Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2013, Article ID 704865, 11 pages
Research Article

Multiple-Feature Extracting Modules Based Leak Mining System Design

Department of Electrical Engineering, CCU University, Chia-Yi 62102, Taiwan

Received 23 September 2013; Accepted 27 October 2013

Academic Editors: W. Sun, G. Zhang, and J. Zhou

Copyright © 2013 Ying-Chiang Cho and Jen-Yi Pan. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


Over the years, human dependence on the Internet has increased dramatically. A large amount of information is placed on the Internet and retrieved from it daily, which makes web security in terms of online information a major concern. In recent years, the most problematic issues in web security have been e-mail address leakage and SQL injection attacks. There are many possible causes of information leakage, such as inadequate precautions during the programming process, which lead to the leakage of e-mail addresses entered online or insufficient protection of database information, a loophole that enables malicious users to steal online content. In this paper, we implement a crawler mining system that is equipped with SQL injection vulnerability detection, by means of an algorithm developed for the web crawler. In addition, we analyze portal sites of the governments of various countries or regions in order to investigate the information leaking status of each site. Subsequently, we analyze the database structure and content of each site, using the data collected. Thus, we make use of practical verification in order to focus on information security and privacy through black-box testing.

1. Introduction

This paper discusses the issues of e-mail address leakage [1] and SQL injection [2] in online information security. Hackers commonly operate by means of social networks, APT (advanced persistent threat) and spam, and all of these methods begin with the acquisition of the e-mail addresses of their victims [3, 4]. Possible reasons for e-mail addresses being detected are (1) the web programmer not filtering the symbol “@”, the most significant character of an e-mail address, which can be captured by the 24-hour running crawler mining system, and (2) website programmers not being sufficiently rigorous in implementing the “robots.txt” file that prevents crawler programs from accessing the site. Before such automated programs access a page, they determine whether the site contains the robots.txt file that limits their access to specific sites [5]. All normal and well-intentioned programs follow the command of this file [6]; however, the robots.txt is not always enforceable, which means that some spammers and other malicious programs are still able to ignore it [7]. Therefore, it is necessary for certain website programmers to protect confidential online information with a password or an improved program writing style [8, 9].

The Internet environment today is very different from how it was 20 years ago. Firstly, different kinds of automated programs for data collection are continually being developed. Malicious users are able to spread hazardous e-mails after having gathered e-mail address information, accompanied by automatic sending programs, which is a serious information security problem [1, 3, 10]. Secondly, the database that stores the core information for each site requires sufficient protection, and therefore, website programmers need to attempt to prevent malicious pervasive injection attacks by means of improved programming styles [11].

To solve above problems, this study implements a crawler mining system equipped with black-box testing thinking [1214]. This system consists of three main modules: dynamic scanning module, static mining module, manual operating module, and six functions: data syntax analysis function, hidden page exploring function, multidomain searching on one IP function, specific file searching function, a search engine assistant function, and a website vulnerability updating function. This study analyzes governmental web portals as measured objects, with 24 hours as a unit, where the number of e-mail addresses collected and injectable URLs detected in each is calculated in order to compare the degree of concern around information security in different countries or regions.

This paper proceeds as follows. Section 2 discusses the previous algorithms. Section 3 clarifies the system design analysis. Section 4 presents experiment and result analysis, and Section 5 concludes.

2. Previous Algorithms

There are currently several searching strategies commonly used by web crawlers, which are discussed below.

Algorithm Based on IP Address. The web crawler obtains a starting IP address, and then proceeds to search the file document of each website included in this IP address one at a time. This method does not take into consideration the URL addresses from pages that lead to other websites. The advantage of this method is the ability to search the pages that cannot be hyperlinked; the disadvantage is that it cannot crawl the entire website. Some modules of our proposed system adopt this strategy.

Algorithm Based on Breadth-First Searching. In the crawling process, after completing the searching of the first level, we shall move on to the next level, and so on, until the searching is completed. In order to cover as many pages as possible, we generally use breadth-first search. Other research has applied breadth-first search to focus the crawler [15, 16]. The main idea behind this method is that there is a large possibility of the starting URL having a theme connection with the pages that are within a certain linking distance [15, 17, 18]. The crawler of the breath-first search gathers all the pages of the starting page and chooses one link from which to take all the pages. Owing to this, the web crawler is capable of speeding up parallel processing. Some modules of our system make use of this strategy.

Algorithm Based on Depth-First Searching. The aim of such an algorithm is to reach the end of searched websites, including those websites that do not contain any hyperlinks. When the hyperlink of a page is chosen, the pages connected to it will undergo a depth-first search (DFS). Before searching the rest of the links, the crawler must completely search this single chain. The crawler will move to the end, along the hyperlink from the page, and then return to another page, continually selecting hyperlinks. When there are no further hyperlinks to choose, the search comes to an end [19, 20]. The advantage of this method is the ability to search through an entire website. The disadvantage is that the crawler may easily become trapped, since the structure of some websites is rather complex and deep.

Algorithm Based on Best-First Searching. This method makes use of the specific webpage analysis algorithm to set a standard value against which the target directed by the URL is evaluated, gathering those URLs that are determined to be above the standard value. The algorithm is limited to the pages whose relation is larger than the standard value set by the webpage analysis algorithm. The disadvantage of this method is that it is likely to ignore many pages during the crawling process, as it is a partial searching method [21]. Therefore, it should be used alongside other application methods in order to achieve optimum performance [22, 23].

Algorithm Based on Reinforcement Learning. Rennie and McCallum incorporated reinforcement learning into the web crawler’s learning process [24]. This method is based on machine learning and is divided into the training phase and the crawling phase. It makes use of reinforcement learning to calculate the future return value, the link for which is provided to form the training module. Thereafter, it predicts the actual future return value by using the training module in the crawling phase, in order to determine the visiting priority of the link.

Algorithm Based on the Context Graph. The algorithm for the web crawler based on the context graph is able to determine the searching direction by means of the value, but it is incapable of estimating the distance to the target page. Therefore, Diligentim et al. proposed a new searching strategy based on the context graph [22, 25, 26] that estimates the distance to the target page by forming a typical webpage under the context graph. The closer the page, the sooner it is crawled, with the closest being crawled first.

Algorithms Based on Content Evaluation or Link Structure Evaluation. Representative methods based on content evaluation include the Fish-search algorithm [27], the shark-search algorithm [28], the neural network search algorithm, and the web hyperlink analysis algorithm [2932], while Page Rank [30] and Hits [33] are algorithms based on link structure evaluation. The Page Rank algorithm attempts to determine the importance of a page based on other associated pages of a good quality [34, 35]. The basic idea behind the Hits algorithm is to use the reference link among pages to obtain useful information hidden within the pages through two weight evaluations, Authority and Hub, in order to evaluate the quality of pages [36]. The results obtained from Hits are highly dependent on the chosen starting figures. It is easy to generate theme drift, since the theme authority differs between pages, which aims at different themes. In order to resolve the atmosphere above, the ARC algorithm [37] as well as the Clever algorithm [38] have been developed, which take into consideration the performance of the theme search.

Algorithm Based on Classifier-Guided Crawlers. Although the algorithm based on classifier-guided crawlers is an effective method, there has been little research relating to it [39]. Chakrabarti et al. proposed the focused crawling system [25], which is based on the Naive Bayes classifier. Menczer and Belew presented the Infospiders system [40], which is based on the agent formulae of a genetic algorithm and reinforcement learning. This model is composed of collateral crawls, each of which has its own prediction classifier. Johnson et al. proposed theme crawls based on a support vector machine [41].

Other Algorithms. In addition to the above, many other web crawler algorithms have been developed. For example, [42] described the case of certain page contents being connected to irrelevant pages. Therefore, an algorithm is needed for crawlers to bypass irrelevant pages in order to reach the related ones. There is also an algorithm that limits the scope of themes that crawlers focus on, such as DNS, link class, IP, or national language. Some modules of our system adopt this strategy.

3. System Design

This research implements the crawler mining system, which was developed according to the algorithms above, using the JAVA SE7 version with more than 70,000 rows of coding. It can be installed normally in JRE (Java Runtime Environment) on WinXP/Vista/Win7. This system contains three modules and six functions, as shown in Figure 1. Figure 2 shows the main interface of the system, which is divided into three parts: the browser is in the middle, on the right is the URL queue to be examined, and the list of vulnerable information appears at the bottom.

Figure 1: Crawler mining system framework.
Figure 2: Crawler mining system interface.

The crawler mining system is capable of carrying out injections to penetrate databases such as MS-SQL, MySQL, Oracle, PostgreSQL, SQLite, and Access, as well as web languages such as ASP, ASPX, PHP, JSP, and CGI.

3.1. Design Principle Analysis
3.1.1. Dynamic Scanning Module

During the browsing process, the system automatically detects the current browsers one at a time, which makes it easy for the user to be aware of leaks that may occur in the website. Attacks that disclose information from websites can easily take place. Figure 3 provides a basic example, showing how the crawler mining system searches in Google for official websites. The system will immediately filter all the URLs that appear in the browser. When the system obtains a new URL, it places it into the queue list, and vulnerable URLs are placed into the injection list for further analysis. Figure 4 shows the results of the further analysis of the vulnerable websites, where the crawler mining system checks the database lists of the websites [43]. The database password for this website can be found as it is saved in plain text, which does not provide adequate security. When malicious attackers obtain this information, they are able to infiltrate this website immediately.

Figure 3: Official websites detection.
Figure 4: Official website stores database password in plain text.
3.1.2. Static Mining Module

This type of module is used to conduct deep digging in specific websites, with its purpose being classified as static searching. The sensitive information function decides whether it is followed by the robots.txt of the website. Robots.txt is a document coded by ASCII that is stored in the website’s root directory and tells the web crawler which content can or cannot be accessed [7]. Other hackers filter the e-mail accounts that are leaked from the website, inspecting risky injection URLs, downloading documents with various filename extensions, or picking up the broken links containing private information. Figure 5 illustrates the static mining module. The crawler mining system is able to filter the e-mail addresses that are leaked from websites; this process is illustrated in Figure 6. The system is capable of determining injection weaknesses or the major loopholes of the website, as shown in Figure 7. These injection URLs can be used in conjunction with the built-in data programming analysis function in order to inject into the database of the website to obtain the usernames and e-mail accounts stored within it. Figure 8 demonstrates that, when malicious users obtain this information, they may perform various malicious attacks, such as spreading e-mails with viruses, conducting social engineering attacks to gain users’ passwords, or obtaining personal information by infiltrating the database of the website [3, 10]. The more injection URLs that are detected by the crawler mining system, the more logical programming errors this website contains, leading to the invasion risk being relatively high.

Figure 5: Static mining module.
Figure 6: E-mail address leak from the website.
Figure 7: List of SQL injection URLs.
Figure 8: E-mail address leak in the database.
3.1.3. Manual Operating Module

All of the functions that constitute the dynamic scanning module and the static mining module are automatic; however, human logic is the most important factor when it comes to web security [44]. The various functions that can be conducted by humans form the manual operation module.

3.2. Function Analysis
3.2.1. Data Syntax Analysis Function

Based on SQL injection [45, 46], we use the system to conduct an examination of the database of a website [11]. When an issue in the programming of the website causes the system to be incapable of determining whether the figures injected are attached to SQL orders, these attached orders will run normally, since the database does not detect the injection. In this way, illegal users are able to obtain database information, which causes serious problems in information security [47]. Users may then be hacked because their information is leaked, the website structure is invaded illegally, or the administrator’s account is altered to gain higher authority in order for malicious links or cross-site scripting to be added to the website [48]. When the system conducts the examination, the first step is to search for the injection point, to judge whether the website contains any harmful designs. Thereafter, a syntax dictionary is added to this system through the URL in order to block information and automatically judge from the feedback of the website whether anything will be achieved by conducting digging. The following shows the basic syntax injection:(i) and 1=1(ii) asp?id=60 and user=0 and '8'='8'.

The information leaks are evaluated according to the string of the syntax dictionary. When the system indicates that there is value in continuing digging, the type of database this website makes use of will be determined by means of the different functions defined by the database. For example, MS-SQL and MySQL use len( ) to calculate objective length, while Oracle does this according to length. Therefore, when using a len(“s”) = 1 for examination, normal feedback is obtained, which means the target website uses a MS-SOL or MySQL database; however, when this is not the case, the website may use Oracle. Additional functions defined by the database are also able to perform these evaluations. Once the database type has been established, the form fields of the database are analyzed, and finally, the figures and information of the database are obtained [43, 45, 46].

3.2.2. Hidden Page Exploring Function

There is some website information that is not easily detected or obtained by crawlers [49], such as paid journal articles saved in libraries or membership accounts of commercial websites, and this content is known as the Deep Web [50]. Some website designers believe that the website administration page not being obviously shown prevents easy browsing by users, and thus provides information security. However, the administration page may still be found by using specific filter methods. This system employs such methods to conduct hidden page exploring for examination and analysis of information. The first method is that of using syntax dictionary to explore the administration page according to the page naming rules that are used most, while the second one is exhaustive searching, using characters set up by users to perform permutation combinations.

Figure 9 shows the interface for the scanning of hidden pages. Area A is an addition to the interface for entering a web language, as there is an ever-increasing amount of web languages, such as HTML, ASP, PHP, CGI, and JSP, being used. In area B, when searching for hidden pages, the page name defined by the syntax dictionary is selected for scanning or exhaustive searching, Exhaustive searching examines the given characters and length one at a time; therefore, it takes more time, but has a wider coverage. The page names defined in the syntax dictionary can be added or deleted according to the naming rules that are used the most at any time.

Figure 9: Interface for hidden page scanning.

The category page for the National Taiwan University website is provided as an example in Figure 10. The administration category page link can be obtained using the hidden page exploring function, by scanning the built-in syntax dictionary. In this example, if the administration interface is not adequately protected, it can easily be attacked by malicious users.

Figure 10: Category page.

Many modern websites request an account name and password for authority control to be carried out. The proposed system contains a function aimed at the Deep Web that provides enterprises or persons with a feature for testing whether any password used is weak.

The URL provided in area A will be analyzed according to the variables and cookies related to input on the webpage. When incorrect account names and passwords are entered into area B, the webpage will show the corresponding string, which can be tested using the given ID/PWD dictionary. If a password in the database is automatically detected as being vulnerable to web crawlers logging on, we shall inform the personnel to change the password in order to protect personal information. Figure 11 shows the interface for detecting a weak password.

Figure 11: Interface for detecting a weak password.
3.2.3. Multidomain Searching on One IP Function

Multidomain searching on one IP function built into the web crawler system can be used to explore all the websites in a particular network segment. However, we must know which pages are under service and we must be able to avoid turning on more than two website services from certain servers or IPs; that is, when the TCP PORT is turned on it will not necessarily be in port 80. It can be seen in Figure 12 that there are 11 websites in this network segment in total, with their respective domain names being shown. There are three websites with the IP address 140.123.115.

Figure 12: Multidomain searching on one IP function.
3.2.4. Specific File Searching Function

In this study, we conduct a DFS on file types of which there are rich resources on the internet. If we wish to search for the file types of PDF, MS-Word, or MS-Excel, for example, we can use the specific file searching function to limit the scope. We are then able to conduct resources searching through the preferred need set-up in order to find the document files that are associated with the preferred conditions.

3.2.5. Search Engine Assistant Function

Modern search engines, such as Google, YAHOO, Bing, and Baidu, are extremely powerful and convenient. We are therefore able to test the government-related websites in Taiwan by means of keyword searching and this system’s dynamic scanning module. We do this by entering the keywords “inurl:php? XX events” in Google to find out XX events relating to recently published material on government-related websites in Taiwan. In this way, we are able to conduct scanning of a specific issue or topic. The question is how should we order the keywords in the Google search engine? We provide an example. We enter the words “Inurl:.php?|.asp?|.jsp?|.apsx?” into the Google search engine, because we wish to focus on dynamic-type pages for examination, such as PHP, ASP, JSP, or ASPX. In our experiment, we examined 800 samples of data from academic webpage databases of Taiwan; therefore, 200 data items for each type of page. Of the 800 data samples, 76 showed a high possibility of leaking occurring, with 31 being found in PHP; 26 in ASP; 12 in ASPX, and 7 in JSP. These figures are displayed in Figure 13.

Figure 13: Possibility of leaking in databases.

Using the information of the injection URL, we can apply the data syntax analysis function in our web crawler system, as well as the SQL injection technique, in order to obtain the database contents. Within the Taiwan academic network, 5% of websites still store the account names and passwords of their databases using plain text, as shown in Figure 14. Thus, users’ account names and passwords combined are likely to be obtained due to flaws in the design logic of the database.

Figure 14: Account names and passwords of a database, stored using plain text.
3.2.6. Website Vulnerability Updating Function

New leaks on the internet are researched by experts regularly. We use the loophole published in the Exploit Database [51] as an example and convert this latest loophole into the forms that are supported by our web crawler system. The forms we apply are shown in Algorithm 1. Note that we ignore the encryption algorithm section.

Algorithm 1

We are able to verify this loophole example by means of the instantaneous updating of the loophole database. We do not rely on the injection technique alone, as this is very similar to instantaneously updating virus codes.

4. Experiment and Result Analysis

In our experiment, we were able to infer the degree of importance that every country places on website security by investigating the level of security implemented in the portal websites. The experimental hardware used were Intel Core I5-2500 CPU, with 8 GB of RAM, using the Microsoft Windows 7 operating system. The experiment time was 24 hours for each county. The figures given in the experimental results were obtained by gathering the follow-up statistics.

4.1. Assessment of Government Portal Websites of 24 Countries or Regions

We selected 24 countries or regions to conduct experiments on using the online crawler mining system, by filtering the e-mail addresses and URLs that were leaked by SQL injections into the countries’ or regions’ government portal websites, as shown in Table 1.

Table 1: Testing results of 24 countries or regions.

Among these 24 countries or regions, the highest levels of protection in the portal websites were found to be those of Germany, Singapore, Italy, Finland, Japan, and India, as no e-mail addresses or URLs were obtained from the injections. The lowest degree of security was found in the government portal websites of New Zealand and the Philippines, with the number of leaks in these being 8972 and 2352, respectively, as shown in Figures 15 and 16. The largest number of URLs obtained from injections was in the government portal of PRC. Although Canada’s figure is the highest, these results were obtained from the same database, with only 5 to 10 websites being weak. Furthermore, the crawler mining system analyzed the URLs obtained from the injections, revealing the usernames and passwords stored inside the database, as displayed in Figure 17. When it is possible to dig or permeate the database, malicious users will drill deeply into the system in order to carry out serial malicious attacks.

Figure 15: Leaked e-mail addresses in portal website of New Zealand.
Figure 16: Leaked e-mail addresses in portal website of Philippines.
Figure 17: Content of the database obtained from URLs.
4.2. Comparison of Permanent Memberships of the United Nations Security Council

We analyzed the permanent membership of the United Nations Security Council in 24 countries or regions, as shown in Table 2. The most severe case of leaked e-mail addresses and URLs obtained was in PRC, followed by Russia, while France was found to have the best results. Since the United Nations Security Council is responsible for resolutions within the UN, any opinions raised among factions may affect the outcome of the resolution of an important issue. Therefore, without sufficient information security, hackers may obtain significant information through attacks, which could potentially lead to the manipulation of information, and therefore major problems, within the UN.

Table 2: Statistics of permanent membership of the United Nations Security Council.

5. Conclusion

Our experimental results indicate that the most severe leakage problems in government portal websites occur in PRC, with 121 injections, which means that there is a weakness in the website programming, making it relatively easy for many malicious hackers to obtain information. The lowest number of leaks was found in the government portal websites of India, Italy, and Finland, meaning that, in general, these sites are less likely to be attacked. Furthermore, the government portal websites of Germany, Singapore, and Japan could not even be tested or analyzed, which means that they are completely protected against any attacks by the online crawler mining system. It is thus clear that the portal websites of these countries or regions are developed with a much higher level of information security.

On December 21, 2011, a series of leakages of user information occurred in various famous websites in Mainland China, affecting 50 million online users, and was allegedly the largest known online information leakage incident. It is a known fact that no online information can be completely secure; however, research in this area has established four major aspects that should be taken into account in order to improve the protection of online information [2, 52], as follows. (1) Website contents that prohibit the research of reptile programs should be regulated. (2) During the programming of websites, it is necessary to filter the input values and limit the variable modes. (3) Unnecessary extensive processes for database management should be removed, such as xp_cmdshell and xp_regaddmultistring. Passwords stored in the database must be encoded, but not using plain text. (4) A good writing style of robot.txt and network management mechanisms should be implemented. In dealing with attacks, forged files and categories may be added into the robot.txt, programming annotation or error websites. Such mechanism may reveal the intention from attackers or malicious software, which is considered as a Honeypot approach.

SQL injection is not a new technique, and various methods for preventing leakage in databases have been extensively studied [53, 54]. However, over the past decade, this issue has become a major concern in the field of information security. The habits of front users and the concepts of backward development are the main reasons for this concern [11, 55]. We will continue to improve the functions of our system, from an online reptile angle, by comparing our research with that of related fields [47, 48, 5660], in order to develop a more powerful system.

With the increasing use of computers and the rapid development of the internet, society is experiencing fast-changing and different lifestyles. Information security has become a major concern as easily available online information continues to grow. Hence, measures must be taken for improving information security. Only under more secure conditions will we be able to fully enjoy the convenience of online information, which is necessary for living in the information age and being capable of facing greater challenges.


  1. B. Hoanga, “How good are our weapons in the spam wars?” IEEE Technology and Society Magazine, vol. 25, no. 1, pp. 22–30, 2006. View at Publisher · View at Google Scholar · View at Scopus
  2. T. Feng, “The security mechanism of network database,” in Proceedings of the 3rd International Conference on Measuring Technology and Mechatronics Automation (ICMTMA '11), pp. 939–940, January 2011. View at Publisher · View at Google Scholar · View at Scopus
  3. D. Geer, “Malicious bots threaten network security,” Computer, vol. 38, no. 1, pp. 18–20, 2005. View at Publisher · View at Google Scholar · View at Scopus
  4. P. O. Boykin and V. P. Roychowdhury, “Leveraging social networks to fight spam,” Computer, vol. 38, no. 4, pp. 61–68, 2005. View at Publisher · View at Google Scholar · View at Scopus
  5. C. Castillo, “Effective web crawling,” in Computer Science, The University of Chile in fulfillment: ACM SIGIR Forum, 2004. View at Google Scholar
  6. W. Tong and X. Xie, “A research on a defending policy against the Webcrawler's attack,” in Proceedings of the 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication (ASID '09), August 2009. View at Publisher · View at Google Scholar · View at Scopus
  7. Y. Sun, I. G. Councill, and C. L. Giles, “The ethicality of web crawlers,” in Proceedings of the IEEE/WIC/ACM International Conference on Web Intelligence (WI '10), pp. 668–675, September 2010. View at Publisher · View at Google Scholar · View at Scopus
  8. M. MeiJunjin, “An approach for SQL injection vulnerability detection,” in Proceedings of the 6th International Conference on Information Technology: New Generations (ITNG '09), pp. 1411–1414, April 2009. View at Publisher · View at Google Scholar · View at Scopus
  9. G. Jawaheer and P. Kostkova, “Web crawlers on a health related portal: detection, characterisation and implications,” in Proceedings of the 4th International Conference on Developments in eSystems Engineering (DeSE '11), pp. 24–29, December 2011. View at Publisher · View at Google Scholar · View at Scopus
  10. P. Heymann, G. Koutrika, and H. Garcia-Molina, “Fighting spam on social web sites: a survey of approaches and future challenges,” IEEE Internet Computing, vol. 11, no. 6, pp. 36–45, 2007. View at Publisher · View at Google Scholar · View at Scopus
  11. L. Shar and H. Tan, “Defeating SQL injection,” Computer, no. 99, p. 1, 2012. View at Google Scholar
  12. J. Bau, E. Bursztein, D. Gupta, and J. Mitchell, “State of the art: automated black-box web application vulnerability testing,” in Proceedings of the 31st IEEE Symposium on Security and Privacy (SP '10), pp. 332–345, May 2010. View at Publisher · View at Google Scholar · View at Scopus
  13. N. Khoury, P. Zavarsky, D. Lindskog, and R. Ruhl, “An analysis of black-box web application security scanners against stored SQL injection,” in Proceedings of the IEEE International Conference on Privacy, Security, Risk and Trust, and IEEE International Conference on Social Computing (SocialCom '11), pp. 1095–1101, October 2011. View at Publisher · View at Google Scholar · View at Scopus
  14. J. Bau, E. Bursztein, D. Gupta, and J. Mitchell, “State of the art: automated black-box web application vulnerability testing,” in Proceedings of the 31st IEEE Symposium on Security and Privacy (SP '10), pp. 332–345, May 2010. View at Publisher · View at Google Scholar · View at Scopus
  15. J. Cho, H. Garcia-Molina, and L. Page, “Efficient crawling through URL ordering,” in Proceedings of the 7th International WWW Conference, pp. 161–172, 1998.
  16. A. Z. Broder, M. Najork, and J. L. Wiener, “Efficient URL caching for world wide web crawling,” in Proceedings of the 12th International WWW Conference, 2003.
  17. V. Shkapenyuk and T. Suel, “Design and implementation of a high-performance distributed web crawler,” in Proceedings of the 18th International Conference on Data Engineering, pp. 357–368, March 2002. View at Scopus
  18. M. Najork, “Breadth-first search crawling yields high-quality pages,” in Proceedings of the 10th International World Wide Web Conference, 2001.
  19. J. B. Anderson and S. Mohan, “Sequential coding algorithms: a survey and cost analysis,” IEEE Transactions on Communications, vol. 32, no. 2, pp. 169–176, 1984. View at Google Scholar · View at Scopus
  20. L. Zhao, H. Xu, J. Li, and Q. Cai, “A kind of map coloring algorithm considering of depth first search,” in International Conference on Industrial Control and Electronics Engineering (ICICEE '12), pp. 648–651, 2012. View at Publisher · View at Google Scholar
  21. R. Baeza-Yates, C. Castillo, M. Marin, and A. Rodriguez, “Crawling a country: better strategies than breadth-first for web page ordering,” in Proceedings of the 14th International World Wide Web Conference (WWW '05), pp. 864–872, May 2005. View at Publisher · View at Google Scholar · View at Scopus
  22. C. F. Diligentim and L. S. Focused, “Crawling using context graphs,” in Proceedings of the 26th International Conference on Very Large Data Bases, 2000.
  23. J. Qin, Y. Zhou, and M. Chau, “Building domain-specific web collections for scientific digital libraries: a meta-search enhanced focused crawling method,” in Proceedings of the 4th ACM/IEEE Joint Conference on Digital Libraries; Global reach and Diverse Impact (JCDL '04), pp. 135–141, June 2004. View at Scopus
  24. J. Rennie and A. K. McCallum, “Using reinforcement learning to spider the web efficiently,” in Proceedings of the 16th International Conference on Machine Learning, 1999.
  25. S. Chakrabarti, M. Berg, and B. Dom, “Focused crawling: a new approach to topic-specific web resource discovery,” in Proceedings of the 8th International WWW Conference, 1999.
  26. S. Chakrabarti, D. A. Gibson, and K. S. McCurley, “Surfing the web backwards,” Computer Networks, vol. 31, no. 11, pp. 1679–1693, 1999. View at Publisher · View at Google Scholar · View at Scopus
  27. G. J. Houben, Y. Kornatzky, and R. Post, “Information retrieval in distributed hypertexts,” in Proceedings of the 4th RIAO Conference, 1994.
  28. M. Jacovi, “The shark-search algorithm. An application: tailored web site mapping,” Computer Networks, vol. 30, no. 1–7, pp. 317–326, 1998. View at Google Scholar · View at Scopus
  29. S. B. L. Page, “The anatomy of a large-scale hypertextual web search engine,” in Proceedings of the 7th International WWW Conference, 1998.
  30. P. Lawrence, S. Brin, R. Motwani, and T. Winograd, “The PageRank citation ranking: bringing order to the Web,” in Proceedings of the 7th International WWW Conference, 1999.
  31. T. H. Haveliwala, “Topic-sensitive PageRank,” in Proceedings of the 11th International Conference on World Wide Web (WWW '02), pp. 517–526, May 2002. View at Publisher · View at Google Scholar · View at Scopus
  32. Y. Ding, F. Scharffe, A. Harth, and A. Hogan, “AuthorRank: ranking improvement for the web,” in Proceedings of the International Conference on Semantic Web and Web Services, 2006.
  33. J. M. Kleinberg, “Authoritative sources in a hyperlinked environment,” Journal of the ACM, vol. 46, no. 5, pp. 604–632, 1999. View at Google Scholar · View at Scopus
  34. W. Xing and A. Ghorbani, “Weighted PageRank algorithm,” in Proceedings of the 2nd Annual Conference on Communication Networks and Services Research, pp. 305–314, May 2004. View at Scopus
  35. Y. Zhang, C. Yin, and F. Yuan, “An application of improved PageRank in focused crawler,” in Proceedings of the 4th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD '07), pp. 331–335, August 2007. View at Publisher · View at Google Scholar · View at Scopus
  36. S. Chakrabarti, B. Dom, P. Raghavan, S. Rajagopalan, D. Gibson, and J. Kleinberg, “Automatic resource compilation by analyzing hyperlink structure and associated text,” in Proceedings of the 7th International WWW Conference, pp. 65–74, 1998. View at Publisher · View at Google Scholar
  37. P. Gawrysiak, “Using data mining methodology for text retrieval,” in Proceedings of the International Information Science and Education Conference, 1999.
  38. IBM, “Clever System (HITS)—a page ranking algorithm developed,” 2004,
  39. G. Pant and P. Srinivasan, “Link contexts in classifier-guided topical crawlers,” IEEE Transactions on Knowledge and Data Engineering, vol. 18, no. 1, pp. 107–122, 2006. View at Publisher · View at Google Scholar · View at Scopus
  40. F. Menczer and R. K. Belew, “Adaptive retrieval agents: internalizing local context and scaling up to the Web,” Machine Learning, vol. 39, no. 2, pp. 203–242, 2000. View at Google Scholar · View at Scopus
  41. J. Johnson, K. Tsioutsiouliklis, and C. Lee Giles, “Evolving strategies for focused web crawling,” in Proceedings of the 20th International Conference on Machine Learning, pp. 298–305, August 2003. View at Scopus
  42. Y. Chun and Z. Hang, “Research on tunnel phenomenon in focused crawler,” in Proceedings of the International Conference on Internet Technology and Applications (ITAP '10), August 2010. View at Publisher · View at Google Scholar · View at Scopus
  43. C. Anley, More Advanced SQL Injection, An NGSSoftware Insight Security Research (NISR) Publication, 2002.
  44. Y. J. Yang and Y. X. Yu, “Behavioral science-based information security research,” in Proceedings of the 1st International Workshop on Education Technology and Computer Science (ETCS '09), pp. 428–432, March 2009. View at Publisher · View at Google Scholar · View at Scopus
  45. C. Anley, Advanced SQL injection in SQL Server Applications, An NGSSoftware Insight Security Research (NISR) Publication, 2002.
  46. V. Chapela, Advanced SQL Injection, 2005.
  47. D. A. Kindy and A.-S. K. Pathan, “A survey on SQL injection: vulnerabilities, attacks, and prevention techniques,” in Proceedings of the 15th IEEE International Symposium on Consumer Electronics (ISCE '11), pp. 468–471, June 2011. View at Publisher · View at Google Scholar · View at Scopus
  48. R. Johari and P. Sharma, “A survey on web application vulnerabilities (SQLIA, XSS) exploitation and security engine for SQL injection,” in Proceedings of the International Conference on Communication Systems and Network Technologies (CSNT '12), 2012.
  49. S. Bondar, “Search engine indexing limits: where do the bots stop,” 2006,
  50. B. He, M. Patel, Z. Zhang, and K. C.-C. Chang, “Accessing the deep Web,” Communications of the ACM, vol. 50, no. 5, pp. 94–101, 2007. View at Publisher · View at Google Scholar · View at Scopus
  51. O. Security, “The Exploit Database,” 2012,
  52. S. Imran and I. Hyder, “Security issues in databases,” in Proceedings of the 2nd International Conference on Future Information Technology and Management Engineering (FITME '09), pp. 541–545, December 2009. View at Publisher · View at Google Scholar · View at Scopus
  53. S. W. Boyd and A. D. Keromytis, “SQLrand: preventing SQL injection attacks,” in Proceedings of the 2nd Conference on Applied Cryptography and Network Security, pp. 292–302, 2004. View at Publisher · View at Google Scholar
  54. Y.-W. Huang, F. Yu, C. Hang, C.-H. Tsai, D. T. Lee, and S.-Y. Kuo, “Securing web application code by static analysis and runtime protection,” in Proceedings of the 13th International World Wide Web Conference Proceedings (WWW '04), pp. 40–52, May 2004. View at Scopus
  55. R. Overstreet, Protecting Yourself from SQL Injection Attacks, 2006.
  56. M. Ficco, L. Coppolino, and L. Romano, “A weight-based symptom correlation approach to SQL injection attacks,” in Proceedings of the 4th Latin-American Symposium on Dependable Computing (LADC '09), pp. 9–16, September 2009. View at Publisher · View at Google Scholar · View at Scopus
  57. A. Mohosina and M. Zulkernine, “DESERVE: a framework for detecting program security vulnerability exploitations,” in Proceedings of the 6th IEEE International Conference on Software Security and Reliability (SERE '12), 2012.
  58. C. Mainka, J. Somorovsky, and J. Schwenk, “Penetration testing tool for web services security,” in Proceedings of the 8th IEEE World Congress on Services (SERVICES '12), 2012.
  59. R. Xu, J. Guo, and L. Deng, “A database security gateway to the detection of SQL attacks,” in Proceedings of the 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE '10), pp. 3537–3540, August 2010. View at Publisher · View at Google Scholar · View at Scopus
  60. G. Agosta, A. Barenghi, A. Parata, and G. Pelosi, “Automated security analysis of dynamic web applications through symbolic code execution,” in Proceedings of the 9th International Conference on Information Technology: New Generations (ITNG '12), pp. 189–194, 2012. View at Publisher · View at Google Scholar