Reference Hub7
An Agent Based Intelligent Dynamic Vulnerability Analysis Framework for Critical SQLIA Attacks: Intelligent SQLIA Vulnerability Analyzer Agent

An Agent Based Intelligent Dynamic Vulnerability Analysis Framework for Critical SQLIA Attacks: Intelligent SQLIA Vulnerability Analyzer Agent

Jeya Mala Dharmalingam, M Eswaran
Copyright: © 2018 |Volume: 14 |Issue: 3 |Pages: 27
ISSN: 1548-3657|EISSN: 1548-3665|EISBN13: 9781522542803|DOI: 10.4018/IJIIT.2018070104
Cite Article Cite Article

MLA

Dharmalingam, Jeya Mala, and M Eswaran. "An Agent Based Intelligent Dynamic Vulnerability Analysis Framework for Critical SQLIA Attacks: Intelligent SQLIA Vulnerability Analyzer Agent." IJIIT vol.14, no.3 2018: pp.56-82. http://doi.org/10.4018/IJIIT.2018070104

APA

Dharmalingam, J. M. & Eswaran, M. (2018). An Agent Based Intelligent Dynamic Vulnerability Analysis Framework for Critical SQLIA Attacks: Intelligent SQLIA Vulnerability Analyzer Agent. International Journal of Intelligent Information Technologies (IJIIT), 14(3), 56-82. http://doi.org/10.4018/IJIIT.2018070104

Chicago

Dharmalingam, Jeya Mala, and M Eswaran. "An Agent Based Intelligent Dynamic Vulnerability Analysis Framework for Critical SQLIA Attacks: Intelligent SQLIA Vulnerability Analyzer Agent," International Journal of Intelligent Information Technologies (IJIIT) 14, no.3: 56-82. http://doi.org/10.4018/IJIIT.2018070104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

This article describes how software vulnerability analysis and testing for web applications should detect not only the common attacks but also dynamic vulnerability attacks. These are the attacks such as structured query language injection attacks (SQLIAs) which will extract the most crucial user information from the targeted database. In this proposed approach, an intelligent agent namely intelligent vulnerability analyzer agent (IVA) is proposed in which the external attacks due to dynamic user inputs are identified using a heuristic-guided intelligent graph searching and then a pre and post condition based analysis is performed to identify the dynamic vulnerabilities. Further, the proposed approach is compared with some of the existing works based on the number of false positives and false negatives of attacks detection and confirmed that the proposed work is a novel and effective one in finding out SQLIAs.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.