Abstract
With the rapid development of computers and the Internet, WEB applications have been increasingly used in people’s lives, which has brought more hidden dangers. More and more attackers are focusing on WEB applications, using various attack methods to carry out malicious activities. In order to use web applications safely and protect the privacy of individuals or companies, this article has conducted research on web application-based vulnerability discovery and security protection, mainly for web application firewall technology, vulnerability detection technology, and data encryption Technology has made an in-depth understanding and application. Then this paper uses SVM-based multi-protocol abnormal traffic detection experiments and experimental analysis to further study vulnerability discovery and security protection. The accuracy of linear kernel function, polynomial kernel function and kernel radial basis function are respectively: 85.91%, 87.60%, 91.77%, which shows that the flow abnormality simulation experiment based on multiple protocols of support vector machine is very effective and successful Detected If a copper leak is detected in the system, it can detect vulnerabilities in web applications and issue warnings in advance to implement security protection functions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Periyasamy, K., Arirangan, S.: Prediction of future vulnerability discovery in software applications using vulnerability syntax tree (PFVD-VST). Int. Arab J. Inf. Technol. 16(2), 288–294 (2019)
Zonouz, S.A., Berthier, R., Khurana, H., et al.: Seclius: an information flow-based, consequence-centric security metric. IEEE Trans. Parallel Distrib. Syst. 26(2), 562–573 (2015)
Joh, H.C., Malaiya, Y.K.: Modeling skewness in vulnerability discovery. Qual. Reliab. Eng. Int. 30(8), 1445–1459 (2015)
Narang, S., Kapurt, P.K., Damodaran, D., et al.: Bi-criterion problem to determine optimal vulnerability discovery and patching time. Int. J. Reliab. Qual. Safety Eng. 25(1), 1850002:1–1850002:16 (2018)
Young, J.H., Michael, P., Hyun, S.K., et al.: Computational discovery of pathway-level genetic vulnerabilities in non-small-cell lung cancer. Bioinformatics 9, 1373–1379 (2016)
Wood, A., He, Y., Maglaras, L.A., et al.: A security architectural pattern for risk management of industry control systems within critical national infrastructure. Int. J. Crit. Infrastruct. 13(2–3), 113 (2017)
Sharma, R., Sibal, R., Shrivastava, A.K.: Vulnerability discovery modeling for open and closed source software. Int. J. Secure Software Eng. 7(4), 19–38 (2016)
Gonzales, D., Kaplan, J.M., Saltzman, E., et al.: Cloud-trust - a security assessment model for infrastructure as a service (IaaS) clouds. IEEE Trans. Cloud Comput. 3, 1–1 (2017)
Mooney, A., Quille, K., Bergin, S.: PreSS#, A web-based educational system to predict programming performance. Int. J. Software Eng. Knowl. Eng. 4(7), 178–189 (2015)
Kapur, P.K., Singh, O., Khatri, S.K.: Preface. Int. J. Reliability Qual. Saf. Eng. 23(6), 1602002:1 (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Yuan, H. et al. (2021). Vulnerability Discovery and Security Protection Based on Web Application. In: MacIntyre, J., Zhao, J., Ma, X. (eds) The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy. SPIOT 2020. Advances in Intelligent Systems and Computing, vol 1282. Springer, Cham. https://doi.org/10.1007/978-3-030-62743-0_92
Download citation
DOI: https://doi.org/10.1007/978-3-030-62743-0_92
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-62742-3
Online ISBN: 978-3-030-62743-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)