Abstract

The internet has provided a vast range of benefits to society, and empowering people in a variety of ways. Due to incredible growth of Internet usage in past 2 decades, everyday a number of new Web applications are also becoming a part of World Wide Web. The distributed and open nature of internet attracts hackers to interrupt the smooth services of web applications. Some of the famous web application vulnerabilities are SQL Injection, Cross Site Scripting (XSS) and Cross Site request Forgery (CSRF). We believe that in order to encounter these vulnerabilities; the web application vulnerabilities scanner should have strong detection and prevention rules to ease the problem. At present, a number of web application vulnerabilities scanners have been proposed by research community, such as ZED Attack Proxy (ZAP) by AWASP, Wapiti by sourceforge.net and w3af by w3af.org. However, these scanners cannot challenge all web vulnerabilities. This research proposed and develop a vulnerability scanning tool WUM (web unique method) to detection and prevention of all the major instance vulnerabilities and demonstrates how to detect unauthorized access by finding vulnerabilities. With the efficient use of this tool, the developers are able to find potentially vulnerable web application. WUM generated a high level of accuracy and compatibility, which is elaborated underneath. The result of the experiment shows proposed vulnerability scanner tool WUM which gives less false positive and detect more vulnerabilities in comparison of well-known black box scanners.

Highlights

  • Web applications are the best way of providing standard facilities through Internet

  • We currently provide various attack components, reflected and Stored XSS, SQLI, Cross Site request Forgery (CSRF), LFI/ RFI, CJ, SSL and UR

  • Individuals having same interest of research take assistance from academic scanner to introduce their own scanner like SQIVS [9], Increase the MySQLinj factor [10], secubat

Read more

Summary

INTRODUCTION

Web applications are the best way of providing standard facilities through Internet. The collaboration of diverse technologies that are used in many generalization layers, are the foundation cause of vulnerabilities in web applications [1]. This research www.ijacsa.thesai.org (IJACSA) International Journal of Advanced Computer Science and Applications, Vol 8, No 12, 2017 presents an open source web vulnerability scanner that use black box technique to carry out crawling and scanning for websites, to effectively detect the presence of exploitable web vulnerabilities. This tool is independent of a database of known vulnerabilities; instead distinctive, underlying properties of application level vulnerabilities are exploited to effectively detect affected programs.

BACKGROUND
SQL Injection Vulnerability
Cross Site Scripting Vulnerability
Classification of Web Application Security Approaches
METHODOLOGY
AUTOMATED VULNERABILITY DETECTION
EXPERIMENTAL RESULT
Findings
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call