Research Article
BibTex RIS Cite

Year 2026, Volume: 8 Issue: 2, 53 - 69, 15.01.2026
https://doi.org/10.53508/ijiam.1602248

Abstract

References

  • Ansari, J. A. (2015). Web penetration testing with Kali Linux. Packt Publishing.
  • Barrett, M. (2018). Framework for improving critical infrastructure cybersecurity (Technical Report). National Institute of Standards and Technology (NIST), Gaithersburg, MD, United States.
  • Fung, B. (2024, July 24). We finally know what caused the global tech outage – and how much it cost. CNN. https://edition.cnn.com/2024/07/24/tech/crowdstrike-outage-cost-cause/index.html
  • Handoyo, S. (2024). Purchasing in the digital age: A meta-analytical perspective on trust, risk, security, and e-WOM in e-commerce. Heliyon, 10(8). https://doi.org/10.1016/j.heliyon.2024.e29714
  • Hejase, H. J., Fayyad-Kazan, H. F., Moukadem, I. J. J., & Research, E. E. (2020). Advanced persistent threats (APT): An awareness review. Journal of Engineering and Economic Research, 21(6), 1–8.
  • Kamalesh, D. (2024, January 17). Rapid Scan — Empowering cybersecurity with advanced scanning. Medium. https://kkamalesh117.medium.com/rapid-scan-empowering-cybersecurity-with-advanced-scanning-e6435ecc497f
  • Murthy, P. S., & Nagalakshmi, V. (2020). Database forensics and security measures to defend from cyber threats. In Proceedings of the 3rd International Conference on Intelligent Sustainable Systems (ICISS) (pp. 1302–1307). IEEE. https://doi.org/10.1109/ICISS49785.2020.9316042
  • Mutune, G. (2024). 27 top cybersecurity tools for 2024. Cyber Experts. https://cyberexperts.com/cybersecurity-tools/
  • Salem, A. H., Azzam, S. M., Emam, O. E., et al. (2024). Advancing cybersecurity: A comprehensive review of AI-driven detection techniques. Journal of Big Data, 11, Article 105, 1–38. https://doi.org/10.1186/s40537-024-00957-y
  • Sandeep, J. (2021, June 30). RapidScan – The multi-tool web vulnerability scanner in Kali Linux. GeeksforGeeks. https://www.geeksforgeeks.org/rapidscan-the-multi-tool-web-vulnerability-scanner-in-kali-linux/
  • van der Ham, J. V. D. (2021). Toward a better understanding of cybersecurity. Digital Threats: Research and Practice, 2(3), Article 18. https://doi.org/10.1145/3442445

BoostSecurityDB: a new vulnerability scanning tool for online SQL databases

Year 2026, Volume: 8 Issue: 2, 53 - 69, 15.01.2026
https://doi.org/10.53508/ijiam.1602248

Abstract

The rapid growth of digital information has exposed critical systems—including military, governmental, financial, and healthcare infrastructures—to escalating cyber threats, particularly database breaches. To address this challenge, we propose BoostSecurityDB, an integrated cybersecurity tool designed to detect and mitigate vulnerabilities that compromise database security. Our contribution is to integrate automated scanning technologies such as SQLMap and RapidScan into a unified process. Experimental evaluations demonstrate the effectiveness of BoostSecurityDB in identifying high-risk vulnerabilities, streamlined remediation workflows, and reducing manual analysis overhead. The results highlight its potential as a scalable solution for safeguarding sensitive data against evolving cyberattacks.

References

  • Ansari, J. A. (2015). Web penetration testing with Kali Linux. Packt Publishing.
  • Barrett, M. (2018). Framework for improving critical infrastructure cybersecurity (Technical Report). National Institute of Standards and Technology (NIST), Gaithersburg, MD, United States.
  • Fung, B. (2024, July 24). We finally know what caused the global tech outage – and how much it cost. CNN. https://edition.cnn.com/2024/07/24/tech/crowdstrike-outage-cost-cause/index.html
  • Handoyo, S. (2024). Purchasing in the digital age: A meta-analytical perspective on trust, risk, security, and e-WOM in e-commerce. Heliyon, 10(8). https://doi.org/10.1016/j.heliyon.2024.e29714
  • Hejase, H. J., Fayyad-Kazan, H. F., Moukadem, I. J. J., & Research, E. E. (2020). Advanced persistent threats (APT): An awareness review. Journal of Engineering and Economic Research, 21(6), 1–8.
  • Kamalesh, D. (2024, January 17). Rapid Scan — Empowering cybersecurity with advanced scanning. Medium. https://kkamalesh117.medium.com/rapid-scan-empowering-cybersecurity-with-advanced-scanning-e6435ecc497f
  • Murthy, P. S., & Nagalakshmi, V. (2020). Database forensics and security measures to defend from cyber threats. In Proceedings of the 3rd International Conference on Intelligent Sustainable Systems (ICISS) (pp. 1302–1307). IEEE. https://doi.org/10.1109/ICISS49785.2020.9316042
  • Mutune, G. (2024). 27 top cybersecurity tools for 2024. Cyber Experts. https://cyberexperts.com/cybersecurity-tools/
  • Salem, A. H., Azzam, S. M., Emam, O. E., et al. (2024). Advancing cybersecurity: A comprehensive review of AI-driven detection techniques. Journal of Big Data, 11, Article 105, 1–38. https://doi.org/10.1186/s40537-024-00957-y
  • Sandeep, J. (2021, June 30). RapidScan – The multi-tool web vulnerability scanner in Kali Linux. GeeksforGeeks. https://www.geeksforgeeks.org/rapidscan-the-multi-tool-web-vulnerability-scanner-in-kali-linux/
  • van der Ham, J. V. D. (2021). Toward a better understanding of cybersecurity. Digital Threats: Research and Practice, 2(3), Article 18. https://doi.org/10.1145/3442445
There are 11 citations in total.

Details

Primary Language English
Subjects Artificial Intelligence (Other)
Journal Section Research Article
Authors

Mohamed Elkamel Hamdane

Nabil Messaoudi 0000-0002-4245-4225

Marwa Daoud

Saad Harous 0000-0001-6524-7352

Submission Date February 26, 2025
Acceptance Date June 22, 2025
Publication Date January 15, 2026
Published in Issue Year 2026 Volume: 8 Issue: 2

Cite

APA Hamdane, M. E., Messaoudi, N., Daoud, M., Harous, S. (2026). BoostSecurityDB: a new vulnerability scanning tool for online SQL databases. International Journal of Informatics and Applied Mathematics, 8(2), 53-69. https://doi.org/10.53508/ijiam.1602248
AMA Hamdane ME, Messaoudi N, Daoud M, Harous S. BoostSecurityDB: a new vulnerability scanning tool for online SQL databases. IJIAM. January 2026;8(2):53-69. doi:10.53508/ijiam.1602248
Chicago Hamdane, Mohamed Elkamel, Nabil Messaoudi, Marwa Daoud, and Saad Harous. “BoostSecurityDB: A New Vulnerability Scanning Tool for Online SQL Databases”. International Journal of Informatics and Applied Mathematics 8, no. 2 (January 2026): 53-69. https://doi.org/10.53508/ijiam.1602248.
EndNote Hamdane ME, Messaoudi N, Daoud M, Harous S (January 1, 2026) BoostSecurityDB: a new vulnerability scanning tool for online SQL databases. International Journal of Informatics and Applied Mathematics 8 2 53–69.
IEEE M. E. Hamdane, N. Messaoudi, M. Daoud, and S. Harous, “BoostSecurityDB: a new vulnerability scanning tool for online SQL databases”, IJIAM, vol. 8, no. 2, pp. 53–69, 2026, doi: 10.53508/ijiam.1602248.
ISNAD Hamdane, Mohamed Elkamel et al. “BoostSecurityDB: A New Vulnerability Scanning Tool for Online SQL Databases”. International Journal of Informatics and Applied Mathematics 8/2 (January2026), 53-69. https://doi.org/10.53508/ijiam.1602248.
JAMA Hamdane ME, Messaoudi N, Daoud M, Harous S. BoostSecurityDB: a new vulnerability scanning tool for online SQL databases. IJIAM. 2026;8:53–69.
MLA Hamdane, Mohamed Elkamel et al. “BoostSecurityDB: A New Vulnerability Scanning Tool for Online SQL Databases”. International Journal of Informatics and Applied Mathematics, vol. 8, no. 2, 2026, pp. 53-69, doi:10.53508/ijiam.1602248.
Vancouver Hamdane ME, Messaoudi N, Daoud M, Harous S. BoostSecurityDB: a new vulnerability scanning tool for online SQL databases. IJIAM. 2026;8(2):53-69.

International Journal of Informatics and Applied Mathematics