2022
DOI: 10.3390/app12084077
|View full text |Cite
|
Sign up to set email alerts
|

A Comparative Study of Web Application Security Parameters: Current Trends and Future Directions

Abstract: The growing use of the internet has resulted in an exponential rise in the use of web applications. Businesses, industries, financial and educational institutions, and the general populace depend on web applications. This mammoth rise in their usage has also resulted in many security issues that make these web applications vulnerable, thereby affecting the confidentiality, integrity, and availability of associated information systems. It has, therefore, become necessary to find vulnerabilities in these informa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0
2

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 28 publications
(13 citation statements)
references
References 27 publications
0
11
0
2
Order By: Relevance
“…SQL injection occurs when malicious SQL queries are inserted into input fields, potentially leading to unauthorized access to the database or manipulation of data. On the other hand, LFI exploits vulnerabilities in file upload functionalities to execute arbitrary code, potentially exposing sensitive information or compromising the integrity of the application (Shahid et al, 2022). In the context of the Bengkel Koding web application, LFI can be used to upload a malicious PHP file that, when executed, can reveal the source code of the web server running PHP.…”
Section: System Feasibility Calculationsmentioning
confidence: 99%
“…SQL injection occurs when malicious SQL queries are inserted into input fields, potentially leading to unauthorized access to the database or manipulation of data. On the other hand, LFI exploits vulnerabilities in file upload functionalities to execute arbitrary code, potentially exposing sensitive information or compromising the integrity of the application (Shahid et al, 2022). In the context of the Bengkel Koding web application, LFI can be used to upload a malicious PHP file that, when executed, can reveal the source code of the web server running PHP.…”
Section: System Feasibility Calculationsmentioning
confidence: 99%
“…OWASP, on the other hand, focuses on the top ten most critical vulnerabilities. For this reason, and since other studies [6,8,16,[19][20][21][22] have used OWASP for web application security guidelines, we also adopted OWASP as our preferred security guideline for use in this project.…”
Section: Web Application Security Standardsmentioning
confidence: 99%
“…Pengujian menggunakan alat OWASP-ZAP memiliki deteksi kerentanan yang lebih tinggi beri peringkat dalam kategori open source kemudian Acunetix dan NetSparker memiliki tingkat positif palsu yang lebih sedikit [9]. Hasil pemindaian menggunakan alat vulnerability scanner dapat memberikan informasi kerentanan berdasarkan tingkat risiko [10].…”
Section: Pendahuluanunclassified