2020
DOI: 10.1007/978-3-030-40417-8_8
|View full text |Cite
|
Sign up to set email alerts
|

The Cyber Threats Analysis for Web Applications Security in Industry 4.0

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(9 citation statements)
references
References 9 publications
0
7
0
Order By: Relevance
“…Modern industry is integrated with the Internet by Web applications, used for customer rights management, products online monitoring, and updating or implementing supply chains. Such applications are gateways for different attacks, annually reported by OWASP, NIST, or MITRE [55]. The spectrum of most frequent threats involved in using web applications evolves in time, extending beyond a set of about 30 methods [56].…”
Section: ) Threats and Vulnerabilitiesmentioning
confidence: 99%
“…Modern industry is integrated with the Internet by Web applications, used for customer rights management, products online monitoring, and updating or implementing supply chains. Such applications are gateways for different attacks, annually reported by OWASP, NIST, or MITRE [55]. The spectrum of most frequent threats involved in using web applications evolves in time, extending beyond a set of about 30 methods [56].…”
Section: ) Threats and Vulnerabilitiesmentioning
confidence: 99%
“…According to [ 25 ] improper authentication allows malicious users to access sensitive data through dictionary, birthday and brute force attacks focused on in [ 75 , 76 ]. Dictionary attacks are only possible due to the improper setup of authentication, allowing attackers to perform countless login tries with every word from a word list.…”
Section: Review Of Selected Studiesmentioning
confidence: 99%
“…Vulnerabilities related to web services and applications are usually associated with coding errors that enable destructive or non-destructive attacks. Vulnerabilities that allow malicious users to execute unwanted scripts [25], such as Insecure Deserialization, XML External Entities (XXE), Cross-site Request Forgery (CSRF), Cross-site Scripting (XSS) and SQL Injection in a web application are the most common. Insecure Deserialization occurs when user-controllable data are deserialized by a website, allowing attackers to manipulate serialized objects to pass harmful data to the application code.…”
Section: Web Applicationmentioning
confidence: 99%
“…The OWASP Top Ten project brings together the most important vulnerability categories. There are several works that confirm web applications tested did not pass the OWASP Top Ten project [2][3][4]. Web applications in organizations and companies connected through the Internet and Intranets imply that they are used to develop any type of business, but at the same time they have become a valuable target of a great variety of attacks by exploiting the design, implementation or operation vulnerabilities, included in the OWASP Top Ten project, to obtain some type of economic advantage, privileged information, denial, extortion, etc.…”
Section: Web Applications Securitymentioning
confidence: 99%
“…Taking into account statistics of security vulnerabilities reported by several studies [2][3][4], the most adequate test bench for using SAST, DAST and IAST tools is OWASP benchmark project [14]. This benchmark is an open source web application in Java language deployed in Apache Tomcat.…”
Section: Benchmark Selectionmentioning
confidence: 99%