Please use this identifier to cite or link to this item: http://ir.futminna.edu.ng:8080/jspui/handle/123456789/2451
Title: A Fuzzy Classifier-Based Penetration Testing for Web Applications
Authors: Alhassan, J. K.
Misra, Sanjay
Umar, A
Maskeliūnas, Rytis
Damaševičius, Robertas
Adewumi, Adewole
Keywords: Vulnerabilities assessment Penetration testing Fuzzy classifier-based Web applications
Issue Date: 2018
Publisher: Advances in Intelligent Systems and Computing
Abstract: The biggest challenge of Web application is the inestimable losses arising from security flaws. Two approaches were advanced by a number of scholars to provide security to Web space. One of such approach is vulnerability assessment, which is a conscious effort to isolate, identify and recognize potentials vulnerabilities exploited by attackers. The second being the estimation and determination of level of risks/threats posed to Web applications by vul nerabilities obvious to the developer (or tester); this is generally referred to as penetration testing. Recently, there is Vulnerability Assessment and Penetration Testing (VAPT) that combined these two schemes to improve safety and effec tively combat the menace of attackers on Web applications. This paper proposed Fuzzy Classifier-based Vulnerability and Assessment Testing (FCVAPT) model to provide security for sensitive data/information in Web applications. Cross Site Scripting (XSS) and Structured Query Language (SQL) injections were selected for evaluation of proposed FCVAPT model. FCVAPT model’s classification performance for MSE, MAPE and RMSE were 33.33, 14.81% and 5.77% respectively. FCVAPT is considerably effective for detecting vulnerability and ascertaining the nature of threats/risks available to Web applications
URI: http://repository.futminna.edu.ng:8080/jspui/handle/123456789/2451
ISSN: 2194-5365
Appears in Collections:Computer Science

Files in This Item:
File Description SizeFormat 
A Fuzzy Based Classifier.pdf64.33 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.