Analysis of Security Testing Techniques

被引:6
|
作者
Bin Tauqeer, Omer [1 ]
Jan, Sadeeq [1 ]
Khadidos, Alaa Omar [2 ]
Khadidos, Adil Omar [3 ]
Khan, Fazal Qudus [3 ]
Khattak, Sana [1 ]
机构
[1] Univ Engn & Technol, Dept Comp Sci & IT, Natl Ctr Cyber Secur, Peshawar 25120, Pakistan
[2] King Abdulaziz Univ, Fac Comp & Informat Technol, Dept Informat Syst, Jeddah 21589, Saudi Arabia
[3] King Abdulaziz Univ, Fac Comp & Informat Technol, Dept Informat Technol, Jeddah 21589, Saudi Arabia
来源
关键词
Software testing; cyber-attacks; security testing; black-box testing; white-box testing; VULNERABILITY; TAXONOMY; ARCHITECTURE; GENERATION;
D O I
10.32604/iasc.2021.017260
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the past decades, a significant increase has been observed in cyberattacks on the web-based systems used for financial purposes. Such individual systems often contain security weaknesses, called vulnerabilities that can be exploited for malicious purposes. The exploitation of such vulnerabilities can result in disclosure and manipulation of sensitive data as well as have destructive effects. To protect such systems, security testing is required on a periodic basis. Various detection and assessment techniques have been suggested by developers and researchers to address these security issues. In this paper, we survey the contributions of academia in the field of security testing for software applications and communication systems. A comprehensive review and in-depth analysis of the existing literature testing approaches has been performed to analyze their effectiveness and applicability under various scenarios. Further, we discuss various techniques used for conducting various security assessments. We follow the widely used method by Kitchenham and Charters for conducting a comprehensive systematic literature review process. Also, we propose a taxonomy for security testing techniques consisting of three main categories (Identification, Testing, and Reporting) and 17 subcategories consisting of specific security testing techniques (e.g., Black-box testing, risk assessment). Further, we assign a distinctive category from our taxonomy to each published paper in the security testing area, based on the material presented/discussed in the paper.
引用
收藏
页码:291 / 306
页数:16
相关论文
共 50 条
  • [1] Testing Techniques for Hardware Security
    Majzoobi, Mehrdad
    Koushanfar, Farinaz
    Potkonjak, Miodrag
    2008 IEEE INTERNATIONAL TEST CONFERENCE, VOLS 1 AND 2, PROCEEDINGS, 2008, : 816 - +
  • [2] Applying Security Testing Techniques to Automotive Engineering*
    Pekaric, Irdin
    Sauerwein, Clemens
    Felderer, Michael
    14TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2019), 2019,
  • [3] Red-team application security testing - Testing techniques designed to expose security bugs
    Thompson, HH
    Chase, SG
    DR DOBBS JOURNAL, 2003, 28 (11): : 18 - +
  • [4] Analysis techniques for information security
    Datta, Anupam
    Jha, Somesh
    Li, Ninghui
    Melski, David
    Reps, Thomas
    Synthesis Lectures on Information Security, Privacy, and Trust, 2010, 2 (01): : 1 - 164
  • [5] A Survey of Security Testing Techniques for Deep Learning Frameworks
    Li, Hanqing
    Li, Xiang
    Nie, Yuanping
    Tian, Jianwen
    2024 9TH INTERNATIONAL CONFERENCE ON SIGNAL AND IMAGE PROCESSING, ICSIP, 2024, : 404 - 415
  • [6] Security Testing Methods and Techniques of Industrial Control Devices
    Zhao, Wei
    Xie, Feng
    Peng, Yong
    Gao, Yang
    Han, Xuefeng
    Gao, Haihui
    Wang, Dejin
    2013 NINTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2013), 2013, : 433 - 436
  • [7] Application of Clustering Techniques in a Network Security Testing System
    Corral, Guiomar
    Golobardes, Elisabet
    Andreu, Oriol
    Serra, Isard
    Maluquer, Elisabet
    Martinez, Angel
    ARTIFICIAL INTELLIGENCE RESEARCH AND DEVELOPMENT, 2005, 131 : 157 - 164
  • [8] Analysis of various testing techniques
    Kaur, Kamaldeep
    Khatri, Sunil Kumar
    Datta, Rattan
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2014, 5 (03) : 276 - 290
  • [9] Comparison of Safety and Security Analysis Techniques
    Cioroaica, Emilia
    Kar, Smruti Ranjan
    Sorokos, Ioannis
    14TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE IN SECURITY FOR INFORMATION SYSTEMS AND 12TH INTERNATIONAL CONFERENCE ON EUROPEAN TRANSNATIONAL EDUCATIONAL (CISIS 2021 AND ICEUTE 2021), 2022, 1400 : 234 - 242
  • [10] Security Analysis of Scan Obfuscation Techniques
    Sao, Yogendra
    Ali, Sk. Subidh
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 2842 - 2855