2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT) 2018
DOI: 10.1109/dessert.2018.8409167
|View full text |Cite
|
Sign up to set email alerts
|

Neural networks based choice of tools for penetration testing of web applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…Risk assessment automation have been proposed in the form of automated penetration testing frameworks (e.g. [9], [10], [11], [12], [13], [14], [15], [16], [17], and [18]). These automated tools are excellent resources for identifying vulnerabilities.…”
Section: Risk Assessment Automationmentioning
confidence: 99%
“…Risk assessment automation have been proposed in the form of automated penetration testing frameworks (e.g. [9], [10], [11], [12], [13], [14], [15], [16], [17], and [18]). These automated tools are excellent resources for identifying vulnerabilities.…”
Section: Risk Assessment Automationmentioning
confidence: 99%
“…Overall, a total number of eleven test-beds and six web application security scanners were chosen to be evaluated in this quantitative analysis using the measurement metrics of false positives, false negatives, redundant tests, and true negative, as previously practised by [9]. These test-beds and web application security scanners were chosen based on criteria of [25] that they are easy to use and install; they are ubiquitous; they are free or not too expensive; they support cross-site scripting vulnerability, and they are well-documented. A simple reason that testbeds, which are the vulnerable web application, were used to benchmark the web application security scanner's quality was to prevent the committing of cybercrime as in the web application security scanner might harms a web application security through the active scanning, which involves writing of attack payloads into the web application attack vectors and database.…”
Section: Preparationmentioning
confidence: 99%
“…The goal of the paper is to describe the process of creating a neural network based Web service for choosing tools of penetration testing of Web applications. This paper is based on [11], in which prerequisites for creating a Web service for choosing penetration tools were described. Also, it discusses issues related to the implementation of neural network logic on the Web server side.…”
Section: Introductionmentioning
confidence: 99%