Affordable Access

Access to the full text

A comparative study of web application security parameters: current trends and future directions

Authors
  • Shahid, Jahanzeb
  • Hameed, Muhammad Khurram
  • Javed, Ibrahim Tariq
  • Qureshi, Kashif Naseer
  • Ali, Moazam
  • Crespi, Noel
Publication Date
Apr 01, 2022
Identifiers
DOI: 10.3390/app12084077
OAI: oai:HAL:hal-03656365v1
Source
HAL
Keywords
Language
English
License
Green
External links

Abstract

The growing use of the internet has resulted in an exponential rise in the use of web applications. Businesses, industries, financial and educational institutions, and the general populace depend on web applications. This mammoth rise in their usage has also resulted in many security issues that make these web applications vulnerable, thereby affecting the confidentiality, integrity, and availability of associated information systems. It has, therefore, become necessary to find vulnerabilities in these information system resources to guarantee information security. A publicly available web application vulnerability scanner is a computer program that assesses web application security by employing automated penetration testing techniques that reduce the time, cost, and resources required for web application penetration testing and eliminates test engineers’ dependency on human knowledge. However, these security scanners possess various weaknesses of not scanning complete web applications and generating wrong test results. Moreover, intensive research has been carried out to quantitatively enumerate web application security scanners’ results to inspect their effectiveness and limitations. However, the findings show no well-defined method or criteria available for assessing their results. In this research, we have evaluated the performance of web application vulnerability scanners by testing intentionally defined vulnerable applications and the level of their respective precision and accuracy. This was achieved by classifying the analyzed tools using the most common parameters. The evaluation is based on an extracted list of vulnerabilities from OWASP (Open Web Application Security Project).

Report this publication

Statistics

Seen <100 times