2019
DOI: 10.14569/ijacsa.2019.0101118
|View full text |Cite
|
Sign up to set email alerts
|

Vulnerability Analysis of E-voting Application using Open Web Application Security Project (OWASP) Framework

Abstract: This paper reports on security concerns in the Evoting used for the election of village heads. Analysis of the system and server uses two different tools to determine the accuracy of scanning vulnerabilities based on the OWASP Framework. We reported that the results of the scanning using the ZAP tool got vulnerability information with the following risk level, one high level, three medium levels, and eleven low levels. The Arachni tool got vulnerability information with the following risk level, one high level… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 17 publications
(19 reference statements)
0
2
0
Order By: Relevance
“…Acunetix and NetSparker showed lower false positive rates than OWASP-ZAP, while tests utilizing the OWASP-ZAP tools had stronger vulnerability detection and were ranked in the open source category [7]. Based on the amount of risk, vulnerability information can be obtained from scan results using a vulnerability scanner [8]. Then, in order to enhance accuracy, testing utilizing the OWASP technique, which makes use of a vulnerability scanning tool, also needs to be configured [9].…”
Section: Introductionmentioning
confidence: 99%
“…Acunetix and NetSparker showed lower false positive rates than OWASP-ZAP, while tests utilizing the OWASP-ZAP tools had stronger vulnerability detection and were ranked in the open source category [7]. Based on the amount of risk, vulnerability information can be obtained from scan results using a vulnerability scanner [8]. Then, in order to enhance accuracy, testing utilizing the OWASP technique, which makes use of a vulnerability scanning tool, also needs to be configured [9].…”
Section: Introductionmentioning
confidence: 99%
“…Despite majority of organizations attempting to protect their systems using Secure Sockets Layer (SSL) and firewalls, they do not provide adequate protection against web system intrusion. This is because website access is public [30], [31], [32], [33], [34]. Web-based systems' backend data can always be directly accessed and since majority of them are customized, their degrees of testing are lower compared to off-shelf applications [35].…”
Section: Introductionmentioning
confidence: 99%