M. Aljabri, Maryam M. Aldossary, Noor Al-Homeed, Bushra Alhetelah, Malek Althubiany, Ohoud F. Alotaibi, Sara Alsaqer
{"title":"Testing and Exploiting Tools to Improve OWASP Top Ten Security Vulnerabilities Detection","authors":"M. Aljabri, Maryam M. Aldossary, Noor Al-Homeed, Bushra Alhetelah, Malek Althubiany, Ohoud F. Alotaibi, Sara Alsaqer","doi":"10.1109/CICN56167.2022.10008360","DOIUrl":null,"url":null,"abstract":"In many different sorts of businesses, including public and private, government, critical infrastructures, etc., web apps have grown recently. Therefore, securing web applications is a major concern to protect businesses from loss and unauthorized access to sensitive information. Developers use vulnerable thirdparty modules or components or create programming security flaws themselves and occasionally work with tight budgets. These situations frequently cause people to overlook a crucial aspect of development life cycle security. This paper studies and tests the currently available web security and exploitation tools of OWASP's top ten security vulnerabilities. The main aim of this paper is to improve the detection of OWASP's top ten security vulnerabilities by proposing an exploitation and detection tool that combined features of the tools that has been tested in the paper.","PeriodicalId":287589,"journal":{"name":"2022 14th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 14th International Conference on Computational Intelligence and Communication Networks (CICN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CICN56167.2022.10008360","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
In many different sorts of businesses, including public and private, government, critical infrastructures, etc., web apps have grown recently. Therefore, securing web applications is a major concern to protect businesses from loss and unauthorized access to sensitive information. Developers use vulnerable thirdparty modules or components or create programming security flaws themselves and occasionally work with tight budgets. These situations frequently cause people to overlook a crucial aspect of development life cycle security. This paper studies and tests the currently available web security and exploitation tools of OWASP's top ten security vulnerabilities. The main aim of this paper is to improve the detection of OWASP's top ten security vulnerabilities by proposing an exploitation and detection tool that combined features of the tools that has been tested in the paper.