Web Application Security Vulnerabilities Detection Approaches: a Systematic Mapping Study

被引:0
|
作者
Rafique, Sajjad [1 ]
Humayun, Mamoona [1 ]
Hamid, Bushra [1 ]
Abbas, Ansar [1 ]
Akhtar, Muhammad [1 ]
Iqbal, Kamil [1 ]
机构
[1] PMAS Arid Agr Univ, Univ Inst Informat Technol, Dept Comp Sci, Rawalpindi, Pakistan
关键词
Systematic mapping study; web application; security; vulnerability; State-of-the-art; SITE SCRIPTING VULNERABILITIES; ATTACKS; SERVICE;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Number of security vulnerabilities in web application has grown with the tremendous growth of web application in last two decades. As the domain of Web Applications is maturing, large number of empirical studies has been reported in web applications to address the solution of vulnerable web application. However, before advancing towards finding new approaches of web applications security vulnerability detection, there is a need to analyze and synthesize existing evidence based studies in web applications area. To do this, we have planned to conduct a systematic mapping study to view and report the state-of-the-art of empirical work in existing research of web applications. In this paper, we aimed at providing a description of mapping study for synthesizing the reported empirical research in the area of web applications security vulnerabilities detection approaches. The proposed solutions are mapped against: (1) the software development stages for which the solution has been proposed and (2) the web application vulnerabilities mapping according to OWASP Top 10 security vulnerabilities. To do this, existing literature has been surveyed using a systematic mapping study by phrasing two research questions. In the mapping study, a total of 41 studies dating from 1994 to 2014 were evaluated and mapped against the aforementioned categories. The outcome of this mapping study is current state-of-the-art of empirical research in web application area, strength and weaknesses of existing empirical work, best practices and possible directions for future research.
引用
收藏
页码:469 / 474
页数:6
相关论文
共 50 条
  • [1] Web API Security Vulnerabilities and Mitigation Mechanisms: A Systematic Mapping Study
    Alejandro Diaz-Rojas, Josue
    Octavio Ocharan-Hernandez, Jorge
    Carlos Perez-Arriaga, Juan
    Limon, Xavier
    2021 9TH INTERNATIONAL CONFERENCE IN SOFTWARE ENGINEERING RESEARCH AND INNOVATION (CONISOFT 2021), 2021, : 207 - 218
  • [2] A Study on Web Application Security and Detecting Security Vulnerabilities
    Kumar, Sandeep
    Mahajan, Renuka
    Kumar, Naresh
    Khatri, Sunil Kumar
    2017 6TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO), 2017, : 451 - 455
  • [3] Cyber Security Threats and Vulnerabilities: A Systematic Mapping Study
    Humayun, Mamoona
    Niazi, Mahmood
    Jhanjhi, N. Z.
    Alshayeb, Mohammad
    Mahmood, Sajjad
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2020, 45 (04) : 3171 - 3189
  • [4] Cyber Security Threats and Vulnerabilities: A Systematic Mapping Study
    Mamoona Humayun
    Mahmood Niazi
    NZ Jhanjhi
    Mohammad Alshayeb
    Sajjad Mahmood
    Arabian Journal for Science and Engineering, 2020, 45 : 3171 - 3189
  • [5] A New Framework of Security Vulnerabilities Detection in PHP Web Application
    Zhao, Jingling
    Gong, Rulin
    2015 9TH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING IMIS 2015, 2015, : 271 - 276
  • [6] Mapping Software Faults with Web Security Vulnerabilities
    Fonseca, Jose
    Vieira, Marco
    2008 IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS & NETWORKS WITH FTCS & DCC, 2008, : 257 - +
  • [7] Security Issues and Vulnerabilities in Web Application
    Anumotu, Sitara
    Jha, Kushagra
    Balhara, Amit
    Chawla, Pronika
    NEXT GENERATION OF INTERNET OF THINGS, 2023, 445 : 103 - 114
  • [8] A systematic mapping study of web application testing
    Garousi, Vahid
    Mesbah, Ali
    Betin-Can, Aysu
    Mirshokraie, Shabnam
    INFORMATION AND SOFTWARE TECHNOLOGY, 2013, 55 (08) : 1374 - 1396
  • [9] Systematic Mapping Study on Security Approaches in Secure Software Engineering
    Khan, Rafiq Ahmad
    Khan, Siffat Ullah
    Khan, Habib Ullah
    Ilyas, Muhammad
    IEEE ACCESS, 2021, 9 : 19139 - 19160
  • [10] Web Application Vulnerabilities Detection Techniques Survey
    Khochare, Nilesh
    Chalurkar, Satish
    Meshram, B. B.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2013, 13 (06): : 71 - 75