About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Future Access Enablers for Ubiquitous and Intelligent Infrastructures. 6th EAI International Conference, FABULOUS 2022, Virtual Event, May 4, 2022, Proceedings

Research Article

Exploring the Applicability of Open-Source Tools for Web Application Cybersecurity Improvement

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-031-15101-9_5,
        author={Ivan Cvitić and Dragan Peraković and Marko Periša and Mario Sekondo},
        title={Exploring the Applicability of Open-Source Tools for Web Application Cybersecurity Improvement},
        proceedings={Future Access Enablers for Ubiquitous and Intelligent Infrastructures. 6th EAI International Conference, FABULOUS 2022, Virtual Event, May 4, 2022, Proceedings},
        proceedings_a={FABULOUS},
        year={2022},
        month={9},
        keywords={Web application Security Open source tools Vulnerability},
        doi={10.1007/978-3-031-15101-9_5}
    }
    
  • Ivan Cvitić
    Dragan Peraković
    Marko Periša
    Mario Sekondo
    Year: 2022
    Exploring the Applicability of Open-Source Tools for Web Application Cybersecurity Improvement
    FABULOUS
    Springer
    DOI: 10.1007/978-3-031-15101-9_5
Ivan Cvitić1, Dragan Peraković1,*, Marko Periša1, Mario Sekondo1
  • 1: Faculty of Transport and Traffic Sciences, University of Zagreb, Vukelićeva 4
*Contact email: dragan.perakovic@fpz.unizg.hr

Abstract

The security of the information-communication system is crucial to avoid potential cyber-attacks. Web applications are most vulnerable to attacks, so it is very important to determine the most common vulnerabilities and the best tools to improve the security of such applications. Vulnerabilities are potential flaws in the system that make it prone to potential attacks. These vulnerabilities can stem from various sources, such as programming languages with inherited security flaws, bad security coding practices, outdated or unpatched services etc. In order to improve security of web applications, the system as a whole needs to be assessed. One of the ways to improve the security is to hire a third-party company that specializies in pen-testing and security of such systems. But since security is complex and needs to be thoroughly tested, this service is rather expensive. So for a smaller web applications and projects this may not be the best or the smartest option. So in order to improve security one of the options is use of vulnerability assessment tools such as open-source vulnerability scanners. This paper will analyze technologies that are used for the development of web applications, the most common vulnerabilities encountered and open source tools that can be used to improve web application security.

Keywords
Web application Security Open source tools Vulnerability
Published
2022-09-18
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-031-15101-9_5
Copyright © 2022–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL