Please use this identifier to cite or link to this item: https://doi.org/10.21256/zhaw-17956
Full metadata record
DC FieldValueLanguage
dc.contributor.authorRennhard, Marc-
dc.contributor.authorEsposito, Damiano-
dc.contributor.authorRuf, Lukas-
dc.contributor.authorWagner, Arno-
dc.date.accessioned2019-08-22T11:11:55Z-
dc.date.available2019-08-22T11:11:55Z-
dc.date.issued2019-07-
dc.identifier.issn1942-2652de_CH
dc.identifier.urihttps://digitalcollection.zhaw.ch/handle/11475/17956-
dc.description.abstractUsing web application vulnerability scanners is very appealing as they promise to detect vulnerabilities with minimal configuration effort. However, using them effectively in practice is often difficult. Two of the main reasons for this are limitations with respect to crawling capabilities and problems to perform authenticated scans. In this paper, we present JARVIS, which provides technical solutions that can be applied to a wide range of vulnerability scanners to overcome these limitations and to significantly improve their effectiveness. To evaluate JARVIS, we applied it to five freely available vulnerability scanners and tested the vulnerability detection performance in the context of seven deliberately insecure web applications. A first general evaluation showed that by using the scanners with JARVIS, the number of detected vulnerabilities can be increased by more than 100% on average compared to using the scanners without JARVIS. A significant fraction of the additionally detected vulnerabilities is security-critical, which means that JARVIS provides a true security benefit. A second, more detailed evaluation focusing on SQL injection and cross-site scripting vulnerabilities revealed that JARVIS improves the vulnerability detection performance of the scanners by 167% on average, without increasing the fraction of reported false positives. This demonstrates that JARVIS not only manages to greatly improve the vulnerability detection rate of these two highly security-critical types of vulnerabilities, but also that JARVIS is very usable in practice by keeping the false positives reasonably low. Finally, as the configuration effort to use JARVIS is small and as the configuration is scanner- independent, JARVIS also supports using multiple scanners in parallel in an efficient way. In an additional evaluation, we therefore analyzed the potential and limitations of using multiple scanners in parallel. This revealed that using multiple scanners in a reasonable way is indeed beneficial as it further increases the number of detected vulnerabilities without a significant negative impact on the reported false positives.de_CH
dc.language.isoende_CH
dc.publisherIARIAde_CH
dc.relation.ispartofInternational Journal on Advances in Internet Technologyde_CH
dc.rightsLicence according to publishing contractde_CH
dc.subjectWeb application securityde_CH
dc.subjectVulnerability scanningde_CH
dc.subjectVulnerability detection performancede_CH
dc.subjectAuthenticated scanningde_CH
dc.subjectCombining multiple scannersde_CH
dc.subject.ddc004: Informatikde_CH
dc.titleImproving the effectiveness of web application vulnerability scanningde_CH
dc.typeBeitrag in wissenschaftlicher Zeitschriftde_CH
dcterms.typeTextde_CH
zhaw.departementSchool of Engineeringde_CH
zhaw.organisationalunitInstitut für Informatik (InIT)de_CH
dc.identifier.doi10.21256/zhaw-17956-
zhaw.funding.euNode_CH
zhaw.issue1/2de_CH
zhaw.originated.zhawYesde_CH
zhaw.pages.end27de_CH
zhaw.pages.start12de_CH
zhaw.publication.statuspublishedVersionde_CH
zhaw.volume12de_CH
zhaw.publication.reviewPeer review (Publikation)de_CH
zhaw.webfeedInformation Securityde_CH
zhaw.funding.zhawASAP: Plattform für die automatisierte Sicherheitsanalyse von IT-Systemende_CH
zhaw.author.additionalNode_CH
Appears in collections:Publikationen School of Engineering

Files in This Item:
File Description SizeFormat 
webappscan-journal.pdf561.87 kBAdobe PDFThumbnail
View/Open
Show simple item record
Rennhard, M., Esposito, D., Ruf, L., & Wagner, A. (2019). Improving the effectiveness of web application vulnerability scanning. International Journal on Advances in Internet Technology, 12(1/2), 12–27. https://doi.org/10.21256/zhaw-17956
Rennhard, M. et al. (2019) ‘Improving the effectiveness of web application vulnerability scanning’, International Journal on Advances in Internet Technology, 12(1/2), pp. 12–27. Available at: https://doi.org/10.21256/zhaw-17956.
M. Rennhard, D. Esposito, L. Ruf, and A. Wagner, “Improving the effectiveness of web application vulnerability scanning,” International Journal on Advances in Internet Technology, vol. 12, no. 1/2, pp. 12–27, Jul. 2019, doi: 10.21256/zhaw-17956.
RENNHARD, Marc, Damiano ESPOSITO, Lukas RUF und Arno WAGNER, 2019. Improving the effectiveness of web application vulnerability scanning. International Journal on Advances in Internet Technology. Juli 2019. Bd. 12, Nr. 1/2, S. 12–27. DOI 10.21256/zhaw-17956
Rennhard, Marc, Damiano Esposito, Lukas Ruf, and Arno Wagner. 2019. “Improving the Effectiveness of Web Application Vulnerability Scanning.” International Journal on Advances in Internet Technology 12 (1/2): 12–27. https://doi.org/10.21256/zhaw-17956.
Rennhard, Marc, et al. “Improving the Effectiveness of Web Application Vulnerability Scanning.” International Journal on Advances in Internet Technology, vol. 12, no. 1/2, July 2019, pp. 12–27, https://doi.org/10.21256/zhaw-17956.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.