Web Application Security Vulnerabilities Detection Approaches: a Systematic Mapping Study

被引:0
|
作者
Rafique, Sajjad [1 ]
Humayun, Mamoona [1 ]
Hamid, Bushra [1 ]
Abbas, Ansar [1 ]
Akhtar, Muhammad [1 ]
Iqbal, Kamil [1 ]
机构
[1] PMAS Arid Agr Univ, Univ Inst Informat Technol, Dept Comp Sci, Rawalpindi, Pakistan
来源
2015 16TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD) | 2015年
关键词
Systematic mapping study; web application; security; vulnerability; State-of-the-art; SITE SCRIPTING VULNERABILITIES; ATTACKS; SERVICE;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Number of security vulnerabilities in web application has grown with the tremendous growth of web application in last two decades. As the domain of Web Applications is maturing, large number of empirical studies has been reported in web applications to address the solution of vulnerable web application. However, before advancing towards finding new approaches of web applications security vulnerability detection, there is a need to analyze and synthesize existing evidence based studies in web applications area. To do this, we have planned to conduct a systematic mapping study to view and report the state-of-the-art of empirical work in existing research of web applications. In this paper, we aimed at providing a description of mapping study for synthesizing the reported empirical research in the area of web applications security vulnerabilities detection approaches. The proposed solutions are mapped against: (1) the software development stages for which the solution has been proposed and (2) the web application vulnerabilities mapping according to OWASP Top 10 security vulnerabilities. To do this, existing literature has been surveyed using a systematic mapping study by phrasing two research questions. In the mapping study, a total of 41 studies dating from 1994 to 2014 were evaluated and mapped against the aforementioned categories. The outcome of this mapping study is current state-of-the-art of empirical research in web application area, strength and weaknesses of existing empirical work, best practices and possible directions for future research.
引用
收藏
页码:469 / 474
页数:6
相关论文
共 50 条
  • [21] Security patterns: A systematic mapping study
    Jafari, Abbas Javan
    Rasoolzadegan, Abbas
    JOURNAL OF COMPUTER LANGUAGES, 2020, 56
  • [22] Web Augmentation: A systematic mapping study
    Aldalur, Inigo
    SCIENCE OF COMPUTER PROGRAMMING, 2024, 232
  • [23] Using Web Security Scanners to Detect Vulnerabilities in Web Services
    Vieira, Marco
    Antunes, Nuno
    Madeira, Henrique
    2009 IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS & NETWORKS (DSN 2009), 2009, : 566 - 571
  • [24] European digital libraries: web security vulnerabilities
    Kuzma, Joanne
    LIBRARY HI TECH, 2010, 28 (03) : 402 - 413
  • [25] A Systematic Mapping Study in Intrusion Detection System for Unmanned Aerial Vehicles Security
    da Silva, Leandro Marcos
    Ferrao, Isadora Garcia
    Branco, Kalinka R. L. J. C.
    2022 LATIN AMERICAN ROBOTICS SYMPOSIUM (LARS), 2022 BRAZILIAN SYMPOSIUM ON ROBOTICS (SBR), AND 2022 WORKSHOP ON ROBOTICS IN EDUCATION (WRE), 2022, : 43 - 48
  • [26] Analysis of Field Data on Web Security Vulnerabilities
    Fonseca, Jose
    Seixas, Nuno
    Vieira, Marco
    Madeira, Henrique
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2014, 11 (02) : 89 - 100
  • [27] Mitigating Program Security Vulnerabilities: Approaches and Challenges
    Shahriar, Hossain
    Zulkernine, Mohammad
    ACM COMPUTING SURVEYS, 2012, 44 (03)
  • [28] Systematic review of web application security development model
    Bala Musa Shuaibu
    Norita Md Norwawi
    Mohd Hasan Selamat
    Abdulkareem Al-Alwani
    Artificial Intelligence Review, 2015, 43 : 259 - 276
  • [29] Systematic review of web application security development model
    Shuaibu, Bala Musa
    Norwawi, Norita Md
    Selamat, Mohd Hasan
    Al-Alwani, Abdulkareem
    ARTIFICIAL INTELLIGENCE REVIEW, 2015, 43 (02) : 259 - 276
  • [30] High False Positive Detection of Security Vulnerabilities: A Case Study
    Nadeem, Muhammad
    Williams, Byron J.
    Allen, Edward B.
    PROCEEDINGS OF THE 50TH ANNUAL ASSOCIATION FOR COMPUTING MACHINERY SOUTHEAST CONFERENCE, 2012,