Please use this identifier to cite or link to this item: http://10.1.7.192:80/jspui/handle/123456789/4896
Full metadata record
DC FieldValueLanguage
dc.contributor.authorBuch, Phenilkumar-
dc.date.accessioned2014-08-25T07:58:21Z-
dc.date.available2014-08-25T07:58:21Z-
dc.date.issued2014-06-01-
dc.identifier.urihttp://hdl.handle.net/123456789/4896-
dc.description.abstractWeb applications have become very common and the role of web application security has garnered much attention as well. The number of sensitive online resources is increasing day by day, and so is the need to protect these resources. Many web applications are developed without taking care of security aspects and hence they are prone to attacks. Although it is easy to understand and avoid many web vulnerabilities, security awareness is what many web developers lack. Consequently, many web applications exist on the Internet that are vulnerable. For an organisation to identify if their applications are susceptible to attacks, it must perform regularly scheduled penetration testing, vulnerability assessment and updation of their applications. The major security vulnerabilities that exist in today's web applications include SQL injection, Cross Site Scripting and a few others. These vulnerabilities can be detected automatically. Various methods are used for detection of these vulnerabilities and each of these methods have their own limitations. Black box web application vulnerability scanners are tools that are utilized to determine vulnerabilities in web applications. The vulnerability scanners interact with a web application in a way that is similar to the way in which regular users do. However, various sections of web applications must be accessed and tested by these tools, and as big a part of the application needs to be crawled as possible. An assessment of various black box web vulnerability scanners along with the scanner developed for current dissertation is also presented here. The evaluation process is composed of testing a scanning technique for different categories of web application vulnerabilities. The tests are performed on various realistic web applications with known vulnerabilities. The results of the evaluation show that the task of crawling is equally important to the overall effectiveness of a scanner as the various vulnerability specific detection algorithms. Many vulnerabilities are not detected by the scanners, and thus further research is warranted to better the automated detection of web application vulnerabilities.en_US
dc.publisherInstitute of Technologyen_US
dc.relation.ispartofseries12MCEI36;-
dc.subjectComputer 2012en_US
dc.subjectProject Report 2012en_US
dc.subjectComputer Project Reporten_US
dc.subjectProject Reporten_US
dc.subject12MCEIen_US
dc.subject12MCEI36en_US
dc.subjectINSen_US
dc.subjectINS 2012en_US
dc.subjectCE (INS)en_US
dc.titleWeb Application Vulnerability Scanneren_US
dc.typeDissertationen_US
Appears in Collections:Dissertation, CE (INS)

Files in This Item:
File Description SizeFormat 
12MCEI36.pdf12MCEI361.51 MBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.