Artificial Intelligence and Dynamic Analysis-Based Web Application Vulnerability Scanner

被引:0
|
作者
Yalcinkaya, Mehmet Ali [1 ]
Kucuksille, Ecir Ugur [2 ]
机构
[1] Kirsehir Ahi Evran Univ, Comp Engn Dept, Kirsehir, Turkiye
[2] Suleyman Demirel Univ, Comp Engn Dept, Isparta, Turkiye
关键词
Data Mining; Machine Learning; Web Application Penetration Tests; Web Application Vulnerabilities; FORMS;
D O I
10.22042/isecure.2023.367746.847
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The widespread use of web applications and running on sensitive data has made them one of the most significant targets of cyber attackers. One of the most crucial security measures that can be taken is detecting and closing vulnerabilities on web applications before attackers. This study developed a web application vulnerability scanner based on dynamic analysis and artificial intelligence, which could test web applications using GET and POST methods and had test classes for 21 different vulnerability types. The developed vulnerability scanner was tested on a web application test laboratory, created within this study's scope and had 262 different web applications. A data set was created from the tests performed using the developed vulnerability scanner. In this study, web page classification was made using the mentioned data set as a first stage. The highest success rate in the page classification process was determined by 95.39% using the Random Forest Algorithm. The second operation performed using the dataset was the association analysis between vulnerabilities. The proposed model saved 21% more time than the standard scanning model. The page classification process was also used in crawling the web application in this study. (c) 2024 ISC. All rights reserved.
引用
收藏
页码:55 / 77
页数:23
相关论文
共 50 条
  • [31] Scientometric Analysis of the Application of Artificial Intelligence in Agriculture
    Garcia Vazquez, Juan Pablo
    Salomon Torres, Ricardo
    Perez Perez, Dalila Blanca
    JOURNAL OF SCIENTOMETRIC RESEARCH, 2021, 10 (01) : 55 - 62
  • [32] Web application vulnerability detection based on reinforcement learning
    Xin, Wang
    Gengyu, Wei
    Yixian, Yang
    International Journal of Digital Content Technology and its Applications, 2012, 6 (10) : 12 - 20
  • [33] Application of artificial intelligence in lateral cephalometric analysis
    Lee, Huang-Ting
    Chiu, Po-Yuan
    Yen, Chen-Wen
    Chou, Szu-Ting
    Tseng, Yu-Chuan
    JOURNAL OF DENTAL SCIENCES, 2024, 19 (02) : 1157 - 1164
  • [34] Application of Artificial Intelligence in Cardiology: A Bibliometric Analysis
    Sidik, Abubakar I.
    Komarov, Roman N.
    Gawusu, Sidique
    Moomin, Aliu
    Al-Ariki, Malik K.
    Elias, Marina
    Sobolev, Dmitriy
    Karpenko, Ivan G.
    Esion, Grigorii
    Akambase, Jonas
    Dontsov, Vladislav V.
    Shafii, Mohammad
    Ahlam, Derrar
    Arzouni, Naya W.
    CUREUS JOURNAL OF MEDICAL SCIENCE, 2024, 16 (08)
  • [35] Analysis of the Application of Artificial Intelligence in the Creative Space
    Su, BeiLe
    DIGITAL HUMAN MODELING AND APPLICATIONS IN HEALTH, SAFETY, ERGONOMICS AND RISK MANAGEMENT. AI, PRODUCT AND SERVICE, DHM 2021, PT II, 2021, 12778 : 252 - 262
  • [36] A Review on an Artificial Intelligence Based Ophthalmic Application
    Kothandan, Sudhakar
    Radhakrishnan, Arun
    Kuppusamy, Gowthamarajan
    CURRENT PHARMACEUTICAL DESIGN, 2022, 28 (26) : 2150 - 2160
  • [37] Behavior Analysis-Based Dynamic Trust Measurement Model
    Wang, Dan
    Zhou, Xiaodong
    Zhao, Wenbing
    INFORMATION AND COMMUNICATIONS SECURITY, 2011, 7043 : 267 - 281
  • [38] Proposing artificial intelligence based livelihood vulnerability index in river islands
    Talukdar, Swapan
    Pal, Swades
    Singha, Pankaj
    Journal of Cleaner Production, 2021, 284
  • [39] Proposing artificial intelligence based livelihood vulnerability index in river islands
    Talukdar, Swapan
    Pal, Swades
    Singha, Pankaj
    JOURNAL OF CLEANER PRODUCTION, 2021, 284
  • [40] A Phishing Vulnerability Analysis of Web Based Systems
    Yu, Weider D.
    Nargundkar, Shruti
    Tiruthani, Nagapriya
    2008 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1-3, 2008, : 603 - 608