Volume- 9
Issue- 4
Year- 2022
DOI: 10.55524/ijirem.2022.9.4.22 | DOI URL: https://doi.org/10.55524/ijirem.2022.9.4.22 Crossref
This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/by/4.0)
Article Tools: Print the Abstract | Indexing metadata | How to cite item | Email this article | Post a Comment
K.Manohara Rao , M.Chaitanya Bharathi, A.Seshagiri Rao, SK. Heena Kauser
In this article, we have a tendency to propose a strategy to leverage Machine Learning (ML) for the detection of net application vulnerabilities. net applications area unit significantly difficult to analyse, thanks to their diversity and also the widespread adoption of custom programming practices. Millilitre is so terribly useful for net application security: it will benefit of manually tagged information to bring the human understanding of the net application linguistics into automatic analysis tools. we have a tendency to use our methodology within the style of Mitch, the primary millilitre answer for the black-box detection of Cross-Site Request Falsification(CSRF) vulnerabilities. Mitch allowed U.S.A. to spot thirty five new CSRFs on twenty major websites and three new CSRFs on production package.
Assistant Professor, Department of Information Technology, PACE Institute of Technology and Sciences, Ongole, Andhra Pradesh, India
No. of Downloads: 32 | No. of Views: 451
Amit Choudhury, Yuvaraj Madheswaran.
October 2024 - Vol 11, Issue 5
Praveen Harkawat.
February 2023 - Vol 10, Issue 1
V. Nagarjuna, G. Nagarjuna, N. Murali Krishna.
October 2022 - Vol 9, Issue 5