{"id":6980,"date":"2025-06-25T18:14:20","date_gmt":"2025-06-25T18:14:20","guid":{"rendered":"https:\/\/ijete.com\/?p=6980"},"modified":"2026-03-16T18:40:19","modified_gmt":"2026-03-16T18:40:19","slug":"ijetev1i1a002","status":"publish","type":"post","link":"https:\/\/ijete.com\/index.php\/2025\/06\/25\/ijetev1i1a002\/","title":{"rendered":"IJETEV1I1A002 &#8211; BLOSTERING WEB SECURITY BY INTEGRATING FRAMEWORKS TO DETECT SQL INJECTION AND XSS VULNERABILITIES"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"6980\" class=\"elementor elementor-6980\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9917077 e-con-full e-flex e-con e-child\" data-id=\"9917077\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-c0599d9 e-con-full e-flex e-con e-child\" data-id=\"c0599d9\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-41ea3c3 elementor-widget elementor-widget-heading\" data-id=\"41ea3c3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><span style=\"letter-spacing: 0px\">IJETEV1I1A002 - BLOSTERING WEB SECURITY BY INTEGRATING FRAMEWORKS TO DETECT SQL INJECTION AND XSS VULNERABILITIES<\/span><span style=\"letter-spacing: 0px\"><\/span><br><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2a65af5 e-con-full e-flex e-con e-child\" data-id=\"2a65af5\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8598fdd elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"8598fdd\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong><span style=\"color: #b20909;\">AUTHORS<\/span> :<\/strong> \u00a0G. Sivakumar, \u00a0Arthi M.E, Sahasra S, Gowtham Siddarth N<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9a7d61c elementor-widget elementor-widget-post-info\" data-id=\"9a7d61c\" data-element_type=\"widget\" data-widget_type=\"post-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-fcdd1a1 elementor-inline-item\" itemprop=\"datePublished\">\n\t\t\t\t\t\t<a href=\"https:\/\/ijete.com\/index.php\/2025\/06\/25\/\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-calendar\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-date\">\n\t\t\t\t\t\t\t\t\t\t<time>June , 2025<\/time>\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d846215 elementor-widget elementor-widget-text-editor\" data-id=\"d846215\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #b20909;\"><strong>ABSTRACT<\/strong><\/span> &#8211;\u00a0<span style=\"letter-spacing: 0px;\">With the increasing number of web applications, cyber threats such as SQL Injection (SQLi) and Cross-Site Scripting (XSS) have become more prevalent. This paper presents a framework for bolstering web security by integrating multiple detection mechanisms for SQLi and XSS vulnerabilities. The system combines automated scanning techniques with penetration testing tools such as SQLMap for SQL Injection and script-based analysis for XSS detection. The proposed framework enhances web security by assisting security professionals in identifying vulnerabilities and mitigating potential threats before exploitation occurs. The findings emphasize the importance of proactive security assessment in modern web applications. Additionally, this research explores novel techniques in heuristic analysis, machine learning-based anomaly detection.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a48d1b1 elementor-widget elementor-widget-button\" data-id=\"a48d1b1\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"http:\/\/ijete.com\/wp-content\/uploads\/2025\/06\/IJETEV1I1A002.pdf\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">DOWNLOAD<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0e58ace elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"0e58ace\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>IJETEV1I1A002 &#8211; BLOSTERING WEB SECURITY BY INTEGRATING FRAMEWORKS TO DETECT SQL INJECTION AND XSS VULNERABILITIES AUTHORS : \u00a0G. Sivakumar, \u00a0Arthi M.E, Sahasra S, Gowtham Siddarth N ABSTRACT &#8211;\u00a0With the increasing number of web applications, cyber threats such as SQL Injection (SQLi) and Cross-Site Scripting (XSS) have become more prevalent. This paper presents a framework for [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-6980","post","type-post","status-publish","format-standard","hentry","category-engineering"],"_links":{"self":[{"href":"https:\/\/ijete.com\/index.php\/wp-json\/wp\/v2\/posts\/6980","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ijete.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ijete.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ijete.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ijete.com\/index.php\/wp-json\/wp\/v2\/comments?post=6980"}],"version-history":[{"count":7,"href":"https:\/\/ijete.com\/index.php\/wp-json\/wp\/v2\/posts\/6980\/revisions"}],"predecessor-version":[{"id":6994,"href":"https:\/\/ijete.com\/index.php\/wp-json\/wp\/v2\/posts\/6980\/revisions\/6994"}],"wp:attachment":[{"href":"https:\/\/ijete.com\/index.php\/wp-json\/wp\/v2\/media?parent=6980"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ijete.com\/index.php\/wp-json\/wp\/v2\/categories?post=6980"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ijete.com\/index.php\/wp-json\/wp\/v2\/tags?post=6980"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}