f2a65b215eb8362e27c194f3d548d7c06de055e70cf3 |
| Notes | ObjectType-Conference Proceeding-1 SourceType-Conference Papers & Proceedings-1 content type line 21 |
| PQID | 2856618040 |
| PQPubID | 2050672 |
| PageCount | 9 |
| ParticipantIDs | proquest_journals_2856618040 scitation_primary_10_1063_5_0152871 |
| PublicationCentury | 2000 |
| PublicationDate | 20230824 |
| PublicationDateYYYYMMDD | 2023-08-24 |
| PublicationDate_xml | – month: 08 year: 2023 text: 20230824 day: 24 |
| PublicationDecade | 2020 |
| PublicationPlace | Melville |
| PublicationPlace_xml | – name: Melville |
| PublicationTitle | AIP conference proceedings |
| PublicationYear | 2023 |
| Publisher | American Institute of Physics |
| Publisher_xml | – name: American Institute of Physics |
| SSID | ssj0029778 |
| Score | 2.3328176 |
| Snippet | Malignant clients can attack Web based applications, exploiting infusion vulnerabilities in the programming statements. This paper address the test of... |
| SourceID | proquest scitation |
| SourceType | Aggregation Database Publisher |
| SubjectTerms | Algorithms Applications programs Security Source code |
| Title | An effectual mechanism for injected vulnerability scrutiny of web application using hybrid aco algorithm |
| URI | http://dx.doi.org/10.1063/5.0152871 https://www.proquest.com/docview/2856618040 |
| Volume | 2790 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVEBS databaseName: Inspec with Full Text customDbUrl: eissn: 1551-7616 dateEnd: 20241102 omitProxy: false ssIdentifier: ssj0029778 issn: 0094-243X databaseCode: ADMLS dateStart: 20000101 isFulltext: true titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text providerName: EBSCOhost |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Za9tAEF5ah9K-9UhpmrQstPTFqJV2tToeTZuQBicN1Aa_idUekakju44ccH59Z3SbhEL7IoSwJbHfas5vZgj5qLhnYp9rRyLLweeYJPRU7EQiTrXmkdAcC5zPL4LTqX82E7MuFVNWlxTpZ3X3YF3J_6AK1wBXrJL9B2Tbm8IFOAd84QgIw_E-xg-qmtH3SySON81iu9_c9PfCKK95G1WtCBb74mwMW3LRMRADVuftZoENqEuu7HYIwgTeOy_T71jN2MtzDzdleCHbYq3XEATqUC6ulut5kV13SaPsGseQz4uKvP1LbiW2hrbreccAkndyPTyToEYzYxayH35gHOOprAs_tnmlHW5DyV5V_WgjeJHwt3L0L6idWtYKzwmDqtSyEcYsrKaH9rfdPSkPZhVAg_1WBTp8nSpr0vcXP5KT6XicTI5nk0-r3w4OGcNkfD1x5THZYxxE3YDsjb6dj3-2HjoYw5Xqrt-2aUUV8C_t03Zckadgp1SUiZ5VMnlO9rt6TXrZQv-CPDL5S_KkXp5XJBvltMWftvhTwJ82-NMd_GmDP11aCvjTHv60xJ9W-FPAn7b475PpyfHk66lTT9hwVh7nhSMCK7UfMcVibF2YeprpwDIZiBRMQZNGYN4YFiov9i3X4NzqULmBNq4QJnSV5a_JIF_m5g2hMtLKhw_ehtb3pedKVynjpZGxrjKu0gfkqFm2pP6EbhIWgTfhRaBIDsiHdimTVdVoJSkJEgFPRFKv_du_3-SQPOu26BEZFOuNeQc2Y5G-r5H-A4EzdtM |
| linkProvider | EBSCOhost |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=proceeding&rft.title=AIP+conference+proceedings&rft.atitle=An+effectual+mechanism+for+injected+vulnerability+scrutiny+of+web+application+using+hybrid+aco+algorithm&rft.au=Rahmansait%2C+Rokaya+Shafrin&rft.au=Lazar+Jabasheela&rft.date=2023-08-24&rft.pub=American+Institute+of+Physics&rft.issn=0094-243X&rft.eissn=1551-7616&rft.volume=2790&rft.issue=1&rft_id=info:doi/10.1063%2F5.0152871&rft.externalDBID=NO_FULL_TEXT |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0094-243X&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0094-243X&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0094-243X&client=summon |