Skip to main content

Vulnerability Discovery and Security Protection Based on Web Application

  • Conference paper
  • First Online:
The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy (SPIOT 2020)

Abstract

With the rapid development of computers and the Internet, WEB applications have been increasingly used in people’s lives, which has brought more hidden dangers. More and more attackers are focusing on WEB applications, using various attack methods to carry out malicious activities. In order to use web applications safely and protect the privacy of individuals or companies, this article has conducted research on web application-based vulnerability discovery and security protection, mainly for web application firewall technology, vulnerability detection technology, and data encryption Technology has made an in-depth understanding and application. Then this paper uses SVM-based multi-protocol abnormal traffic detection experiments and experimental analysis to further study vulnerability discovery and security protection. The accuracy of linear kernel function, polynomial kernel function and kernel radial basis function are respectively: 85.91%, 87.60%, 91.77%, which shows that the flow abnormality simulation experiment based on multiple protocols of support vector machine is very effective and successful Detected If a copper leak is detected in the system, it can detect vulnerabilities in web applications and issue warnings in advance to implement security protection functions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Periyasamy, K., Arirangan, S.: Prediction of future vulnerability discovery in software applications using vulnerability syntax tree (PFVD-VST). Int. Arab J. Inf. Technol. 16(2), 288–294 (2019)

    Google Scholar 

  2. Zonouz, S.A., Berthier, R., Khurana, H., et al.: Seclius: an information flow-based, consequence-centric security metric. IEEE Trans. Parallel Distrib. Syst. 26(2), 562–573 (2015)

    Article  Google Scholar 

  3. Joh, H.C., Malaiya, Y.K.: Modeling skewness in vulnerability discovery. Qual. Reliab. Eng. Int. 30(8), 1445–1459 (2015)

    Article  Google Scholar 

  4. Narang, S., Kapurt, P.K., Damodaran, D., et al.: Bi-criterion problem to determine optimal vulnerability discovery and patching time. Int. J. Reliab. Qual. Safety Eng. 25(1), 1850002:1–1850002:16 (2018)

    Google Scholar 

  5. Young, J.H., Michael, P., Hyun, S.K., et al.: Computational discovery of pathway-level genetic vulnerabilities in non-small-cell lung cancer. Bioinformatics 9, 1373–1379 (2016)

    Article  Google Scholar 

  6. Wood, A., He, Y., Maglaras, L.A., et al.: A security architectural pattern for risk management of industry control systems within critical national infrastructure. Int. J. Crit. Infrastruct. 13(2–3), 113 (2017)

    Article  Google Scholar 

  7. Sharma, R., Sibal, R., Shrivastava, A.K.: Vulnerability discovery modeling for open and closed source software. Int. J. Secure Software Eng. 7(4), 19–38 (2016)

    Article  Google Scholar 

  8. Gonzales, D., Kaplan, J.M., Saltzman, E., et al.: Cloud-trust - a security assessment model for infrastructure as a service (IaaS) clouds. IEEE Trans. Cloud Comput. 3, 1–1 (2017)

    Google Scholar 

  9. Mooney, A., Quille, K., Bergin, S.: PreSS#, A web-based educational system to predict programming performance. Int. J. Software Eng. Knowl. Eng. 4(7), 178–189 (2015)

    Google Scholar 

  10. Kapur, P.K., Singh, O., Khatri, S.K.: Preface. Int. J. Reliability Qual. Saf. Eng. 23(6), 1602002:1 (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hui Yuan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yuan, H. et al. (2021). Vulnerability Discovery and Security Protection Based on Web Application. In: MacIntyre, J., Zhao, J., Ma, X. (eds) The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy. SPIOT 2020. Advances in Intelligent Systems and Computing, vol 1282. Springer, Cham. https://doi.org/10.1007/978-3-030-62743-0_92

Download citation

Publish with us

Policies and ethics