Web Application Vulnerability Scanner

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

VmiCVS: Cloud Vulnerability Scanner

Every service that runs in cloud systems comes with its own set of vulnerabilities. It is important to detect and assess those vulnerabilities to provide seamless and secure service to the users. Various scanners such as Port scanner, Network scanner, Web application security scanner, Database security scanner, Host based vulnerability scanner etc provide security assessment. But these scanners...

متن کامل

INVUS: INtelligent VUlnerability Scanner

This paper presents a new vulnerability scanning model named as INVUS, which contains aspects of both network and host-based vulnerability scanners. INVUS model has client/server architecture and provides an option to repair the found vulnerabilities by working with the firewall.

متن کامل

A Survey on Security Properties and Web Application Scanner

Web application is one of the most powerful communication channel and service providers for information delivery over internet today. Open Web Application Security Project is the top 10 vulnerability list that resulted more number of attacks in the websites in the few years. The main objective is to find out the effectiveness in detecting the vulnerability in web application. The main motive of...

متن کامل

Enemy of the State: A State-Aware Black-Box Web Vulnerability Scanner

Black-box web vulnerability scanners are a popular choice for finding security vulnerabilities in web applications in an automated fashion. These tools operate in a point-and-shootmanner, testing any web application— regardless of the server-side language—for common security vulnerabilities. Unfortunately, black-box tools suffer from a number of limitations, particularly when interacting with c...

متن کامل

A String Constraint Solver for Detecting Web Application Vulnerability

Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically executing the target system and constructing constraints for matching path conditions and attack patterns. Clearly, the constraint solving technique is the key to the above research. This paper presents Simple Linear String...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal for Research in Applied Science and Engineering Technology

سال: 2019

ISSN: 2321-9653

DOI: 10.22214/ijraset.2019.6066