2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC) 2018
DOI: 10.1109/pdgc.2018.8745996
|View full text |Cite
|
Sign up to set email alerts
|

Evaluation of Static Web Vulnerability Analysis Tools

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0
1

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(4 citation statements)
references
References 12 publications
0
3
0
1
Order By: Relevance
“…A test environment was established using the DVWA [ 26 ] web application vulnerability analysis tool, using the Burp Suite tool to pass the XSS and SQL injection payloads and capture the traffic in the middle proxy. The dataset generation steps are shown in Figure 6 .…”
Section: Methodsmentioning
confidence: 99%
“…A test environment was established using the DVWA [ 26 ] web application vulnerability analysis tool, using the Burp Suite tool to pass the XSS and SQL injection payloads and capture the traffic in the middle proxy. The dataset generation steps are shown in Figure 6 .…”
Section: Methodsmentioning
confidence: 99%
“…Anagandula et al [25] analysed black-box web application scanners in detecting SQL injection and XSS vulnerabilities. Tyagi et al [26] evaluated two static web application vulnerability analyses tools, OWASP WAP and RIPS using the deliberately vulnerable web application and found that OWASP WAP offers better results over RIPS. Anhar and Suryanto [27] evaluated web application vulnerability scanners such as OWASP ZAP, Wapiti, Arachni, and Burp Suite Professional.…”
Section: Existing Vulnerability Scannersmentioning
confidence: 99%
“…Ukuran ordinal adalah angka yang diberikan, angka tersebut mengandung arti tingkatan. Nominal angka 0 digunakan untuk mengurutkan objek dari tingkatan terendah sampai tertinggi [13] [14].…”
Section: Hasil Dan Pembahasanunclassified