Web Application Security Vulnerabilities Detection Approaches: a Systematic Mapping Study

被引:0
作者
Rafique, Sajjad [1 ]
Humayun, Mamoona [1 ]
Hamid, Bushra [1 ]
Abbas, Ansar [1 ]
Akhtar, Muhammad [1 ]
Iqbal, Kamil [1 ]
机构
[1] PMAS Arid Agr Univ, Univ Inst Informat Technol, Dept Comp Sci, Rawalpindi, Pakistan
来源
2015 16TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD) | 2015年
关键词
Systematic mapping study; web application; security; vulnerability; State-of-the-art; SITE SCRIPTING VULNERABILITIES; ATTACKS; SERVICE;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Number of security vulnerabilities in web application has grown with the tremendous growth of web application in last two decades. As the domain of Web Applications is maturing, large number of empirical studies has been reported in web applications to address the solution of vulnerable web application. However, before advancing towards finding new approaches of web applications security vulnerability detection, there is a need to analyze and synthesize existing evidence based studies in web applications area. To do this, we have planned to conduct a systematic mapping study to view and report the state-of-the-art of empirical work in existing research of web applications. In this paper, we aimed at providing a description of mapping study for synthesizing the reported empirical research in the area of web applications security vulnerabilities detection approaches. The proposed solutions are mapped against: (1) the software development stages for which the solution has been proposed and (2) the web application vulnerabilities mapping according to OWASP Top 10 security vulnerabilities. To do this, existing literature has been surveyed using a systematic mapping study by phrasing two research questions. In the mapping study, a total of 41 studies dating from 1994 to 2014 were evaluated and mapped against the aforementioned categories. The outcome of this mapping study is current state-of-the-art of empirical research in web application area, strength and weaknesses of existing empirical work, best practices and possible directions for future research.
引用
收藏
页码:469 / 474
页数:6
相关论文
共 50 条
  • [41] A systematic study of content security policy in web applications
    Liu, Shukai
    Yan, Xuexiong
    Wang, Qingxian
    Xi, Qi
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3570 - 3584
  • [42] Web Application Security: A Pragmatic Expose
    Aladi, Clement C.
    DIGITAL THREATS: RESEARCH AND PRACTICE, 2024, 5 (02):
  • [43] Security of Mobile Cloud Computing: A Systematic Mapping Study
    Jara Juarez, Diego X.
    Cedillo, Priscila
    2017 IEEE SECOND ECUADOR TECHNICAL CHAPTERS MEETING (ETCM), 2017,
  • [44] Advances in Web API testing: A Systematic Mapping Study
    Capistran Garcia, Josue
    Ocharan Hernandez, Jorge Octavio
    Perez Arriaga, Juan Carlos
    Limon Riano, Hector Javier
    2023 MEXICAN INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE, ENC, 2024,
  • [45] Web applications testing techniques: a systematic mapping study
    Hanna S.
    Ahmad A.A.-S.
    International Journal of Web Engineering and Technology, 2023, 17 (04) : 372 - 412
  • [46] Model Driven Web Engineering: A Systematic Mapping Study
    Wakil, Karzan
    Jawawi, Dayang N. A.
    E-INFORMATICA SOFTWARE ENGINEERING JOURNAL, 2015, 9 (01) : 107 - 142
  • [47] Analysis of web application security mechanism and attack detection using vulnerability injection technique
    Bhor, R. V.
    Khanuja, H. K.
    2016 INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA), 2016,
  • [48] Security in Telehealth Systems From a Software Engineering Viewpoint: A Systematic Mapping Study
    Marquez, Gaston
    Astudillo, Hernan
    Taramasco, Carla
    IEEE ACCESS, 2020, 8 : 10933 - 10950
  • [49] Deep learning trends and future perspectives of web security and vulnerabilities
    Chughtai, Muhammad Saad
    Bibi, Irfana
    Karim, Shahid
    Shah, Syed Wajid Ali
    Laghari, Asif Ali
    Khan, Abdullah Ayub
    JOURNAL OF HIGH SPEED NETWORKS, 2024, 30 (01) : 115 - 146
  • [50] Analyzing Security Approaches for Threats,Vulnerabilities, and attacks in an IoT Environment
    Tyagi, Himani
    Kumar, Rajendra
    2021 INTERNATIONAL CONFERENCE ON COMPUTATIONAL PERFORMANCE EVALUATION (COMPE-2021), 2021, : 227 - 233