An Intelligent and Automated WCMS Vulnerability-Discovery Tool: The Current State of the Web

被引:5
作者
Cigoj, Primoz [1 ,2 ]
Blazic, Borka Jerman [2 ]
机构
[1] Jozef Stefan Int Postgrad Sch, Ljubljana 1000, Slovenia
[2] Jozef Stefan Inst, Lab Open Syst & Networks, Ljubljana 1000, Slovenia
关键词
Cyberspace; databases; software; security; search engines; search methods; metasearch; web search; websites; WCMS;
D O I
10.1109/ACCESS.2019.2957573
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The main focus of the cyber-security community has been to make operating systems and communication networks more secure and harder for attackers to penetrate. This also applies to all the applications on the Internet. The most frequently used web application and user pages are today developed with the Web Content Management System (WCMS), as it allows user-friendly access, easy development and operation. WCMSs are present all over the world in many different environments. Any malware that can penetrate the WCMS can significantly affect the system itself and can cause a misconfiguration. The security and stability of these systems are important for reducing the risks and consequences of attacks or disfunctions with currently known similar tools. This paper presents a newly developed tool for identifying the vulnerabilities of the majority of Internet sites with WCMS applications and the remedies to be applied. Its key feature is the ability to perform automated, fast and dynamic vulnerability scans of the WCMS and the attached plug-ins on a large scale with in-built ethical respect.
引用
收藏
页码:175466 / 175473
页数:8
相关论文
共 19 条
  • [1] Agosta G., 2012, Proceedings of the 2012 Ninth International Conference on Information Technology: New Generations (ITNG), P189, DOI 10.1109/ITNG.2012.167
  • [2] Akrout Rim., 2014, Journal of the Brazilian Computer Society, V20, P4, DOI DOI 10.1186/1678-4804-20-4
  • [3] [Anonymous], 2018, HAGUE SECURITY DELTA
  • [4] Security Evaluation of Wordpress Backup Plugins
    Cernica, Ionut
    Popescu, Nirvana
    Tiganoaia, Bogdan
    [J]. 2019 22ND INTERNATIONAL CONFERENCE ON CONTROL SYSTEMS AND COMPUTER SCIENCE (CSCS), 2019, : 312 - 316
  • [5] Durumeric Zakir, 2013, 22 USENIX SEC S USEN
  • [6] Goethem T. V., 2014, P INT C TRUST TRUSTW, P110
  • [7] Hassan M, 2017, ARXIV171102447
  • [8] Karumanchi S., 2015, J INTERNET SERVICES, V5, P53
  • [9] An Intelligent Improvement of Internet-Wide Scan Engine for Fast Discovery of Vulnerable IoT Devices
    Kim, Hwankuk
    Kim, Taeun
    Jang, Daeil
    [J]. SYMMETRY-BASEL, 2018, 10 (05):
  • [10] Quality Of WordPress Plug-Ins: An Overview of Security and User Ratings
    Koskinen, Teemu
    Ihantola, Petri
    Karavirta, Ville
    [J]. PROCEEDINGS OF 2012 ASE/IEEE INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY, RISK AND TRUST AND 2012 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM/PASSAT 2012), 2012, : 834 - 837