Framework For The Detection And Mitigation Of Web Vulnerabilities Using Deep Learning
| International Journal of Electronics and Communication Engineering |
| © 2025 by SSRG - IJECE Journal |
| Volume 12 Issue 12 |
| Year of Publication : 2025 |
| Authors : Godwin Ponsam J, Chin Shiuh Shieh, V Senthil Murugan |
How to Cite?
Godwin Ponsam J, Chin Shiuh Shieh, V Senthil Murugan, "Framework For The Detection And Mitigation Of Web Vulnerabilities Using Deep Learning," SSRG International Journal of Electronics and Communication Engineering, vol. 12, no. 12, pp. 164-176, 2025. Crossref, https://doi.org/10.14445/23488549/IJECE-V12I12P114
Abstract:
Web vulnerability faces significant challenges, including data breaches, privacy violations, and financial losses. Comparing it with traditional conventional methods, it proves inadequate for identifying attack patterns and complex semantic structures in the temporal evolution of web page changes. This study primarily focuses on the IBERT-GRU model. To improve the detection and resolution of web vulnerabilities, the Integrated Bidirectional Encoder Representations from Transformers with Gated Recurrent Unit (IBERT-GRU) is enfolded. The IBERT model should incorporate the intricate semantic relationships and contextual information derived from diverse internet sources, including source code, network requests, and system logs. This method is considered an effective method for detecting patterns and revealing the weaknesses of the sequences. The proposed methodology is found to be more accurate (99.9%) and has a higher recall (97.2%) than benchmarked algorithms. The proposed method, in addition, has a better F1 score of 99.85%. The performance parameters indicate that the proposed IBERT-GRU architecture is a strong and scalable technique to keep track of vulnerabilities in real time in complicated online systems.
Keywords:
Web Vulnerability Detection, Deep Learning, IBERT-GRU, Transformer Models, Gated Recurrent Unit (GRU), Cybersecurity, Semantic Analysis.
References:
[1] Subhadeep Chell et al., “Real-Time Threat Detection and Mitigation in Web API Development,” 2024 International Conference on Electrical Electronics and Computing Technologies (ICEECT), Greater Noida, India, pp. 1-9, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Qui Cao et al., “BERT-Enhanced DGA Botnet Detection: A Comparative Analysis of Machine Learning and Deep Learning Models,” 2024 13th International Conference on Control, Automation and Information Sciences (ICCAIS), Ho Chi Minh City, Vietnam, pp. 1-6, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Shalini Verma, and Harish Kapoor, “Machine Learning for Predictive Maintenance: A Cloud Computing Architecture and Lessons for a Healthcare Context,” International Academic Journal of Science and Engineering, vol. 8, no. 2, pp. 1-5, 2021.
[Publisher Link]
[4] Rania Zaimi et al., “An Enhanced Mechanism for Malicious URL Detection using Deep Learning and DistilBERT-based Feature Extraction,” The Journal of Supercomputing, vol. 81, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Sofonias Yitagesu et al., “Systematic Literature Review on Software Security Vulnerability Information Extraction,” ACM Transactions on Software Engineering and Methodology, pp. 1-51, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Ihsan Ullah et al., “Unveiling the Power of Deep Learning: A Comparative Study of LSTM, BERT, and GRU for Disaster Tweet Classification,” IEIE Transactions on Smart Processing & Computing, vol. 12, no. 6, pp. 526-534, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Abba Suganda Girsang, and Stanley, “Hybrid LSTM and GRU for Cryptocurrency Price Forecasting Based on Social Network Sentiment Analysis Using FinBERT,” IEEE Access, vol. 11, pp. 120530-120540, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Sarbast H. Ali et al., “Web Vulnerabilities Detection Using a Hybrid Model of CNN, GRU and Attention Mechanism,” Science Journal of University of Zakho, vol. 13, no. 1, pp. 58-64, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Vahid Babaey, and Hamid Reza Faragardi, “Detecting Zero-Day Web Attacks with an Ensemble of LSTM, GRU, and Stacked Autoencoders,” Computers, vol. 14, no. 6, pp. 1-29, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Yunus Emre Seyyar, Ali Gökhan Yavuz, and Halil Murat Ünver, “An Attack Detection Framework based on BERT and Deep Learning,” IEEE Access, vol. 10, pp. 68633-68644, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Abdu Salam et al., “Deep Learning Techniques for Web-Based Attack Detection in Industry 5.0: A Novel Approach,” Technologies, vol. 11, no. 4, pp. 1-18, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Prabhuta Chaudhary, Ayush Verma, and Manju Khari, Harnessing Language Models and Machine Learning for Rancorous URL Classification, 1st ed., Cybersecurity and Data Science Innovations for Sustainable Development of HEICC, pp. 273-288, 2025.
[Google Scholar] [Publisher Link]
[13] Sidwendluian Romaric Nana et al., “Deep Learning and Web Applications Vulnerabilities Detection: An Approach based on Large Language Models,” International Journal of Advanced Computer Science & Applications, vol. 15, no. 7, pp. 1-9, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Refat Othman, Bruno Rossi, and Barbara Russo, “A Comparison of Vulnerability Feature Extraction Methods from Textual Attack Patterns,” 2024 50th Euromicro Conference on Software Engineering and Advanced Applications (SEAA), Paris, France, pp. 419-422, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Ioana Branescu, Octavian Grigorescu, and Mihai Dascalu, “Automated Mapping of Common Vulnerabilities and Exposures to MITRE ATT&CK Tactics,” Information, vol. 15, no. 4, pp. 1-19, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Jianing Liu et al., “Enhancing Vulnerability Detection Efficiency: An Exploration of Light-Weight LLMs with Hybrid Code Features,” Journal of Information Security and Applications, vol. 88, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Jaydeep R. Tadhani et al., “Securing Web Applications against XSS and SQLi Attacks using a Novel Deep Learning Approach,” Scientific Reports, vol. 14, pp. 1-17, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Remzi Gürfidan, “VULREM: Fine-Tuned BERT-Based Source-Code Potential Vulnerability Scanning System to Mitigate Attacks in Web Applications,” Applied Sciences, vol. 14, no. 21, pp. 1-14, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Soolin Kim et al., “Vuldebert: A Vulnerability Detection System using Bert,” 2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), Charlotte, NC, USA, pp. 69-74, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Mudassor Ahmed Chowdhury, Mushfiqur Rahman, and Sifatnur Rahman, “Detecting Vulnerabilities in Website using Multiscale Approaches: Based on Case Study,” International Journal of Electrical & Computer Engineering, vol. 14, no. 3, pp. 2814-2821, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Sachin Kumar Sharma et al., Web Security Vulnerabilities: Identification, Exploitation, and Mitigation, 1st ed., Cybersecurity CRC Press, pp. 183-218, 2021.
[Google Scholar] [Publisher Link]
[22] Serena Elisa Ponta, Henrik Plate, and Antonino Sabetta, “Detection, Assessment and Mitigation of Vulnerabilities in Open Source Dependencies,” Empirical Software Engineering, vol. 25, pp. 3175-3215, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Cho Xuan Do, Nguyen Trong Luu, and Phuong Thi Lan Nguyen, “Optimizing Software Vulnerability Detection using RoBERTa and Machine Learning,” Automated Software Engineering, vol. 31, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Jiancong Li et al., “Web Application Attack Detection Based on Attention and Gated Convolution Networks,” IEEE Access, vol. 8, pp. 20717-20724, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[25] Hieu Mac et al., “Detecting Attacks on Web Applications Using Autoencoder,” Proceedings of the 9th International Symposium on Information and Communication Technology, Danang City Viet Nam, pp. 416-421, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[26] Vijaya Arjunan et al., “Deciphering Ancient Tamil Epigraphy: A Deep Learning Approach for Vatteluttu Script Recognition,” Journal of Internet Services and Information Security, vol. 15, no. 1, pp. 451-467, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[27] Lu Yu, Senlin Luo, and Limin Pan, “Detecting SQL Injection Attacks based on Text Analysis,” 3rd International Conference on Computer Engineering, Information Science & Application Technology, pp. 95-101, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[28] Geetha Krishna Venkatesh Maroju, and Sai Nandu Posina, “Comparative Analysis of LSTM, GRU, and BERT Models for Fake News Detection,” Bachelor Thesis, Blekinge Institute of Technology, pp. 1-72, 2025.
[Google Scholar] [Publisher Link]
[29] S. Poornimadarshini et al., “Bibliometric Analysis of IJISS Journal based on Citation and Publication Relevant Metrics,” Indian Journal of Information Sources and Services, vol. 14, no. 4, pp. 153-158, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[30] Ouissem Ben Fredj et al., “An OWASP Top Ten Driven Survey on Web Application Protection Methods,” Risks and Security of Internet and Systems: 15th International Conference, CRiSIS 2020, Paris, France, pp. 235-252, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[31] Maysoon Khazaal Abbas Maaroof, and Med Salim Bouhlel, “Drone Image Localization by Faster R-CNN Algorithm and Detection Accuracy,” Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, vol. 16, no. 1, pp. 172-189, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[32] Rokia Lamrani Alaoui, and El Habib Nfaoui, “Deep Learning for Vulnerability and Attack Detection on Web Applications: A Systematic Literature Review,” Future Internet, vol. 14, no. 4, pp. 1-46, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[33] Guanjun Lin et al., “Software Vulnerability Detection using Deep Neural Networks: A Survey,” Proceedings of the IEEE, vol. 108, no. 10, pp. 1825-1848, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[34] Saif ur Rehman et al., “DIDDOS: An Approach for Detection and Identification of Distributed Denial of Service (DDoS) Cyberattacks using Gated Recurrent Units (GRU),” Future Generation Computer Systems, vol. 118, pp. 453-466, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[35] Muhammad Noman, Muhammad Iqbal, and Amir Manzoor, “A Survey on Detection and Prevention of Web Vulnerabilities,” International Journal of Advanced Computer Science and Applications, vol. 11, no. 6, pp. 1-20, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[36] A.M.B. Mohamad et al., “Impact of using Website on Online Learning Behavior,” International Academic Journal of Social Sciences, vol. 5, no. 2, pp. 76-90. 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[37] Nicolás Montes et al., “Web Application Attacks Detection using Deep Learning,” Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, pp. 227-236, 2022.
[CrossRef] [Google Scholar] [Publisher Link]

10.14445/23488549/IJECE-V12I12P114