A Fuzzy Classifier-Based Penetration Testing for Web Applications

被引:10
|
作者
Alhassan, J. K. [1 ]
Misra, Sanjay [2 ]
Umar, A. [1 ]
Maskeliunas, Rytis [3 ]
Damasevicius, Robertas [3 ]
Adewumi, Adewole [2 ]
机构
[1] Fed Univ Technol, Minna, Nigeria
[2] Covenant Univ, Ota, Nigeria
[3] Kaunas Univ Technol, Kaunas, Lithuania
关键词
Vulnerabilities assessment; Penetration testing; Fuzzy classifier-based; Web applications;
D O I
10.1007/978-3-319-73450-7_10
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The biggest challenge of Web application is the inestimable losses arising from security flaws. Two approaches were advanced by a number of scholars to provide security to Web space. One of such approach is vulnerability assessment, which is a conscious effort to isolate, identify and recognize potentials vulnerabilities exploited by attackers. The second being the estimation and determination of level of risks/threats posed to Web applications by vulnerabilities obvious to the developer (or tester); this is generally referred to as penetration testing. Recently, there is Vulnerability Assessment and Penetration Testing (VAPT) that combined these two schemes to improve safety and effectively combat the menace of attackers on Web applications. This paper proposed Fuzzy Classifier-based Vulnerability and Assessment Testing (FCVAPT) model to provide security for sensitive data/information in Web applications. Cross Site Scripting (XSS) and Structured Query Language (SQL) injections were selected for evaluation of proposed FCVAPT model. FCVAPT model's classification performance for MSE, MAPE and RMSE were 33.33, 14.81% and 5.77% respectively. FCVAPT is considerably effective for detecting vulnerability and ascertaining the nature of threats/risks available to Web applications.
引用
收藏
页码:95 / 104
页数:10
相关论文
共 50 条
  • [1] A classifier-based approach to user-role assignment for web applications
    Sheng, SL
    Osborn, SL
    SECURE DATA MANAGEMENT, PROCEEDINGS, 2004, 3178 : 163 - 171
  • [2] Classifier-based constraint acquisition
    Prestwich, S. D.
    Freuder, E. C.
    O'Sullivan, B.
    Browne, D.
    ANNALS OF MATHEMATICS AND ARTIFICIAL INTELLIGENCE, 2021, 89 (07) : 655 - 674
  • [3] Classifier-based constraint acquisition
    S. D. Prestwich
    E. C. Freuder
    B. O’Sullivan
    D. Browne
    Annals of Mathematics and Artificial Intelligence, 2021, 89 : 655 - 674
  • [4] Classifier-Based Policy Representation
    Rexakis, Ioannis
    Lagoudakis, Michail G.
    SEVENTH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS, PROCEEDINGS, 2008, : 91 - 98
  • [5] Classifier-based Polarity Propagation in a Wordnet
    Kocon, Jan
    Janz, Arkadiusz
    Piasecki, Maciej
    PROCEEDINGS OF THE ELEVENTH INTERNATIONAL CONFERENCE ON LANGUAGE RESOURCES AND EVALUATION (LREC 2018), 2018, : 4212 - 4220
  • [6] Voting Classifier-Based Crop Recommendation
    Bandi R.
    Likhit M.S.S.
    Reddy S.R.
    Bodla S.R.
    Venkat V.S.
    SN Computer Science, 4 (5)
  • [7] Generative Adversarial Network (GAN)-Based Autonomous Penetration Testing for Web Applications
    Chowdhary, Ankur
    Jha, Kritshekhar
    Zhao, Ming
    SENSORS, 2023, 23 (18)
  • [8] TreeOptimizer: A classifier-based task scheduling framework
    Venkatesh, Pruthvi Raj
    Srinivas, M.
    Krishna, P. Radha
    PROCEEDINGS OF THE 24TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING AND NETWORKING, ICDCN 2023, 2023, : 280 - 281
  • [9] Classifier-based acronym extraction for business documents
    Menard, Pierre Andre
    Ratte, Sylvie
    KNOWLEDGE AND INFORMATION SYSTEMS, 2011, 29 (02) : 305 - 334
  • [10] Classifier-based acronym extraction for business documents
    Pierre André Ménard
    Sylvie Ratté
    Knowledge and Information Systems, 2011, 29 : 305 - 334