Web Application Security Vulnerabilities Detection Approaches: a Systematic Mapping Study

被引:0
作者
Rafique, Sajjad [1 ]
Humayun, Mamoona [1 ]
Hamid, Bushra [1 ]
Abbas, Ansar [1 ]
Akhtar, Muhammad [1 ]
Iqbal, Kamil [1 ]
机构
[1] PMAS Arid Agr Univ, Univ Inst Informat Technol, Dept Comp Sci, Rawalpindi, Pakistan
来源
2015 16TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD) | 2015年
关键词
Systematic mapping study; web application; security; vulnerability; State-of-the-art; SITE SCRIPTING VULNERABILITIES; ATTACKS; SERVICE;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Number of security vulnerabilities in web application has grown with the tremendous growth of web application in last two decades. As the domain of Web Applications is maturing, large number of empirical studies has been reported in web applications to address the solution of vulnerable web application. However, before advancing towards finding new approaches of web applications security vulnerability detection, there is a need to analyze and synthesize existing evidence based studies in web applications area. To do this, we have planned to conduct a systematic mapping study to view and report the state-of-the-art of empirical work in existing research of web applications. In this paper, we aimed at providing a description of mapping study for synthesizing the reported empirical research in the area of web applications security vulnerabilities detection approaches. The proposed solutions are mapped against: (1) the software development stages for which the solution has been proposed and (2) the web application vulnerabilities mapping according to OWASP Top 10 security vulnerabilities. To do this, existing literature has been surveyed using a systematic mapping study by phrasing two research questions. In the mapping study, a total of 41 studies dating from 1994 to 2014 were evaluated and mapped against the aforementioned categories. The outcome of this mapping study is current state-of-the-art of empirical research in web application area, strength and weaknesses of existing empirical work, best practices and possible directions for future research.
引用
收藏
页码:469 / 474
页数:6
相关论文
共 50 条
  • [31] A Comprehensive and Systematic Survey on the Internet of Things: Security and Privacy Challenges, Security Frameworks, Enabling Technologies, Threats, Vulnerabilities and Countermeasures
    Obaidat, Muath A.
    Obeidat, Suhaib
    Holst, Jennifer
    Al Hayajneh, Abdullah
    Brown, Joseph
    COMPUTERS, 2020, 9 (02)
  • [32] Security and Privacy for Blockchain: A Systematic Mapping Study
    Yang, Jinmei
    Bi, Huang
    Dai, Fei
    Liang, Zhihong
    Qiang, Zhenping
    2021 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS DASC/PICOM/CBDCOM/CYBERSCITECH 2021, 2021, : 446 - 453
  • [33] Portability Approaches for Business Web Applications to Mobile Devices: A Systematic Mapping
    Cajas, Viviana
    Urbieta, Matias
    Rybarczyk, Yves
    Rossi, Gustavo
    Guevara, Cesar
    TECHNOLOGY TRENDS, 2019, 895 : 148 - 164
  • [34] Security of Web Applications: Threats, Vulnerabilities, and Protection Methods
    Mohammed, Asma
    Alkhathami, Jamilah
    Alsuwat, Hatim
    Alsuwat, Emad
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (08): : 167 - 176
  • [35] Security risks in cyber physical systems-A systematic mapping study
    Zahid, Maryam
    Inayat, Irum
    Daneva, Maya
    Mehmood, Zahid
    JOURNAL OF SOFTWARE-EVOLUTION AND PROCESS, 2021, 33 (09)
  • [36] Systematic Mapping Study of Security in Multi-Embedded-Agent Systems
    Baudet, Arthur
    Aktouf, Oum-El-Kheir
    Mercier, Annabelle
    Elbaz-Vincent, Philippe
    IEEE ACCESS, 2021, 9 : 154902 - 154913
  • [37] A survey of static code analysis methods for security vulnerabilities detection
    Kulenovic, Melina
    Donko, Dzenana
    2014 37TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2014, : 1381 - 1386
  • [38] Cross Site Scripting: Detection Approaches in Web Application
    Marashdih, Abdalla Wasef
    Zaaba, Zarul Fitri
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (10) : 155 - 160
  • [39] A Systematic Survey on Security in Anonymity Networks: Vulnerabilities, Attacks, Defenses, and Formalization
    Chao, Daichong
    Xu, Dawei
    Gao, Feng
    Zhang, Chuan
    Zhang, Weiting
    Zhu, Liehuang
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2024, 26 (03): : 1775 - 1829
  • [40] Mapping and Analysis of Common Vulnerabilities in Popular Web Servers
    Barocsai, Matyas
    Can, Johan
    Karresand, Martin
    Nadjm-Tehrani, Simin
    CRITICAL INFORMATION INFRASTRUCTURES SECURITY, CRITIS 2023, 2024, 14599 : 3 - 22