2017
DOI: 10.1155/2017/6158107
|View full text |Cite
|
Sign up to set email alerts
|

Performance-Based Comparative Assessment of Open Source Web Vulnerability Scanners

Abstract: The widespread adoption of web vulnerability scanners and the differences in the functionality provided by these tool-based vulnerability detection approaches increase the demand for testing their detection effectiveness. Despite the advantages of dynamic testing approaches, the literature lacks studies that systematically evaluate the performance of open source web vulnerability scanners. The main objectives of this study are to assess the performance of open source scanners from multiple perspectives and to … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0
2

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 27 publications
(18 citation statements)
references
References 30 publications
(46 reference statements)
0
13
0
2
Order By: Relevance
“…Alsaleh et al 67 examined four open-source scanners, finding similar detection rates for all four. More recently, Sagar et al 7 evaluated the vulnerability detection capability of three other open-source WVSs (w3af, Skipfish, and OWASP ZAP) on the DVWA, concluding that OWASP ZAP performed better than the other scanning tools.…”
Section: Background and Related Workmentioning
confidence: 91%
“…Alsaleh et al 67 examined four open-source scanners, finding similar detection rates for all four. More recently, Sagar et al 7 evaluated the vulnerability detection capability of three other open-source WVSs (w3af, Skipfish, and OWASP ZAP) on the DVWA, concluding that OWASP ZAP performed better than the other scanning tools.…”
Section: Background and Related Workmentioning
confidence: 91%
“…Passive scanning technology is to send the traffic generated by our active browsing web pages to the passive scanner for scanning. The usual way is to set up a traffic agent to forward all the traffic to the passive scanner [2].…”
Section: Passive Scanning Technologymentioning
confidence: 99%
“…In the work [57], a comprehensive evaluation is performed on a set of open source DAST tools. The results of this comparative evaluation highlighted variations in the effectiveness of security vulnerability detection and indicated that there are correlations between different performance properties of these tools (e.g., scanning speed, crawler coverage, and number of detected vulnerabilities).…”
Section: Dast Tools Comparisons Studiesmentioning
confidence: 99%