2022
DOI: 10.1109/tdsc.2021.3095417
|View full text |Cite
|
Sign up to set email alerts
|

RAT: Reinforcement-Learning-Driven and Adaptive Testing for Vulnerability Discovery in Web Application Firewalls

Abstract: Due to the increasing sophistication of web attacks, Web Application Firewalls (WAFs) have to be tested and updated regularly to resist the relentless flow of web attacks. In practice, using a brute-force attack to discover vulnerabilities is infeasible due to the wide variety of attack patterns. Thus, various black-box testing techniques have been proposed in the literature. However, these techniques suffer from low efficiency. This paper presents Reinforcement-Learning-Driven and Adaptive Testing (RAT ), an … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 33 publications
0
0
0
Order By: Relevance
“…Firmaster [76], Gail-PT [79], HILTI [82], IoTFuzzer [83], JCOMIX [84], LAID [85], Link [86], Lore [87], Mace [89], MaliceScript [92], Masat [93], Mirage [94], Mitch [95], MoScan [96], NAUTILUS [97], NAVEX [98], No Name (CSRF) [101], No Name (TTCN-3) [102], NodeXP [104], OSV [107], ObjectMap [105], Owfuzz [108], PJCT [115], PURITY [117], PentestGPT [113], PhpSAFE [114], Project Achilles [116], Pyciuti [118], RAT [119], ROSploit [123], RT-RCT [124], Revealer [120], RiscyROP [121], Robin [122], SOA-Scanner [130], SVED [133], Scanner++ [125], SerialDetector [127], ShoVAT [128], Snout [129], Spicy [131], SuperEye [132], TChecker [135], TORPEDO [136], UE Security Reloaded [137], VAPE-BRIDGE…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Firmaster [76], Gail-PT [79], HILTI [82], IoTFuzzer [83], JCOMIX [84], LAID [85], Link [86], Lore [87], Mace [89], MaliceScript [92], Masat [93], Mirage [94], Mitch [95], MoScan [96], NAUTILUS [97], NAVEX [98], No Name (CSRF) [101], No Name (TTCN-3) [102], NodeXP [104], OSV [107], ObjectMap [105], Owfuzz [108], PJCT [115], PURITY [117], PentestGPT [113], PhpSAFE [114], Project Achilles [116], Pyciuti [118], RAT [119], ROSploit [123], RT-RCT [124], Revealer [120], RiscyROP [121], Robin [122], SOA-Scanner [130], SVED [133], Scanner++ [125], SerialDetector [127], ShoVAT [128], Snout [129], Spicy [131], SuperEye [132], TChecker [135], TORPEDO [136], UE Security Reloaded [137], VAPE-BRIDGE…”
Section: Discussionmentioning
confidence: 99%
“…No Name (TTCN-3) [102], NodeXP [104], OSV [107], ObjectMap [105], Owfuzz [108], PURITY [117], PenQuest [112], PentestGPT [113], PhpSAFE [114], Pyciuti [118], Pyciuti [118], RAT [119], ROSploit [123], RT-RCT [124], RT-RCT [124], Revealer [120], RiscyROP [121], Robin [122], SOA-Scanner [130], SVED [133], Scan-ner++ [125], SerialDetector [127], ShoVAT [128], ShoVAT [128], Snout [129], Snout [129], Spicy [131], Spicy [131], SuperEye [132], TAMELESS [134], TChecker [135], TORPEDO [136], UE Security Reloaded [137], VAPE-BRIDGE [139], VERA [140], VUDDY [141], VulCNN [143], VulDeePecker [144], VulPecker [147], Vulcan [142], Vulnet [145], Vulnsloit [146], WAPTT [148], WebFuzz [149], WebVIM [150] Resource Development ...…”
Section: Reconnaissancementioning
confidence: 99%
“…Injection adalah serangan di mana penyerang menyuntikkan suatu input berbahaya ke aplikasi web. Biasanya karena kurangnya keterampilan pemrograman dalam kueri aplikasi menginterpretasikan input sebagai bagian dari perintah atau kueri, yang dapat mengakibatkan kerusakan parah [10]. Dalam penelitian ini, pengujian dilakukan pada serangan SQL injection.…”
Section: Injectionunclassified
“…Web application services are increasing year by year across various applications in our lives, making them the main targets of attackers. In this context, a large number of Web security vulnerabilities have posed significant challenges to network security [1,2]. SQL Injection Attack (SQLIA) is a type of Web application attack [3,4].…”
Section: Introductionmentioning
confidence: 99%