Analysis of Security Testing Techniques

被引:6
|
作者
Bin Tauqeer, Omer [1 ]
Jan, Sadeeq [1 ]
Khadidos, Alaa Omar [2 ]
Khadidos, Adil Omar [3 ]
Khan, Fazal Qudus [3 ]
Khattak, Sana [1 ]
机构
[1] Univ Engn & Technol, Dept Comp Sci & IT, Natl Ctr Cyber Secur, Peshawar 25120, Pakistan
[2] King Abdulaziz Univ, Fac Comp & Informat Technol, Dept Informat Syst, Jeddah 21589, Saudi Arabia
[3] King Abdulaziz Univ, Fac Comp & Informat Technol, Dept Informat Technol, Jeddah 21589, Saudi Arabia
来源
关键词
Software testing; cyber-attacks; security testing; black-box testing; white-box testing; VULNERABILITY; TAXONOMY; ARCHITECTURE; GENERATION;
D O I
10.32604/iasc.2021.017260
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the past decades, a significant increase has been observed in cyberattacks on the web-based systems used for financial purposes. Such individual systems often contain security weaknesses, called vulnerabilities that can be exploited for malicious purposes. The exploitation of such vulnerabilities can result in disclosure and manipulation of sensitive data as well as have destructive effects. To protect such systems, security testing is required on a periodic basis. Various detection and assessment techniques have been suggested by developers and researchers to address these security issues. In this paper, we survey the contributions of academia in the field of security testing for software applications and communication systems. A comprehensive review and in-depth analysis of the existing literature testing approaches has been performed to analyze their effectiveness and applicability under various scenarios. Further, we discuss various techniques used for conducting various security assessments. We follow the widely used method by Kitchenham and Charters for conducting a comprehensive systematic literature review process. Also, we propose a taxonomy for security testing techniques consisting of three main categories (Identification, Testing, and Reporting) and 17 subcategories consisting of specific security testing techniques (e.g., Black-box testing, risk assessment). Further, we assign a distinctive category from our taxonomy to each published paper in the security testing area, based on the material presented/discussed in the paper.
引用
收藏
页码:291 / 306
页数:16
相关论文
共 50 条
  • [31] Comparative Analysis of Localization Techniques and Security Mechanisms in WSN
    Avareddy, Sudhakar
    Biradar, Rajashree, V
    2021 IEEE INTERNATIONAL CONFERENCE ON MOBILE NETWORKS AND WIRELESS COMMUNICATIONS (ICMNWC), 2021,
  • [32] Behaviour analysis techniques for supporting critical infrastructure security
    Hurst, William
    Merabti, Madjid
    Fergus, Paul
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURES, 2014, 10 (3-4) : 267 - 287
  • [33] Automated security analysis techniques in MANET routing protocols
    Mao L.
    Huang Y.
    1600, Science Press (43): : 56 - 61
  • [34] Requirements Capture and Comparative Analysis of Cloud Security Techniques
    Medhioub, Manel
    Hamdi, Mohamed
    Kim, Tai-Hoon
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2015, 8 (02): : 285 - 307
  • [35] SURVEYING SECURITY ANALYSIS TECHNIQUES IN MANET ROUTING PROTOCOLS
    Andel, Todd R.
    Yasinsac, Alec
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2007, 9 (04): : 70 - 84
  • [36] Security vulnerabilities: From analysis to detection and masking techniques
    Chen, S
    Xu, J
    Kalbarczyk, Z
    Iyer, RK
    PROCEEDINGS OF THE IEEE, 2006, 94 (02) : 407 - 418
  • [37] Security and Privacy in Business Processes: A Posteriori Analysis Techniques
    Strembeck, Mark
    Rinderle-Ma, Stefanie
    IT-INFORMATION TECHNOLOGY, 2013, 55 (06): : 247 - 253
  • [38] Security and Efficiency Analysis of One Time Password Techniques
    Tzemos, Ioannis
    Fournaris, Apostolos P.
    Sklavos, Nicolas
    20TH PAN-HELLENIC CONFERENCE ON INFORMATICS (PCI 2016), 2016,
  • [39] Security and Efficiency Analysis of Anti-jamming Techniques
    Prasadh, S. Kshipra
    Jindal, Sumit Kumar
    4TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS AND CONNECTED TECHNOLOGIES (ICIOTCT), 2019: INTERNET OF THINGS AND CONNECTED TECHNOLOGIES, 2020, 1122 : 251 - 259
  • [40] Techniques and Tools for Runtime Security Monitoring and Analysis of Microservices
    Castro, Jessica
    Laranjeiro, Nuno
    Vieira, Marco
    2023 53RD ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS - SUPPLEMENTAL VOLUME, DSN-S, 2023, : 191 - 193