A Fuzzy Classifier-Based Penetration Testing for Web Applications

被引:10
作者
Alhassan, J. K. [1 ]
Misra, Sanjay [2 ]
Umar, A. [1 ]
Maskeliunas, Rytis [3 ]
Damasevicius, Robertas [3 ]
Adewumi, Adewole [2 ]
机构
[1] Fed Univ Technol, Minna, Nigeria
[2] Covenant Univ, Ota, Nigeria
[3] Kaunas Univ Technol, Kaunas, Lithuania
来源
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY & SYSTEMS (ICITS 2018) | 2018年 / 721卷
关键词
Vulnerabilities assessment; Penetration testing; Fuzzy classifier-based; Web applications;
D O I
10.1007/978-3-319-73450-7_10
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The biggest challenge of Web application is the inestimable losses arising from security flaws. Two approaches were advanced by a number of scholars to provide security to Web space. One of such approach is vulnerability assessment, which is a conscious effort to isolate, identify and recognize potentials vulnerabilities exploited by attackers. The second being the estimation and determination of level of risks/threats posed to Web applications by vulnerabilities obvious to the developer (or tester); this is generally referred to as penetration testing. Recently, there is Vulnerability Assessment and Penetration Testing (VAPT) that combined these two schemes to improve safety and effectively combat the menace of attackers on Web applications. This paper proposed Fuzzy Classifier-based Vulnerability and Assessment Testing (FCVAPT) model to provide security for sensitive data/information in Web applications. Cross Site Scripting (XSS) and Structured Query Language (SQL) injections were selected for evaluation of proposed FCVAPT model. FCVAPT model's classification performance for MSE, MAPE and RMSE were 33.33, 14.81% and 5.77% respectively. FCVAPT is considerably effective for detecting vulnerability and ascertaining the nature of threats/risks available to Web applications.
引用
收藏
页码:95 / 104
页数:10
相关论文
共 12 条
  • [1] Aghariya T, 2015, THESIS, P1
  • [2] Doshi J., 2015, INT J APPL INF SYST, V8, P51
  • [3] Doupe A. L, 2014, THESIS, P1
  • [4] Jan-Min Chen, 2010, 2010 International Computer Symposium (ICS 2010), P113, DOI 10.1109/COMPSYM.2010.5685537
  • [5] Jovanovic N., 2006, PLAS 2006. Proceedings of the 2006 Programming Languages and Analysis for Security Workshop, P27, DOI 10.1145/1134744.1134751
  • [6] Li XW, 2011, 27TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2011), P247
  • [7] McAllister S, 2008, LECT NOTES COMPUT SC, V5230, P191, DOI 10.1007/978-3-540-87403-4_11
  • [8] Petukhov A, 2008, DETECTING SECURITY V, P1
  • [9] Ruse M. E, 2013, THESIS, P1
  • [10] Security Testing Methodology for Vulnerabilities Detection of XSS in Web Services and WS-Security
    Salas, M. I. P.
    Martins, E.
    [J]. ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2014, 302 : 133 - 154