Bypassing Web Application Firewalls Using Deep Reinforcement Learning

Mojtaba Hemmati; Mohammad Ali Hadavi

Volume 14, Issue 2 , July 2022, , Pages 131-145

http://dx.doi.org/10.22042/isecure.2022.323140.744

Abstract
  Web application firewalls (WAFs) are used for protecting web applications from attacks such as SQL injection, cross-site request forgery, and cross-site scripting. As a result of the growing complexity of web attacks, WAFs need to be tested and updated on a regular basis. There are various tools and ...  Read More

A Review Study on SQL Injection Attacks, Prevention, and Detection

Mona Alsalamah; Huda Alwabli; Hutaf Alqwifli; Dina M. Ibrahim

Volume 13, Issue 3 , November 2021, , Pages 1-10

http://dx.doi.org/10.22042/isecure.2021.0.0.0

Abstract
  The functionality of web-based system can be affected by many threats. In fact, web-based systems provide several services built on databases. This makes them prone to Structured Query Language (SQL) injection attacks. For that reason, many research efforts have been made to deal with such attack. The ...  Read More

Secure Coding Guidelines — Python

Mohammad Ali A. Hammoudeh; Renad Ibrahim; Lama Alshraryan; Manar Alnomise; Ragad Alhumidan

Volume 13, Issue 3 , November 2021, , Pages 31-38

http://dx.doi.org/10.22042/isecure.2021.13.3.0

Abstract
  Recently, the interest in cybercrime and cybersecurity has increased dramatically both in terms of critical security issues and national economic information infrastructure and sensitive dealing policies, such as protection and data privacy. Moreover, the growing threat of cybersecurity has prompted ...  Read More