• Mi Re-Unir
    Búsqueda Avanzada
    JavaScript is disabled for your browser. Some features of this site may not work without it.
    Ver ítem 
    •   Inicio
    • RESULTADOS DE INVESTIGACIÓN
    • Artículos Científicos WOS y SCOPUS
    • Ver ítem
    •   Inicio
    • RESULTADOS DE INVESTIGACIÓN
    • Artículos Científicos WOS y SCOPUS
    • Ver ítem

    Combinatorial method with static analysis for source code security in web applications

    Autor: 
    Bermejo Higuera, Juan Ramón (1)
    ;
    Bermejo-Higuera, Javier (1)
    ;
    Sicilia, Juan Antonio (1)
    ;
    Sureda Riera, Tomás
    ;
    Argyros, Christopher I.
    ;
    Magreñán, Á. Alberto (1)
    Fecha: 
    2021
    Palabra clave: 
    benchmark; comparative methodology; security testing analysis; tools combination; weakness; web application; Scopus; WOS(2)
    Tipo de Ítem: 
    article
    URI: 
    https://reunir.unir.net/handle/123456789/12734
    DOI: 
    https://doi.org/10.32604/cmes.2021.017213
    Dirección web: 
    https://www.techscience.com/CMES/v129n2/44808
    Open Access
    Resumen:
    Security weaknesses in web applications deployed in cloud architectures can seriously affect its data confidentiality and integrity. The construction of the procedure utilized in the static analysis tools of source code security differs and therefore each tool finds a different number of each weakness type for which it is designed. To utilize the possible synergies different static analysis tools may process, this work uses a new method to combine several source codes aiming to investigate how to increase the performance of security weakness detection while reducing the number of false positives. Specifically, five static analysis tools will be combined with the designed method to study their behavior using an updated benchmark for OWASP Top Ten Security Weaknesses (OWASP TTSW). The method selects specific metrics to rank the tools for different criticality levels of web applications considering different weights in the ratios. The findings show that simply including more tools in a combination is not synonymous with better results; it depends on the specific tools included in the combination due to their different designs and techniques.
    Mostrar el registro completo del ítem
    Este ítem aparece en la(s) siguiente(s) colección(es)
    • Artículos Científicos WOS y SCOPUS

    Estadísticas de uso

    Año
    2012
    2013
    2014
    2015
    2016
    2017
    2018
    2019
    2020
    2021
    2022
    Vistas
    0
    0
    0
    0
    0
    0
    0
    0
    0
    0
    38
    Descargas
    0
    0
    0
    0
    0
    0
    0
    0
    0
    0
    0

    Ítems relacionados

    Mostrando ítems relacionados por Título, autor o materia.

    • Prevention and fighting against web attacks through anomaly detection technology. A systematic review 

      Sureda Riera, Tomás; Bermejo Higuera, Juan Ramón (1); Bermejo-Higuera, Javier (1); Martínez Herraiz, José-Javier; Sicilia, Juan Antonio (1) (Sustainability (Switzerland), 01/06/2020)
      Numerous techniques have been developed in order to prevent attacks on web servers. Anomaly detection techniques are based on models of normal user and application behavior, interpreting deviations from the established ...
    • Hybrid Security Assessment Methodology for Web Applications 

      Correa, Roddy A.; Bermejo Higuera, Juan Ramón (1); Bermejo-Higuera, Javier (1); Sicilia, Juan Antonio (1); Sánchez Rubio, Manuel (1); Magreñán, Á. Alberto (CMES-Computer Modeling in Engineering & Sciences, 2021)
      This study presents a methodology to evaluate and prevent security vulnerabilities issues for web applications. The analysis process is based on the use of techniques and tools that allow to perform security assessments ...
    • On Combining Static, Dynamic and Interactive Analysis Security Testing Tools to Improve OWASP Top Ten Security Vulnerability Detection in Web Applications 

      Mateo Tudela, Francesc (1); Bermejo Higuera, Juan Ramón (1); Bermejo-Higuera, Javier (1); Sicilia, Juan Antonio (1); Argyros, Michael I (Applied Sciences-Basel, 12/2020)
      The design of the techniques and algorithms used by the static, dynamic and interactive security testing tools differ. Therefore, each tool detects to a greater or lesser extent each type of vulnerability for which they ...

    Mi cuenta

    AccederRegistrar

    ¿necesitas ayuda?

    Manual de UsuarioAutorización TFG-M

    Listar

    todo Re-UnirComunidades y coleccionesPor fecha de publicaciónAutoresTítulosPalabras claveTipo documentoTipo de accesoEsta colecciónPor fecha de publicaciónAutoresTítulosPalabras claveTipo documentoTipo de acceso






    Aviso Legal Política de Privacidad Política de Cookies Cláusulas legales RGPD
    © UNIR - Universidad Internacional de La Rioja
     
    Aviso Legal Política de Privacidad Política de Cookies Cláusulas legales RGPD
    © UNIR - Universidad Internacional de La Rioja