Modeling the owasp most critical web attacks

2Citations
Citations of this article
23Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The tremendous growth of the web-based applications has increased information security vulnerabilities over the Internet. The threat landscape of applications security is constantly evolving (see CVE 1. published reports 2.). The key factors in this evolution are the progress made by the attackers, the emergence of new technologies with new weaknesses, as well as more integrated defenses, and the deployment of increasingly complex systems. Our contribution’s goal is to build a common model of the most famous and dangerous WEB attacks which will allow us to better understand those attacks and hence, adopt the most adapted security strategy to a given business and technical environment. This modeling can also be useful to the problematic of intrusion detection systems evaluation. We have relied on the OWASP TOP 10 classification of the most recent critical WEB attacks 3. and we deduced at the end of this paper a global modeling of all these attacks.

Cite

CITATION STYLE

APA

Ayachi, Y., Ettifouri, E. H., Berrich, J., & Toumi, B. (2019). Modeling the owasp most critical web attacks. In Smart Innovation, Systems and Technologies (Vol. 111, pp. 442–450). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-030-03577-8_49

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free