An automated approach to generate Web applications attack scenarios

被引:2
|
作者
Alata, Eric [1 ]
Kaaniche, Mohamed
Nicomette, Vincent
Akrout, Rim
机构
[1] CNRS, LAAS, 7 Ave Colonel Roche, F-31400 Toulouse, France
关键词
Security; vulnerability scanner; vulnerability detection algorithm;
D O I
10.1109/LADC.2013.22
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Web applications have become one of the most popular targets of attacks during the last years. Therefore it is important to identify the vulnerabilities of such applications and to remove them to prevent potential attacks. This paper presents an approach that is aimed at the vulnerability assessment of Web applications following a black-box approach. The objective is to detect vulnerabilities in Web applications and their dependencies and to generate attack scenarios that reflect such dependencies. Our approach aims to move a step forward toward the automation of this process. The paper presents the main concepts behind the proposed approach and an example that illustrates the main steps of the algorithm leading to the identification of the vulnerabilities of a Web application and their dependencies.
引用
收藏
页码:78 / 85
页数:8
相关论文
共 50 条
  • [41] Automated extraction of database interactions in web applications
    Ngo, Minh Ngoc
    Tan, Hee Beng Kuan
    Trinh, Doanh
    14TH IEEE INTERNATIONAL CONFERENCE ON PROGRAM COMPREHENSION (ICPC 2006), PROCEEDINGS, 2006, : 117 - +
  • [42] Automated acceptance testing of JavaScript web applications
    Negara, N. (negara@ualberta.ca), 2012, IEEE Computer Society
  • [43] Automated Driver Generation for Analysis of Web Applications
    Tkachuk, Oksana
    Rajan, Sreeranga
    FUNDAMENTAL APPROACHES TO SOFTWARE ENGINEERING, 2011, 6603 : 326 - 340
  • [44] Automated oracle comparators for testing web applications
    Sprenkle, Sara
    Pollock, Lori
    Esquivel, Holly
    Hazelwood, Barbara
    Ecott, Stacey
    ISSRE 2007: 18TH IEEE INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING, PROCEEDINGS, 2007, : 117 - +
  • [45] WebCAD : Generic approach to web-enabled execution of automated tasks of multiple CAD applications
    Durga, P. Shanmugapriya
    Shunmugam, A. Kanaga
    Binoop, P. V.
    Tamilselvan, T.
    PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON ICT IN BUSINESS INDUSTRY & GOVERNMENT (ICTBIG), 2016,
  • [46] A Lightweight Semi-automated Acceptance Test-Driven Development Approach for Web Applications
    Clerissi, Diego
    Leotta, Maurizio
    Reggio, Gianna
    Ricca, Filippo
    WEB ENGINEERING (ICWE 2016), 2016, 9671 : 593 - 597
  • [47] BCW attack scenarios
    Wilkening, DA
    NEW TERROR: FACING THE THREAT OF BIOLOGICAL AND CHEMICAL WEAPONS, 1999, : 76 - 114
  • [48] How to Attack and Generate Honeywords
    Wang, Ding
    Zou, Yunkai
    Dong, Qiying
    Song, Yuanming
    Huang, Xinyi
    43RD IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2022), 2022, : 966 - 983
  • [49] An adaptive approach to handle DoS attack for web services
    Im, EG
    Song, YH
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2005, 3495 : 634 - 635
  • [50] An automated approach to Semantic Web Services Mediation
    Dietze, Stefan
    Gugliotta, Alessio
    Domingue, John
    Yu, Hong Qing
    Mrissa, Michael
    SERVICE ORIENTED COMPUTING AND APPLICATIONS, 2010, 4 (04) : 261 - 275