An automated approach to generate Web applications attack scenarios

被引:2
|
作者
Alata, Eric [1 ]
Kaaniche, Mohamed
Nicomette, Vincent
Akrout, Rim
机构
[1] CNRS, LAAS, 7 Ave Colonel Roche, F-31400 Toulouse, France
关键词
Security; vulnerability scanner; vulnerability detection algorithm;
D O I
10.1109/LADC.2013.22
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Web applications have become one of the most popular targets of attacks during the last years. Therefore it is important to identify the vulnerabilities of such applications and to remove them to prevent potential attacks. This paper presents an approach that is aimed at the vulnerability assessment of Web applications following a black-box approach. The objective is to detect vulnerabilities in Web applications and their dependencies and to generate attack scenarios that reflect such dependencies. Our approach aims to move a step forward toward the automation of this process. The paper presents the main concepts behind the proposed approach and an example that illustrates the main steps of the algorithm leading to the identification of the vulnerabilities of a Web application and their dependencies.
引用
收藏
页码:78 / 85
页数:8
相关论文
共 50 条
  • [1] An automated approach to quality aware web applications
    Ruiz, A
    Corchuelo, R
    Durán, A
    [J]. ENTERPRISE INFORMATION SYSTEMS IV, 2002, : 237 - 242
  • [2] DACA: Automated Attack Scenarios and Dataset Generation
    Korving, Frank
    Vaarandi, Risto
    [J]. PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY ICCWS, 2023, : 550 - 558
  • [3] Efficient Fingerprinting Attack on Web Applications: An Adaptive Symbolization Approach
    Yang, Xue
    Xu, Jian
    Li, Guojun
    [J]. ELECTRONICS, 2023, 12 (13)
  • [4] An automated black box approach for web vulnerability identification and attack scenario generation
    Akrout, Rim
    Alata, Eric
    Kaaniche, Mohamed
    Nicomette, Vincent
    [J]. Journal of the Brazilian Computer Society, 2014, 20 (01) : 1 - 16
  • [5] An Evolutionary Approach to Generate Solutions for Conflict Scenarios
    Carneiro, Davide
    Analide, Cesar
    Novais, Paulo
    Neves, Jose
    [J]. HYBRID ARTIFICIAL INTELLIGENT SYSTEMS, PT I, 2012, 7208 : 440 - 451
  • [6] A Novel Approach to Generate Hourly Photovoltaic Power Scenarios
    Schlueter, Stephan
    Menz, Fabian
    Kojic, Milena
    Mitic, Petar
    Hanic, Aida
    [J]. SUSTAINABILITY, 2022, 14 (08)
  • [7] A novel approach for message authentication to prevent parameter tampering attack in web applications
    Dalai, Asish Kumar
    Panigrahy, Saroj Kumar
    Jena, Sanjay Kumar
    [J]. INTERNATIONAL CONFERENCE ON MODELLING OPTIMIZATION AND COMPUTING, 2012, 38 : 1495 - 1500
  • [8] Vulnerability & Attack Injection for Web Applications
    Fonseca, Jose
    Vieiraz, Marco
    Madeira, Henrique
    [J]. 2009 IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS & NETWORKS (DSN 2009), 2009, : 93 - +
  • [9] A Formal Approach for the Reconstruction of Potential Attack Scenarios
    Rekhis, Slim
    Boudriga, Noureddine
    [J]. 2008 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES: FROM THEORY TO APPLICATIONS, VOLS 1-5, 2008, : 2559 - 2564
  • [10] Automated testing for web applications
    Selvakumar, M.
    [J]. Dr. Dobb's Journal, 1999, 24 (05):