“…Detecting and preventing tampering attacks, there are three approach, static, dynamic, and hybrid analysis (Menemencioğlu & Orak, 2017). Static approach is based absence of integrity constraint enforcement (Zhang et al, 2011), dynamic approach is processed during execution time by checking web server responses without needing modification of application codes (Menemencioğlu & Orak, 2017).…”