Cargando…
Multiple-Feature Extracting Modules Based Leak Mining System Design
Over the years, human dependence on the Internet has increased dramatically. A large amount of information is placed on the Internet and retrieved from it daily, which makes web security in terms of online information a major concern. In recent years, the most problematic issues in web security have...
Autores principales: | , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Hindawi Publishing Corporation
2013
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3878285/ https://www.ncbi.nlm.nih.gov/pubmed/24453892 http://dx.doi.org/10.1155/2013/704865 |
_version_ | 1782297777663901696 |
---|---|
author | Cho, Ying-Chiang Pan, Jen-Yi |
author_facet | Cho, Ying-Chiang Pan, Jen-Yi |
author_sort | Cho, Ying-Chiang |
collection | PubMed |
description | Over the years, human dependence on the Internet has increased dramatically. A large amount of information is placed on the Internet and retrieved from it daily, which makes web security in terms of online information a major concern. In recent years, the most problematic issues in web security have been e-mail address leakage and SQL injection attacks. There are many possible causes of information leakage, such as inadequate precautions during the programming process, which lead to the leakage of e-mail addresses entered online or insufficient protection of database information, a loophole that enables malicious users to steal online content. In this paper, we implement a crawler mining system that is equipped with SQL injection vulnerability detection, by means of an algorithm developed for the web crawler. In addition, we analyze portal sites of the governments of various countries or regions in order to investigate the information leaking status of each site. Subsequently, we analyze the database structure and content of each site, using the data collected. Thus, we make use of practical verification in order to focus on information security and privacy through black-box testing. |
format | Online Article Text |
id | pubmed-3878285 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2013 |
publisher | Hindawi Publishing Corporation |
record_format | MEDLINE/PubMed |
spelling | pubmed-38782852014-01-19 Multiple-Feature Extracting Modules Based Leak Mining System Design Cho, Ying-Chiang Pan, Jen-Yi ScientificWorldJournal Research Article Over the years, human dependence on the Internet has increased dramatically. A large amount of information is placed on the Internet and retrieved from it daily, which makes web security in terms of online information a major concern. In recent years, the most problematic issues in web security have been e-mail address leakage and SQL injection attacks. There are many possible causes of information leakage, such as inadequate precautions during the programming process, which lead to the leakage of e-mail addresses entered online or insufficient protection of database information, a loophole that enables malicious users to steal online content. In this paper, we implement a crawler mining system that is equipped with SQL injection vulnerability detection, by means of an algorithm developed for the web crawler. In addition, we analyze portal sites of the governments of various countries or regions in order to investigate the information leaking status of each site. Subsequently, we analyze the database structure and content of each site, using the data collected. Thus, we make use of practical verification in order to focus on information security and privacy through black-box testing. Hindawi Publishing Corporation 2013-12-17 /pmc/articles/PMC3878285/ /pubmed/24453892 http://dx.doi.org/10.1155/2013/704865 Text en Copyright © 2013 Y.-C. Cho and J.-Y. Pan. https://creativecommons.org/licenses/by/3.0/ This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. |
spellingShingle | Research Article Cho, Ying-Chiang Pan, Jen-Yi Multiple-Feature Extracting Modules Based Leak Mining System Design |
title | Multiple-Feature Extracting Modules Based Leak Mining System Design |
title_full | Multiple-Feature Extracting Modules Based Leak Mining System Design |
title_fullStr | Multiple-Feature Extracting Modules Based Leak Mining System Design |
title_full_unstemmed | Multiple-Feature Extracting Modules Based Leak Mining System Design |
title_short | Multiple-Feature Extracting Modules Based Leak Mining System Design |
title_sort | multiple-feature extracting modules based leak mining system design |
topic | Research Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3878285/ https://www.ncbi.nlm.nih.gov/pubmed/24453892 http://dx.doi.org/10.1155/2013/704865 |
work_keys_str_mv | AT choyingchiang multiplefeatureextractingmodulesbasedleakminingsystemdesign AT panjenyi multiplefeatureextractingmodulesbasedleakminingsystemdesign |