WebGuardian: Holistic Approach to Address Dynamic Web Application Threat Landscape

Abstract

Web applications have become an integral part of our daily lives, transforming various industries, and enabling smooth online interactions. The increasing number of web applications has also led to significant security challenges. People with malicious intent continuously exploit weaknesses in these web applications, posing a risk to the confidentiality, integrity, and availability of web applications. The primary objective of this research is to develop a comprehensive system that automates the identification and mitigation of vulnerabilities, prevention of threats, assessment of risks, and management of user access in web applications. This system uses advanced technologies like machine learning, runtime application self-protection (RASP), and risk calculation algorithms to take a well-rounded approach to web application security.

This research project presents a comprehensive system that automates web application security, addressing the challenges posed by evolving threats. By utilizing advanced technologies and combining various security elements, the system offers a strong and effective solution to improve the security of web applications. This ensures their ability to withstand and maintain their integrity in today's interconnected digital world.

Country : Sri Lanka

1 Aththanayaka P.A.G.P.B.2 Ranasinghe M.H.3 Ranaweera H.N.K.4 Rathnayake S.D.5 Amila Senarathne6 Kanishka Yapa

  1. Undergraduate, Faculty of Computing, Sri Lanka Institute of Information Technology, Western Province, Sri Lanka
  2. Undergraduate, Faculty of Computing, Sri Lanka Institute of Information Technology, Western Province, Sri Lanka
  3. Undergraduate, Faculty of Computing, Sri Lanka Institute of Information Technology, Western Province, Sri Lanka
  4. Undergraduate, Faculty of Computing, Sri Lanka Institute of Information Technology, Western Province, Sri Lanka
  5. Lecturer, Faculty of Computing, Sri Lanka Institute of Information Technology, Western Province, Sri Lanka
  6. Lecturer, Faculty of Computing, Sri Lanka Institute of Information Technology, Western Province, Sri Lanka

IRJIET, Volume 7, Issue 9, September 2023 pp. 37-42

doi.org/10.47001/IRJIET/2023.709004

References

  1. Hasty Atashzar, Atefeh Torkaman, Marjan Bahrololum, Mohammad H. Tadayon , "A Survey on Web Application Vulnerabilities and Countermeasures," ResearchGate, 2016.
  2. Nilaykumar Kiran Sangani and Haroot Zarger, "Machine Learning in Application Security," INTECH, Dubai, 2021.
  3. Y. Wang, "Vulnerability analysis and improvement of RASP technology," International Symposium on Advances in Informatics, Electronics and Education, Beijing, 2022.
  4. Anton Konev , Alexander Shelupanov *, Mikhail Kataev , Valeriya Ageeva and Alina Nabieva, "A Survey on Threat-Modeling Techniques: Protected Objects and Classification of Threats," Symmetry, MDPI, Tomsk, 2022.
  5. H. Abusaimeh, M. Shkoukani, "Survey of Web Application and Internet Security Threats," Semantic Scholar, 2012.
  6. StackHawk, "Importance of Web Application Security: Three Benefits," Stackhawk, 17 November 2022. [Online]. Available: https://www.stackhawk.com/blog/importance-of-web-application-security-three-benefits/. [Accessed 10 July 2023].
  7. B. Drake, "igicybersecurity," 23 September 2020. [Online]. Available: https://blog.igicybersecurity.com/origins-and-evolution-of-vulnerability-management. [Accessed 10 July 2023].
  8. W. Chai, "A Timeline of Machine Learning History," WhatIs.com, 2020.
  9. Deva, "Evolution Of Natural Language Processing(NLP)," Medium, 2021.
  10. K. Joshi, "What is Classification in Machine Learning and Why is it Important?," emeritus, 2022.
  11. "CIS Benchmarks List," [Online]. Available: https://www.cisecurity.org/cis-benchmarks. [Accessed 16 July 2023].
  12. R. d. Fremery, "The Evolution of Multi-Factor Authentication," LasrPass, 21 December 2021. [Online]. [Accessed 15 July 2023].
  13. Marian Gawron(B), Feng Cheng, and Christoph Meinel, "Automatic Vulnerability Classification Using Machine Learning," ResearchGate, Potsdam.
  14. Petar ýisar* and Sanja Maraviü ýisar**, ResearchGate, Belgrade-Zemun, 2016.
  15. Sandeep kaur ,Gaganpreet kaur , Mohammad Shabaz , "A Secure Two-Factor Authentication Framework in Cloud Computing," Hindawi, Arba Minch, 2022.