
Research Article
Exploring the Applicability of Open-Source Tools for Web Application Cybersecurity Improvement
@INPROCEEDINGS{10.1007/978-3-031-15101-9_5, author={Ivan Cvitić and Dragan Peraković and Marko Periša and Mario Sekondo}, title={Exploring the Applicability of Open-Source Tools for Web Application Cybersecurity Improvement}, proceedings={Future Access Enablers for Ubiquitous and Intelligent Infrastructures. 6th EAI International Conference, FABULOUS 2022, Virtual Event, May 4, 2022, Proceedings}, proceedings_a={FABULOUS}, year={2022}, month={9}, keywords={Web application Security Open source tools Vulnerability}, doi={10.1007/978-3-031-15101-9_5} }
- Ivan Cvitić
Dragan Peraković
Marko Periša
Mario Sekondo
Year: 2022
Exploring the Applicability of Open-Source Tools for Web Application Cybersecurity Improvement
FABULOUS
Springer
DOI: 10.1007/978-3-031-15101-9_5
Abstract
The security of the information-communication system is crucial to avoid potential cyber-attacks. Web applications are most vulnerable to attacks, so it is very important to determine the most common vulnerabilities and the best tools to improve the security of such applications. Vulnerabilities are potential flaws in the system that make it prone to potential attacks. These vulnerabilities can stem from various sources, such as programming languages with inherited security flaws, bad security coding practices, outdated or unpatched services etc. In order to improve security of web applications, the system as a whole needs to be assessed. One of the ways to improve the security is to hire a third-party company that specializies in pen-testing and security of such systems. But since security is complex and needs to be thoroughly tested, this service is rather expensive. So for a smaller web applications and projects this may not be the best or the smartest option. So in order to improve security one of the options is use of vulnerability assessment tools such as open-source vulnerability scanners. This paper will analyze technologies that are used for the development of web applications, the most common vulnerabilities encountered and open source tools that can be used to improve web application security.