A Fuzzy Classifier-Based Penetration Testing for Web Applications

被引:10
|
作者
Alhassan, J. K. [1 ]
Misra, Sanjay [2 ]
Umar, A. [1 ]
Maskeliunas, Rytis [3 ]
Damasevicius, Robertas [3 ]
Adewumi, Adewole [2 ]
机构
[1] Fed Univ Technol, Minna, Nigeria
[2] Covenant Univ, Ota, Nigeria
[3] Kaunas Univ Technol, Kaunas, Lithuania
来源
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY & SYSTEMS (ICITS 2018) | 2018年 / 721卷
关键词
Vulnerabilities assessment; Penetration testing; Fuzzy classifier-based; Web applications;
D O I
10.1007/978-3-319-73450-7_10
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The biggest challenge of Web application is the inestimable losses arising from security flaws. Two approaches were advanced by a number of scholars to provide security to Web space. One of such approach is vulnerability assessment, which is a conscious effort to isolate, identify and recognize potentials vulnerabilities exploited by attackers. The second being the estimation and determination of level of risks/threats posed to Web applications by vulnerabilities obvious to the developer (or tester); this is generally referred to as penetration testing. Recently, there is Vulnerability Assessment and Penetration Testing (VAPT) that combined these two schemes to improve safety and effectively combat the menace of attackers on Web applications. This paper proposed Fuzzy Classifier-based Vulnerability and Assessment Testing (FCVAPT) model to provide security for sensitive data/information in Web applications. Cross Site Scripting (XSS) and Structured Query Language (SQL) injections were selected for evaluation of proposed FCVAPT model. FCVAPT model's classification performance for MSE, MAPE and RMSE were 33.33, 14.81% and 5.77% respectively. FCVAPT is considerably effective for detecting vulnerability and ascertaining the nature of threats/risks available to Web applications.
引用
收藏
页码:95 / 104
页数:10
相关论文
共 50 条
  • [21] Support Vector Shape: A Classifier-Based Shape Representation
    Hien Van Nguyen
    Porikli, Fatih
    IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2013, 35 (04) : 970 - 982
  • [22] Unsupervised data processing for classifier-based speech translator
    Ettelaie, Emil
    Georgiou, Panayiotis G.
    Narayanan, Shrikanth S.
    COMPUTER SPEECH AND LANGUAGE, 2013, 27 (02): : 438 - 454
  • [23] Gaussian Classifier-Based Evolutionary Strategy for Multimodal Optimization
    Dong, Wenyong
    Zhou, MengChu
    IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2014, 25 (06) : 1200 - 1216
  • [24] Multi-class Classifier-Based Adaboost Algorithm
    Kim, Tae-Hyun
    Park, Dong-Chul
    Woo, Dong-Min
    Jeong, Taikyeong
    Min, Soo-Young
    INTELLIGENT SCIENCE AND INTELLIGENT DATA ENGINEERING, ISCIDE 2011, 2012, 7202 : 122 - 127
  • [25] How much effort should be spent to detect fraudulent applications when engaged in classifier-based lending?
    Chong, Mimi
    Bravo, Cristian
    Davison, Matt
    INTELLIGENT DATA ANALYSIS, 2015, 19 : S87 - S101
  • [26] SQLi Penetration Testing of Financial Web Applications: Investigation of Bangladesh Region
    Farah, Tanjila
    Alain, Delwar
    Kabir, Alamgir
    Bhuiyan, Touhid
    2015 WORLD CONGRESS ON INTERNET SECURITY (WORLDCIS), 2015, : 146 - 151
  • [27] Classemes and Other Classifier-Based Features for Efficient Object Categorization
    Bergamo, Alessandro
    Torresani, Lorenzo
    IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2014, 36 (10) : 1988 - 2001
  • [28] A CLASSIFIER-BASED DECODING APPROACH FOR LARGE SCALE DISTRIBUTED CODING
    Viswanatha, Kumar
    Ramaswamy, Sharadh
    Saxena, Ankur
    Rose, Kenneth
    2011 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, 2011, : 1513 - 1516
  • [29] DFCEA: Deep Forest Classifier-Based Employee Attrition Prediction
    Tokmak, Mahmut
    ACTA INFOLOGICA, 2025,
  • [30] Neural Network Classifier-Based OPC With Imbalanced Training Data
    Choi, Suhyeong
    Shim, Seongbo
    Shin, Youngsoo
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2019, 38 (05) : 938 - 948