Chapter 15 An implementation of machine learning to detect real time web application vulnerabilities

Tarun Dhar Diwan

Govt. E. Raghavendra Rao P.G. Science College, Bilaspur, India

Siddhartha Choubey

Shri Shankaracharya Technical Campus, Bhilai, India

H. S. Hota

Atal Bihari Vajpayee Vishwavidyalaya, Bilaspur, India

DOI: 10.1201/9781003386599-17

Contents

  1. 15.1 Introduction
  2. 15.2 Architecture of vulnerability scanners
  3. 15.3 Recognition of vulnerabilities automatically
  4. 15.4 Principles of attack and analyzation

Get Applications of Mathematical Modeling, Machine Learning, and Intelligent Computing for Industrial Development now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.