2020 8th International Conference on Cyber and IT Service Management (CITSM) 2020
DOI: 10.1109/citsm50537.2020.9268856
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Web Security Using Open Web Application Security Project 10

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 16 publications
0
7
0
Order By: Relevance
“…Attacks are also parsed, which involves classification by type and then aggregation by geospatial data. Attack classification by type is performed by OWASP [15] using a set of ModSecurity Core Rule Set [16] developed for web applications to identify cyber threats. The GSec GSec program suite in the Go and C languages serves to process the attacks, which carries out an automated attack type classification and aggregation of data in different time intervals.…”
Section: Methodsmentioning
confidence: 99%
“…Attacks are also parsed, which involves classification by type and then aggregation by geospatial data. Attack classification by type is performed by OWASP [15] using a set of ModSecurity Core Rule Set [16] developed for web applications to identify cyber threats. The GSec GSec program suite in the Go and C languages serves to process the attacks, which carries out an automated attack type classification and aggregation of data in different time intervals.…”
Section: Methodsmentioning
confidence: 99%
“…The top ten most critical security risks [11] are regularly published for the companies and developers to raise the awareness of web application security in order to reduce the damage caused by potential vulnerabilities of applications. However, accordingly, there are recommended programming patterns that help the users to repair the unsafe configurations and minimize the risks [12].…”
Section: Terminology and Threats In Web Securitymentioning
confidence: 99%
“…Jinfeng et al [11], a case study is conducted for vulnerability scanners using the OWASP tool. Helmiawan et al [12] examined the security of the web using Open Web Application Security Project 10. Wijaya et al [13] suggested a web-based dashboard for monitoring penetration testing based on OWASP standards.…”
Section: Related Workmentioning
confidence: 99%