Analysis of Security Testing Techniques

被引:6
|
作者
Bin Tauqeer, Omer [1 ]
Jan, Sadeeq [1 ]
Khadidos, Alaa Omar [2 ]
Khadidos, Adil Omar [3 ]
Khan, Fazal Qudus [3 ]
Khattak, Sana [1 ]
机构
[1] Univ Engn & Technol, Dept Comp Sci & IT, Natl Ctr Cyber Secur, Peshawar 25120, Pakistan
[2] King Abdulaziz Univ, Fac Comp & Informat Technol, Dept Informat Syst, Jeddah 21589, Saudi Arabia
[3] King Abdulaziz Univ, Fac Comp & Informat Technol, Dept Informat Technol, Jeddah 21589, Saudi Arabia
来源
关键词
Software testing; cyber-attacks; security testing; black-box testing; white-box testing; VULNERABILITY; TAXONOMY; ARCHITECTURE; GENERATION;
D O I
10.32604/iasc.2021.017260
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the past decades, a significant increase has been observed in cyberattacks on the web-based systems used for financial purposes. Such individual systems often contain security weaknesses, called vulnerabilities that can be exploited for malicious purposes. The exploitation of such vulnerabilities can result in disclosure and manipulation of sensitive data as well as have destructive effects. To protect such systems, security testing is required on a periodic basis. Various detection and assessment techniques have been suggested by developers and researchers to address these security issues. In this paper, we survey the contributions of academia in the field of security testing for software applications and communication systems. A comprehensive review and in-depth analysis of the existing literature testing approaches has been performed to analyze their effectiveness and applicability under various scenarios. Further, we discuss various techniques used for conducting various security assessments. We follow the widely used method by Kitchenham and Charters for conducting a comprehensive systematic literature review process. Also, we propose a taxonomy for security testing techniques consisting of three main categories (Identification, Testing, and Reporting) and 17 subcategories consisting of specific security testing techniques (e.g., Black-box testing, risk assessment). Further, we assign a distinctive category from our taxonomy to each published paper in the security testing area, based on the material presented/discussed in the paper.
引用
收藏
页码:291 / 306
页数:16
相关论文
共 50 条
  • [41] ANALYSIS OF THE USE OF NEUTRALISATION TECHNIQUES IN VIOLATIONS OF INFORMATION SECURITY
    Matotek, Darko
    EKONOMSKI VJESNIK, 2012, 25 (01): : 182 - 193
  • [42] Transformer testing using circuit analysis techniques
    Penrose, HW
    ELECTRICAL INSULATION CONFERENCE AND ELECTRICAL MANUFACTURING & COIL WINDING CONFERENCE, PROCEEDINGS, 2001, : 639 - 641
  • [43] An analysis of power reduction techniques in scan testing
    Saxena, J
    Butler, KM
    Whetsel, L
    INTERNATIONAL TEST CONFERENCE 2001, PROCEEDINGS, 2001, : 670 - 677
  • [44] Portable testing techniques for the analysis of drug materials
    Alonzo, Morgan
    Alder, Rhiannon
    Clancy, Laura
    Fu, Shanlin
    WILEY INTERDISCIPLINARY REVIEWS: FORENSIC SCIENCE, 2022, 4 (06):
  • [45] Comparative Analysis on Techniques for Big Data Testing
    Abidin, Adiba
    Lal, Divya
    Garg, Naveen
    Deep, Vikas
    2016 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY (INCITE) - NEXT GENERATION IT SUMMIT ON THE THEME - INTERNET OF THINGS: CONNECT YOUR WORLDS, 2016,
  • [46] Testing Techniques and Analysis of SQL Injection Attacks
    Maraj, Arianit
    Rogova, Ermir
    Jakupi, Genc
    Grajqevci, Xheladin
    PROCEEDINGS OF 2017 2ND INTERNATIONAL CONFERENCE ON KNOWLEDGE ENGINEERING AND APPLICATIONS (ICKEA), 2017, : 55 - 59
  • [47] A Study of Outlier Analysis Techniques for Delay Testing
    Wu, Sean H.
    Drmanac, Dragoljub
    Wang, Li-C.
    2008 IEEE INTERNATIONAL TEST CONFERENCE, VOLS 1 AND 2, PROCEEDINGS, 2008, : 1 - 10
  • [48] A Dynamic Analysis Security Testing Infrastructure for Internet of Things
    Wang, Yong
    Kjerstad, Elliot
    Belisario, Bailey
    2020 SIXTH INTERNATIONAL CONFERENCE ON MOBILE AND SECURE SERVICES (MOBISECSERV)), 2020,
  • [49] Security Analysis of VoIP Networks Through Penetration Testing
    Ochang, Paschal A.
    Irving, Philip
    INFORMATION AND SOFTWARE TECHNOLOGIES (ICIST 2017), 2017, 756 : 601 - 610
  • [50] Security Assurance with Program Path Analysis and Metamorphic Testing
    Dong, Guowei
    Quo, Tao
    Zhang, Puhan
    PROCEEDINGS OF 2013 IEEE 4TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS), 2012, : 193 - 197