M. Aljabri, Maryam M. Aldossary, Noor Al-Homeed, Bushra Alhetelah, Malek Althubiany, Ohoud F. Alotaibi, Sara Alsaqer
{"title":"测试和利用工具改进OWASP十大安全漏洞检测","authors":"M. Aljabri, Maryam M. Aldossary, Noor Al-Homeed, Bushra Alhetelah, Malek Althubiany, Ohoud F. Alotaibi, Sara Alsaqer","doi":"10.1109/CICN56167.2022.10008360","DOIUrl":null,"url":null,"abstract":"In many different sorts of businesses, including public and private, government, critical infrastructures, etc., web apps have grown recently. Therefore, securing web applications is a major concern to protect businesses from loss and unauthorized access to sensitive information. Developers use vulnerable thirdparty modules or components or create programming security flaws themselves and occasionally work with tight budgets. These situations frequently cause people to overlook a crucial aspect of development life cycle security. This paper studies and tests the currently available web security and exploitation tools of OWASP's top ten security vulnerabilities. The main aim of this paper is to improve the detection of OWASP's top ten security vulnerabilities by proposing an exploitation and detection tool that combined features of the tools that has been tested in the paper.","PeriodicalId":287589,"journal":{"name":"2022 14th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Testing and Exploiting Tools to Improve OWASP Top Ten Security Vulnerabilities Detection\",\"authors\":\"M. Aljabri, Maryam M. Aldossary, Noor Al-Homeed, Bushra Alhetelah, Malek Althubiany, Ohoud F. Alotaibi, Sara Alsaqer\",\"doi\":\"10.1109/CICN56167.2022.10008360\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In many different sorts of businesses, including public and private, government, critical infrastructures, etc., web apps have grown recently. Therefore, securing web applications is a major concern to protect businesses from loss and unauthorized access to sensitive information. Developers use vulnerable thirdparty modules or components or create programming security flaws themselves and occasionally work with tight budgets. These situations frequently cause people to overlook a crucial aspect of development life cycle security. This paper studies and tests the currently available web security and exploitation tools of OWASP's top ten security vulnerabilities. The main aim of this paper is to improve the detection of OWASP's top ten security vulnerabilities by proposing an exploitation and detection tool that combined features of the tools that has been tested in the paper.\",\"PeriodicalId\":287589,\"journal\":{\"name\":\"2022 14th International Conference on Computational Intelligence and Communication Networks (CICN)\",\"volume\":\"51 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 14th International Conference on Computational Intelligence and Communication Networks (CICN)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CICN56167.2022.10008360\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 14th International Conference on Computational Intelligence and Communication Networks (CICN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CICN56167.2022.10008360","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Testing and Exploiting Tools to Improve OWASP Top Ten Security Vulnerabilities Detection
In many different sorts of businesses, including public and private, government, critical infrastructures, etc., web apps have grown recently. Therefore, securing web applications is a major concern to protect businesses from loss and unauthorized access to sensitive information. Developers use vulnerable thirdparty modules or components or create programming security flaws themselves and occasionally work with tight budgets. These situations frequently cause people to overlook a crucial aspect of development life cycle security. This paper studies and tests the currently available web security and exploitation tools of OWASP's top ten security vulnerabilities. The main aim of this paper is to improve the detection of OWASP's top ten security vulnerabilities by proposing an exploitation and detection tool that combined features of the tools that has been tested in the paper.