2015
DOI: 10.1109/tsc.2014.2310221
|View full text |Cite
|
Sign up to set email alerts
|

Assessing and Comparing Vulnerability Detection Tools for Web Services: Benchmarking Approach and Examples

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
40
0
1

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 57 publications
(41 citation statements)
references
References 21 publications
0
40
0
1
Order By: Relevance
“…Services that can generate a high F-measure mean they are better services [27]. If a service obtains a precision of 0.6 means it can detect vulnerability with 60%.…”
Section: A Penetration Testingmentioning
confidence: 99%
See 1 more Smart Citation
“…Services that can generate a high F-measure mean they are better services [27]. If a service obtains a precision of 0.6 means it can detect vulnerability with 60%.…”
Section: A Penetration Testingmentioning
confidence: 99%
“…The combination of precision, recall and F-measure can determine the quality of the security services. We reproduce the experiments conducted by [27] and then compare results of CCAF multi-layered security with VS1, VS2, VS3 and VS4 tools due to similarities with CCAF technologies except each is single layered security. Results in Table 2 show that the CCAF multi-layered security can provide a much better service since all the true vulnerabilities can be detected with precision as 1.…”
Section: A Penetration Testingmentioning
confidence: 99%
“…Antunes and Vieira [34] use four types of tools for penetration testing, explain the use of precision, recall and F-measure to justify the validity of their results. Amongst all the four tools for penetration testing, all results were very low.…”
Section: Metrics Analysis and Comparisonmentioning
confidence: 99%
“…These scenarios can be divided in web-based applications and systems , web services [34][35][36][37][38][39] network protocols and devices [11,14,[40][41][42][43][44][45][46][47][48][49][50][51][52], software and desktop applications [61], and process control system [62]. Figure 4 shows the different target scenarios that have a diversity in relation to the number of studies, and as mentioned before, most of the studies are related to web-based applications, network devices, and protocols contexts.…”
Section: Rq2-what Are the Target-scenarios In Pentest?mentioning
confidence: 99%
“…Black-box, in contrast, assume that there is no prior knowledge about the environment. Most of the studies and research papers, mainly around vulnerability discovery tools, perform black box tests [32,34,64]. Gray box test represents the middle ground between black box and white box, in which the amount of information about the target is not complete but it is also not non-existent.…”
Section: Rq3-what Are the Models Of Pentest?mentioning
confidence: 99%