Skip to main content
Erschienen in: Automatic Control and Computer Sciences 8/2019

01.12.2019

Detection of Security Threats to Modern Websites

verfasst von: D. V. Ivanov, D. A. Moskvin, G. S. Kubrin

Erschienen in: Automatic Control and Computer Sciences | Ausgabe 8/2019

Einloggen, um Zugang zu erhalten

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract—

The problem of the dynamic analysis of website security using asynchronous content loading technologies is considered. The possibility of solving the problem of detecting scan input vectors using the technology of interpreting JavaScript scripts is considered.
Literatur
1.
Zurück zum Zitat Statistics of the number of websites on the Internet. https://news.netcraft.com/archives/2018/02/13/february-2018-web-server-survey.html. Statistics of the number of websites on the Internet. https://​news.​netcraft.​com/​archives/​2018/​02/​13/​february-2018-web-server-survey.​html.​
3.
Zurück zum Zitat Demidov, R., Pechenkin, A., and Zegzhda, P., Integer overflow vulnerabilities detection in software binary code, Proceedings of the 10th International Conference on Security of Information and Networks. ACM, 2017. Demidov, R., Pechenkin, A., and Zegzhda, P., Integer overflow vulnerabilities detection in software binary code, Proceedings of the 10th International Conference on Security of Information and Networks. ACM, 2017.
4.
Zurück zum Zitat Murugesan, S., Understanding Web 2.0, IT Prof. Mag., 2007, vol. 9, no. 4, p. 34.CrossRef Murugesan, S., Understanding Web 2.0, IT Prof. Mag., 2007, vol. 9, no. 4, p. 34.CrossRef
5.
Zurück zum Zitat Anderson, P., What Is Web 2.0?: Ideas, Technologies and Implications for Education, JISC Technical Report, 2007. http://www.jisc.ac.uk/media/documents/techwatch/tsw0701b.pdf. Anderson, P., What Is Web 2.0?: Ideas, Technologies and Implications for Education, JISC Technical Report, 2007. http://​www.​jisc.​ac.​uk/​media/​documents/​techwatch/​tsw0701b.​pdf.​
6.
Zurück zum Zitat Lassila, O. and Hendler, J., Embracing web 3.0, IEEE Internet Comput., 2007, vol. 11, no. 3.CrossRef Lassila, O. and Hendler, J., Embracing web 3.0, IEEE Internet Comput., 2007, vol. 11, no. 3.CrossRef
7.
Zurück zum Zitat Lin, Z., et al., Research on web applications using Ajax new technologies, 2008 International Conference on Multimedia and Information Technology, IEEE, 2008, pp. 139–142. Lin, Z., et al., Research on web applications using Ajax new technologies, 2008 International Conference on Multimedia and Information Technology, IEEE, 2008, pp. 139–142.
8.
Zurück zum Zitat Jensen, M., Gruschka, N., and Herkenhöner, R., A survey of attacks on web services, Comput. Sci. Res. Dev., 2009, vol. 24, no. 4, p. 185.CrossRef Jensen, M., Gruschka, N., and Herkenhöner, R., A survey of attacks on web services, Comput. Sci. Res. Dev., 2009, vol. 24, no. 4, p. 185.CrossRef
9.
Zurück zum Zitat Wichers, D., OWASP Top-10 2013, OWASP Foundation, 2013. Wichers, D., OWASP Top-10 2013, OWASP Foundation, 2013.
10.
Zurück zum Zitat Halfond, W.G., et al., A classification of SQL-injection attacks and countermeasures, Proceedings of the IEEE International Symposium on Secure Software Engineering, IEEE, 2006, vol. 1, pp. 13–15. Halfond, W.G., et al., A classification of SQL-injection attacks and countermeasures, Proceedings of the IEEE International Symposium on Secure Software Engineering, IEEE, 2006, vol. 1, pp. 13–15.
11.
Zurück zum Zitat Sarhadi, R.M. and Ghafori, V., New approach to mitigate XML-DOS and HTTP-DOS attacks for cloud computing, Int. J. Comput. Appl., 2013, vol. 72, no. 16. Sarhadi, R.M. and Ghafori, V., New approach to mitigate XML-DOS and HTTP-DOS attacks for cloud computing, Int. J. Comput. Appl., 2013, vol. 72, no. 16.
12.
Zurück zum Zitat Kargl, F., Maier, J., and Weber, M., Protecting web servers from distributed denial of service attacks, Proceedings of the 10th International Conference on WORLD WIDE WEB, ACM, 2001, pp. 514–524. Kargl, F., Maier, J., and Weber, M., Protecting web servers from distributed denial of service attacks, Proceedings of the 10th International Conference on WORLD WIDE WEB, ACM, 2001, pp. 514–524.
13.
Zurück zum Zitat Bau, J., et al., State of the art: Automated black-box web application vulnerability testing, 2010 IEEE Symposium on Security and Privacy, 2010, pp. 332–345. Bau, J., et al., State of the art: Automated black-box web application vulnerability testing, 2010 IEEE Symposium on Security and Privacy, 2010, pp. 332–345.
14.
Zurück zum Zitat Web Vulnerability Scanner WAScan. https://github.com/m4ll0k/WAScan. Web Vulnerability Scanner WAScan. https://​github.​com/​m4ll0k/​WAScan.​
15.
Zurück zum Zitat SaaS-scanner of web vulnerabilities BB Scanner. https://bbs.ptsecurity.com/en/sites. SaaS-scanner of web vulnerabilities BB Scanner. https://​bbs.​ptsecurity.​com/​en/​sites.​
16.
Zurück zum Zitat Web vulnerability scanner w3af. https://github.com/andresriancho/w3af. Web vulnerability scanner w3af. https://​github.​com/​andresriancho/​w3af.​
17.
Zurück zum Zitat SaaS web vulnerability scanner detectify. https://detectify.com/. SaaS web vulnerability scanner detectify. https://​detectify.​com/​.​
Metadaten
Titel
Detection of Security Threats to Modern Websites
verfasst von
D. V. Ivanov
D. A. Moskvin
G. S. Kubrin
Publikationsdatum
01.12.2019
Verlag
Pleiades Publishing
Erschienen in
Automatic Control and Computer Sciences / Ausgabe 8/2019
Print ISSN: 0146-4116
Elektronische ISSN: 1558-108X
DOI
https://doi.org/10.3103/S0146411619080108

Weitere Artikel der Ausgabe 8/2019

Automatic Control and Computer Sciences 8/2019 Zur Ausgabe

Neuer Inhalt