Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

SAISAN: An Automated Local File Inclusion Vulnerability Detection Model

View through CrossRef
Communicating and delivering services to the consumers through web applications are now become very popular due to its user friendly interface, global accessibility, and easy manageability. Careless design and development of web applications are the key reasons for security breaches which are very alarming for the users as well as the web administrators. Currently, Local File Inclusion (LFI) vulnerability is found present commonly in several web applications that lead to remote code execution in host server and initiates sensitive information disclosure. Detection of LFI vulnerability is getting very critical concern for the web owner to take effective measures to mitigate the risk. After reviewing literatures, we found insignificant researches conducted on automated detection of LFI vulnerability. This paper has proposed an automated LFI vulnerability detection model, SAISANfor web applications and implemented it through a tool. 265 web applications of four different sectors has been examined and received 88% accuracy from the tool comparing with the manual penetration testing method.
Title: SAISAN: An Automated Local File Inclusion Vulnerability Detection Model
Description:
Communicating and delivering services to the consumers through web applications are now become very popular due to its user friendly interface, global accessibility, and easy manageability.
Careless design and development of web applications are the key reasons for security breaches which are very alarming for the users as well as the web administrators.
Currently, Local File Inclusion (LFI) vulnerability is found present commonly in several web applications that lead to remote code execution in host server and initiates sensitive information disclosure.
Detection of LFI vulnerability is getting very critical concern for the web owner to take effective measures to mitigate the risk.
After reviewing literatures, we found insignificant researches conducted on automated detection of LFI vulnerability.
This paper has proposed an automated LFI vulnerability detection model, SAISANfor web applications and implemented it through a tool.
265 web applications of four different sectors has been examined and received 88% accuracy from the tool comparing with the manual penetration testing method.

Related Results

Test file
Test file
Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file.Test file....
Next steps in capturing vulnerability dynamics: Introducing a connectivity-based model on systemic vulnerability to multi-hazards
Next steps in capturing vulnerability dynamics: Introducing a connectivity-based model on systemic vulnerability to multi-hazards
Vulnerability has been acknowledged as a dynamic concept since the Pressure and Release model of Blaikie et al. (1994), as well as by other well-known models that integrate this ri...
Creating Secure File Systems in Open-Source Operating Systems
Creating Secure File Systems in Open-Source Operating Systems
The relevance of this study is determined by insecure data storage on personal computers, as it is the main operating system that performs authentication and file access control. B...
Ecological vulnerability assessment based on remote sensing ecological index (RSEI): A case of Zhongxian County, Chongqing
Ecological vulnerability assessment based on remote sensing ecological index (RSEI): A case of Zhongxian County, Chongqing
The ecological vulnerability evaluation index was established through Normalized Difference Vegetation Index (NDVI), Wetness (WET), Normalized Difference Build-up and Soil Index (N...
Geological hazard vulnerability assessment based on Cloud model in Zhejiang Province, China
Geological hazard vulnerability assessment based on Cloud model in Zhejiang Province, China
Abstract Geological hazard vulnerability assessment plays a crucial role in disaster prevention and mitigation strategies. However, current methodologies often prioritize i...
Vulnerability and informal caregiver: a scoping review
Vulnerability and informal caregiver: a scoping review
Abstract Objective This review paper examines the concept of vulnerability in the overall literature and its relation to inform...
Perancangan Aplikasi Kompresi File MP3 Dengan Menggunakan Algoritma Lempel Ziv Welch (LZW)
Perancangan Aplikasi Kompresi File MP3 Dengan Menggunakan Algoritma Lempel Ziv Welch (LZW)
File berbentuk suara  banyak digunakan dalam kegiatan sehari-hari orang dalam mendukung aktifitasnya seperti penggunaan file suara dalam aplikasi pemutar musik baik secara daring m...

Back to Top