Efficiency and Effectiveness of Web Application Vulnerability Detection Approaches: A Review

Author:

Zhang Bing1,Li Jingyue2,Ren Jiadong1,Huang Guoyan1

Affiliation:

1. School of Information Science and Engineering, Yanshan University, Hebei Province, China

2. Norwegian University of Science and Technology, Trondheim, Norway

Abstract

Most existing surveys and reviews on web application vulnerability detection (WAVD) approaches focus on comparing and summarizing the approaches’ technical details. Although some studies have analyzed the efficiency and effectiveness of specific methods, there is a lack of a comprehensive and systematic analysis of the efficiency and effectiveness of various WAVD approaches. We conducted a systematic literature review (SLR) of WAVD approaches and analyzed their efficiency and effectiveness. We identified 105 primary studies out of 775 WAVD articles published between January 2008 and June 2019. Our study identified 10 categories of artifacts analyzed by the WAVD approaches and 8 categories of WAVD meta-approaches for analyzing the artifacts. Our study’s results also summarized and compared the effectiveness and efficiency of different WAVD approaches on detecting specific categories of web application vulnerabilities and which web applications and test suites are used to evaluate the WAVD approaches. To our knowledge, this is the first SLR that focuses on summarizing the effectiveness and efficiencies of WAVD approaches. Our study results can help security engineers choose and compare WAVD tools and help researchers identify research gaps.

Funder

National Natural Science Foundation of China

Natural Science Foundation of Hebei Province P. R. China

Doctoral Foundation Program of Yanshan University

Publisher

Association for Computing Machinery (ACM)

Subject

General Computer Science,Theoretical Computer Science

Reference173 articles.

1. Web Application Vulnerabilities: A Survey

2. A survey on server-side approaches to securing web applications;Li Xiaowei;ACM Comput. Surv.,2014

Cited by 7 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Navigating Web Application Security: A Survey of Vulnerabilities and Detection Solutions;2023 IEEE 64th International Scientific Conference on Information Technology and Management Science of Riga Technical University (ITMS);2023-10-05

2. DetAC: Approach to Detect Access Control Vulnerability in Web Application Based on Sitemap Model with Global Information Representation;International Journal of Software Engineering and Knowledge Engineering;2023-08-31

3. An O-MAPPO scheme for joint computation offloading and resources allocation in UAV assisted MEC systems;Computer Communications;2023-08

4. Efficient consensus algorithm based on improved DPoS in UAV-assisted mobile edge computing;Computer Communications;2023-07

5. IT/OT Convergence in Industry 4.0 : Risks and Analisy of the Problems;2023 18th Iberian Conference on Information Systems and Technologies (CISTI);2023-06-20

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3