Cargando…

Multiple-Feature Extracting Modules Based Leak Mining System Design

Over the years, human dependence on the Internet has increased dramatically. A large amount of information is placed on the Internet and retrieved from it daily, which makes web security in terms of online information a major concern. In recent years, the most problematic issues in web security have...

Descripción completa

Detalles Bibliográficos
Autores principales: Cho, Ying-Chiang, Pan, Jen-Yi
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Hindawi Publishing Corporation 2013
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3878285/
https://www.ncbi.nlm.nih.gov/pubmed/24453892
http://dx.doi.org/10.1155/2013/704865
_version_ 1782297777663901696
author Cho, Ying-Chiang
Pan, Jen-Yi
author_facet Cho, Ying-Chiang
Pan, Jen-Yi
author_sort Cho, Ying-Chiang
collection PubMed
description Over the years, human dependence on the Internet has increased dramatically. A large amount of information is placed on the Internet and retrieved from it daily, which makes web security in terms of online information a major concern. In recent years, the most problematic issues in web security have been e-mail address leakage and SQL injection attacks. There are many possible causes of information leakage, such as inadequate precautions during the programming process, which lead to the leakage of e-mail addresses entered online or insufficient protection of database information, a loophole that enables malicious users to steal online content. In this paper, we implement a crawler mining system that is equipped with SQL injection vulnerability detection, by means of an algorithm developed for the web crawler. In addition, we analyze portal sites of the governments of various countries or regions in order to investigate the information leaking status of each site. Subsequently, we analyze the database structure and content of each site, using the data collected. Thus, we make use of practical verification in order to focus on information security and privacy through black-box testing.
format Online
Article
Text
id pubmed-3878285
institution National Center for Biotechnology Information
language English
publishDate 2013
publisher Hindawi Publishing Corporation
record_format MEDLINE/PubMed
spelling pubmed-38782852014-01-19 Multiple-Feature Extracting Modules Based Leak Mining System Design Cho, Ying-Chiang Pan, Jen-Yi ScientificWorldJournal Research Article Over the years, human dependence on the Internet has increased dramatically. A large amount of information is placed on the Internet and retrieved from it daily, which makes web security in terms of online information a major concern. In recent years, the most problematic issues in web security have been e-mail address leakage and SQL injection attacks. There are many possible causes of information leakage, such as inadequate precautions during the programming process, which lead to the leakage of e-mail addresses entered online or insufficient protection of database information, a loophole that enables malicious users to steal online content. In this paper, we implement a crawler mining system that is equipped with SQL injection vulnerability detection, by means of an algorithm developed for the web crawler. In addition, we analyze portal sites of the governments of various countries or regions in order to investigate the information leaking status of each site. Subsequently, we analyze the database structure and content of each site, using the data collected. Thus, we make use of practical verification in order to focus on information security and privacy through black-box testing. Hindawi Publishing Corporation 2013-12-17 /pmc/articles/PMC3878285/ /pubmed/24453892 http://dx.doi.org/10.1155/2013/704865 Text en Copyright © 2013 Y.-C. Cho and J.-Y. Pan. https://creativecommons.org/licenses/by/3.0/ This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
spellingShingle Research Article
Cho, Ying-Chiang
Pan, Jen-Yi
Multiple-Feature Extracting Modules Based Leak Mining System Design
title Multiple-Feature Extracting Modules Based Leak Mining System Design
title_full Multiple-Feature Extracting Modules Based Leak Mining System Design
title_fullStr Multiple-Feature Extracting Modules Based Leak Mining System Design
title_full_unstemmed Multiple-Feature Extracting Modules Based Leak Mining System Design
title_short Multiple-Feature Extracting Modules Based Leak Mining System Design
title_sort multiple-feature extracting modules based leak mining system design
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3878285/
https://www.ncbi.nlm.nih.gov/pubmed/24453892
http://dx.doi.org/10.1155/2013/704865
work_keys_str_mv AT choyingchiang multiplefeatureextractingmodulesbasedleakminingsystemdesign
AT panjenyi multiplefeatureextractingmodulesbasedleakminingsystemdesign