2020
DOI: 10.5815/ijitcs.2020.04.05
|View full text |Cite
|
Sign up to set email alerts
|

Web Vulnerability Finder (WVF): Automated Black- Box Web Vulnerability Scanner

Abstract: Today the internet has become primary source of communication among people because it holds limitless space and pool of various web applications and resources. The internet allows us to communicate in a fraction of second with another people who is sitting in the other part of the world. At present, the internet has become part of our daily life and its usage is increasing exponentially, therefore it accumulates a number of web applications on daily basis on Web podium. Most of the web applications exist with … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 19 publications
0
3
0
Order By: Relevance
“…Finally, the work in [22] is another high-level scanner focused on web vulnerabilities. It performs URL crawling and attacks the resulting URLs, to detect XSS, SQL injection, between other vulnerabilities.…”
Section: Related Workmentioning
confidence: 99%
“…Finally, the work in [22] is another high-level scanner focused on web vulnerabilities. It performs URL crawling and attacks the resulting URLs, to detect XSS, SQL injection, between other vulnerabilities.…”
Section: Related Workmentioning
confidence: 99%
“…In the third experiment, we used different scanning tools to test the samples collected by the crawler program in the second experiment and compared the differences between our proposed method and classic open-source tools and other detection schemes. In the experiment, we used the 4 tools of Wapiti, w3af, XSSer, and XSStrike and the three detection schemes of XSS-Unit testing [29], TT-XSS [30], and WVF [37] proposed by other researchers in recent years and GAXSS test results for comparison.…”
Section: Scanner Comparisonmentioning
confidence: 99%
“…In [17], M. Amjad et al to investigate and find out the parameters that affects the web performance and it has been tested on ecommerce applications of Bangladesh, where eleven parameters are considered and these are fully loaded (requests), first CPU idle, speed index, start render, load time, fully loaded (time), document complete (time), last painted hero, first contentful paint, and first byte. In [18], M. N. In [19] the author point out the difficulties of security implementation of web applications and presents a framework for developing secure web applications. Also the priority and importance of use case in UML are pointed out.…”
Section: Introductionmentioning
confidence: 99%