{ "access": { "embargo": { "active": false, "reason": null }, "files": "public", "record": "public", "status": "open" }, "created": "2021-10-14T06:00:32.162895+00:00", "custom_fields": { "journal:journal": { "issue": "3", "pages": "543-549", "title": "International Journal of Engineering and Advanced Technology (IJEAT)", "volume": "9" }, "legacy:subjects": [ { "identifier": "2249-8958", "scheme": "issn", "term": "ISSN" }, { "identifier": "C4778029320/2020\u00a9BEIESP", "scheme": "handle", "term": "Retrieval Number" } ] }, "deletion_status": { "is_deleted": false, "status": "P" }, "files": { "count": 1, "enabled": true, "entries": { "C4778029320 (1).pdf": { "checksum": "md5:92d41d1959d32f9f5d63ad6fb8c4ab30", "ext": "pdf", "id": "504c5f86-98a7-44cb-9162-bdd351a80404", "key": "C4778029320 (1).pdf", "metadata": null, "mimetype": "application/pdf", "size": 418832 } }, "order": [], "total_bytes": 418832 }, "id": "5568502", "is_draft": false, "is_published": true, "links": { "access": "https://zenodo.org/api/records/5568502/access", "access_links": "https://zenodo.org/api/records/5568502/access/links", "access_request": "https://zenodo.org/api/records/5568502/access/request", "access_users": "https://zenodo.org/api/records/5568502/access/users", "archive": "https://zenodo.org/api/records/5568502/files-archive", "archive_media": "https://zenodo.org/api/records/5568502/media-files-archive", "communities": "https://zenodo.org/api/records/5568502/communities", "communities-suggestions": "https://zenodo.org/api/records/5568502/communities-suggestions", "doi": "https://doi.org/10.35940/ijeat.C4778.029320", "draft": "https://zenodo.org/api/records/5568502/draft", "files": "https://zenodo.org/api/records/5568502/files", "latest": "https://zenodo.org/api/records/5568502/versions/latest", "latest_html": "https://zenodo.org/records/5568502/latest", "media_files": "https://zenodo.org/api/records/5568502/media-files", "parent": "https://zenodo.org/api/records/5568501", "parent_doi": "https://zenodo.org/doi/", "parent_html": "https://zenodo.org/records/5568501", "requests": "https://zenodo.org/api/records/5568502/requests", "reserve_doi": "https://zenodo.org/api/records/5568502/draft/pids/doi", "self": "https://zenodo.org/api/records/5568502", "self_doi": "https://zenodo.org/doi/10.35940/ijeat.C4778.029320", "self_html": "https://zenodo.org/records/5568502", "self_iiif_manifest": "https://zenodo.org/api/iiif/record:5568502/manifest", "self_iiif_sequence": "https://zenodo.org/api/iiif/record:5568502/sequence/default", "versions": "https://zenodo.org/api/records/5568502/versions" }, "media_files": { "count": 0, "enabled": false, "entries": {}, "order": [], "total_bytes": 0 }, "metadata": { "contributors": [ { "affiliations": [ { "name": "Publisher" } ], "person_or_org": { "family_name": "Blue Eyes Intelligence Engineering & Sciences Publication (BEIESP)", "name": "Blue Eyes Intelligence Engineering & Sciences Publication (BEIESP)", "type": "personal" }, "role": { "id": "sponsor", "title": { "de": "Sponsor", "en": "Sponsor" } } } ], "creators": [ { "affiliations": [ { "name": "CSE Department, Banasthali Vidyapeeth, Rajasthan India" } ], "person_or_org": { "family_name": "Asra Kalim", "name": "Asra Kalim", "type": "personal" } }, { "affiliations": [ { "name": "CSE Department, Banasthali Vidyapeeth, Rajasthan India" } ], "person_or_org": { "family_name": "C K Jha", "name": "C K Jha", "type": "personal" } }, { "affiliations": [ { "name": "CSE, MANIT, Bhopal, India." } ], "person_or_org": { "family_name": "Deepak Singh Tomar", "name": "Deepak Singh Tomar", "type": "personal" } }, { "affiliations": [ { "name": "cse, SATI, Vidisha, India. E" } ], "person_or_org": { "family_name": "Divya Rishi Sahu", "name": "Divya Rishi Sahu", "type": "personal" } } ], "description": "
Hardly a facet of human life is not influenced by the Internet due to the continuous proliferation in the Internet facilities, usage, speed, user friendly browsing, global access, etc. At flip side, hackers are also attacking this digital world with new tactics and techniques through exploiting the web application vulnerabilities. The analysis of these vulnerabilities is of paramount importance in direction to secure social digital world. It can be carried out in two ways. First, manual analysis which is error prone due to the human nature of forgiveness, dynamic change in technology and fraudulence attack techniques. Second, through the existing web application vulnerability scanners that sometime may suffer from generating false alarm rate. Hence, there is a need to develop a framework that can detect different levels of vulnerabilities, ranging from client side vulnerabilities, communication side vulnerabilities to server side vulnerabilities. This paper has carried out the literature survey in direction of identifying the new attack vectors, vulnerabilities, detection mechanism, research gaps and new working areas in same field. Continuous improvement in framework is easy. Hence, a framework is proposed to overcome the identified research gap.
", "languages": [ { "id": "eng", "title": { "en": "English" } } ], "publication_date": "2020-02-29", "publisher": "Zenodo", "related_identifiers": [ { "identifier": "2249-8958", "relation_type": { "id": "iscitedby", "title": { "de": "Wird zitiert von", "en": "Is cited by" } }, "resource_type": { "id": "publication-article", "title": { "de": "Zeitschriftenartikel", "en": "Journal article" } }, "scheme": "issn" } ], "resource_type": { "id": "publication-article", "title": { "de": "Zeitschriftenartikel", "en": "Journal article" } }, "rights": [ { "description": { "en": "The Creative Commons Attribution license allows re-distribution and re-use of a licensed work on the condition that the creator is appropriately credited." }, "icon": "cc-by-icon", "id": "cc-by-4.0", "props": { "scheme": "spdx", "url": "https://creativecommons.org/licenses/by/4.0/legalcode" }, "title": { "en": "Creative Commons Attribution 4.0 International" } } ], "subjects": [ { "subject": "Web Vulnerability, Web Malwares, Vulnerability Databases, Web Vulnerability Scanners, Webb Application Analysis" } ], "title": "A Framework for Web Application Vulnerability Detection" }, "parent": { "access": { "owned_by": { "user": 251627 } }, "communities": {}, "id": "5568501", "pids": {} }, "pids": { "doi": { "identifier": "10.35940/ijeat.C4778.029320", "provider": "external" }, "oai": { "identifier": "oai:zenodo.org:5568502", "provider": "oai" } }, "revision_id": 3, "stats": { "all_versions": { "data_volume": 18616443.0, "downloads": 39, "unique_downloads": 38, "unique_views": 48, "views": 50 }, "this_version": { "data_volume": 18616443.0, "downloads": 39, "unique_downloads": 38, "unique_views": 48, "views": 50 } }, "status": "published", "updated": "2021-11-16T10:11:54.525473+00:00", "versions": { "index": 1, "is_latest": true } }