Broken Acces Control pada Website: System Literature Review
(1) Universitas Pertiwi
(*) Corresponding Author
Abstract
References
J. Mupokosera, Financial Services Information Security Culture: The Effect of Technology, People and Environment, Proc. 2023 2nd Zimbabwe Conf. Inf. Commun. Technol. ZCICT 2023, 2023, doi: 10.1109/ZCICT59466.2023.10552881.
J. B. Ullrich and J. Lam, Defacing websites via SQL injection, Netw. Secur., vol. 2008, no. 1, pp. 910, Jan. 2008, doi: 10.1016/S1353-4858(08)70007-2.
G. Davanzo, E. Medvet, and A. Bartoli, Anomaly detection techniques for a web defacement monitoring service, Expert Syst. Appl., vol. 38, no. 10, pp. 1252112530, Sep. 2011, doi: 10.1016/J.ESWA.2011.04.038.
Biz Serve IT Blog | Insights on Cybersecurity. https://www.bizserveit.com/blogs/horizontal-privilege-escalation-broken-access-control (accessed Jan. 12, 2025).
A. Anas, A. A. Alhelbawy, S. El Gamal, and B. Youssef, BACAD: AI-based framework for detecting vertical broken access control attacks, Egypt. Informatics J., vol. 28, p. 100571, Dec. 2024, doi: 10.1016/J.EIJ.2024.100571.
F. Younas, A. Raza, N. Thalji, L. Abualigah, R. A. Zitar, and H. Jia, An efficient artificial intelligence approach for early detection of cross-site scripting attacks, Decis. Anal. J., vol. 11, p. 100466, Jun. 2024, doi: 10.1016/J.DAJOUR.2024.100466.
C. Hou, J. Shi, M. Cui, and Q. Yang, Attack versus Attack: Toward Adversarial Example Defend Website Fingerprinting Attack, Proc. - 2021 IEEE 20th Int. Conf. Trust. Secur. Priv. Comput. Commun. Trust. 2021, pp. 766773, 2021, doi: 10.1109/TRUSTCOM53373.2021.00111.
D. Arnaldy and A. R. Perdana, Implementation and Analysis of Penetration Techniques Using the Man-In-The-Middle Attack, Proc. - 2019 2nd Int. Conf. Comput. Informatics Eng. Artif. Intell. Roles Ind. Revolut. 4.0, IC2IE 2019, pp. 188192, Sep. 2019, doi: 10.1109/IC2IE47452.2019.8940872.
A01 Broken Access Control - OWASP Top 10:2021. https://owasp.org/Top10/A01_2021-Broken_Access_Control/ (accessed Jan. 11, 2025).
N. S. M. Farras, J. Loderick, H. A. Saputri, and A. C. Sari, Exploring Penetration Testing: A Comparative Analysis of Brute Force Directory Tools in Vulnerability Analysis Phase, 2024 2nd Int. Conf. Technol. Innov. Its Appl., pp. 16, Sep. 2024, doi: 10.1109/ICTIIA61827.2024.10761451.
DOI: http://dx.doi.org/10.30998/faktorexacta.v18i2.27979
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
