2020
DOI: 10.1504/ijguc.2020.105541
|View full text |Cite
|
Sign up to set email alerts
|

A methodology for automated penetration testing of cloud applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 0 publications
0
5
0
Order By: Relevance
“…Kamongi et al [9] offer a vulnerability assessment framework that uses an ontology to create a knowledge base populated with a wide range of vulnerabilities, e.g., Common Vulnerabilities and Exposures (CVE), Common Weakness Enumeration (CWE), Common Vulnerability Scoring System (CVSS), stored in the National Vulnerability Database (NVD). To obtain a preliminary evaluation of the security level provided by cloud applications, Casola et al [14] propose a methodology that takes into account the architecture of the applications and their potential security issues, such as threats, attacks, vulnerabilities and weaknesses.…”
Section: A Vulnerability Assessmentmentioning
confidence: 99%
“…Kamongi et al [9] offer a vulnerability assessment framework that uses an ontology to create a knowledge base populated with a wide range of vulnerabilities, e.g., Common Vulnerabilities and Exposures (CVE), Common Weakness Enumeration (CWE), Common Vulnerability Scoring System (CVSS), stored in the National Vulnerability Database (NVD). To obtain a preliminary evaluation of the security level provided by cloud applications, Casola et al [14] propose a methodology that takes into account the architecture of the applications and their potential security issues, such as threats, attacks, vulnerabilities and weaknesses.…”
Section: A Vulnerability Assessmentmentioning
confidence: 99%
“…While some automated tools are currently publicly available [35], numerous research efforts are poised to prospectively enhance future generations of testing automation tools. Automation techniques for testing Blockchain contracts [36], cloud applications [37,38], Internet of Things devices [39], WiFi networks [40], and web services [41][42][43][44] have been proposed, among others. Researchers have also developed vulnerability-specific testers, such as for SQL injection [45].…”
Section: Security Testing Automationmentioning
confidence: 99%
“…The attack is carried out to test a web application's security to generate recommendations to reduce the risk. Penetration testing is typically a human-driven procedure that requires deep knowledge of the possible attacks to carry out and the hacking tools that can be used to launch the tests [3].…”
Section: Introductionmentioning
confidence: 99%