WebGuardian: Holistic Approach to Address Dynamic Web Application Threat Landscape

Aththanayaka P.A.G.P.B.Undergraduate, Faculty of Computing, Sri Lanka Institute of Information Technology, Western Province, Sri LankaRanasinghe M.H.Undergraduate, Faculty of Computing, Sri Lanka Institute of Information Technology, Western Province, Sri LankaRanaweera H.N.K.Undergraduate, Faculty of Computing, Sri Lanka Institute of Information Technology, Western Province, Sri LankaRathnayake S.D.Undergraduate, Faculty of Computing, Sri Lanka Institute of Information Technology, Western Province, Sri LankaAmila SenarathneLecturer, Faculty of Computing, Sri Lanka Institute of Information Technology, Western Province, Sri LankaKanishka YapaLecturer, Faculty of Computing, Sri Lanka Institute of Information Technology, Western Province, Sri Lanka

Vol 7 No 9 (2023): Volume 7, Issue 9, September 2023 | Pages: 37-42

International Research Journal of Innovations in Engineering and Technology

OPEN ACCESS | Research Article | Published Date: 14-09-2023

doi Logo doi.org/10.47001/IRJIET/2023.709004

Abstract

Web applications have become an integral part of our daily lives, transforming various industries, and enabling smooth online interactions. The increasing number of web applications has also led to significant security challenges. People with malicious intent continuously exploit weaknesses in these web applications, posing a risk to the confidentiality, integrity, and availability of web applications. The primary objective of this research is to develop a comprehensive system that automates the identification and mitigation of vulnerabilities, prevention of threats, assessment of risks, and management of user access in web applications. This system uses advanced technologies like machine learning, runtime application self-protection (RASP), and risk calculation algorithms to take a well-rounded approach to web application security.

This research project presents a comprehensive system that automates web application security, addressing the challenges posed by evolving threats. By utilizing advanced technologies and combining various security elements, the system offers a strong and effective solution to improve the security of web applications. This ensures their ability to withstand and maintain their integrity in today's interconnected digital world.

Keywords

Authentication, Threat, Risk, RASP, Vulnerabilities


Citation of this Article

Aththanayaka P.A.G.P.B., Ranasinghe M.H., Ranaweera H.N.K, Rathnayake S.D., Amila Senarathne, Kanishka Yapa, “WebGuardian: Holistic Approach to Address Dynamic Web Application Threat Landscape” Published in International Research Journal of Innovations in Engineering and Technology - IRJIET, Volume 7, Issue 9, pp 37-42, September 2023. Article DOI https://doi.org/10.47001/IRJIET/2023.709004

References
  1. Hasty Atashzar, Atefeh Torkaman, Marjan Bahrololum, Mohammad H. Tadayon , "A Survey on Web Application Vulnerabilities and Countermeasures," ResearchGate, 2016.
  2. Nilaykumar Kiran Sangani and Haroot Zarger, "Machine Learning in Application Security," INTECH, Dubai, 2021.
  3. Y. Wang, "Vulnerability analysis and improvement of RASP technology," International Symposium on Advances in Informatics, Electronics and Education, Beijing, 2022.
  4. Anton Konev , Alexander Shelupanov *, Mikhail Kataev , Valeriya Ageeva and Alina Nabieva, "A Survey on Threat-Modeling Techniques: Protected Objects and Classification of Threats," Symmetry, MDPI, Tomsk, 2022.
  5. H. Abusaimeh, M. Shkoukani, "Survey of Web Application and Internet Security Threats," Semantic Scholar, 2012.
  6. StackHawk, "Importance of Web Application Security: Three Benefits," Stackhawk, 17 November 2022. [Online]. Available: https://www.stackhawk.com/blog/importance-of-web-application-security-three-benefits/. [Accessed 10 July 2023].
  7. B. Drake, "igicybersecurity," 23 September 2020. [Online]. Available: https://blog.igicybersecurity.com/origins-and-evolution-of-vulnerability-management. [Accessed 10 July 2023].
  8. W. Chai, "A Timeline of Machine Learning History," WhatIs.com, 2020.
  9. Deva, "Evolution Of Natural Language Processing(NLP)," Medium, 2021.
  10. K. Joshi, "What is Classification in Machine Learning and Why is it Important?," emeritus, 2022.
  11. "CIS Benchmarks List," [Online]. Available: https://www.cisecurity.org/cis-benchmarks. [Accessed 16 July 2023].
  12. R. d. Fremery, "The Evolution of Multi-Factor Authentication," LasrPass, 21 December 2021. [Online]. [Accessed 15 July 2023].
  13. Marian Gawron(B), Feng Cheng, and Christoph Meinel, "Automatic Vulnerability Classification Using Machine Learning," ResearchGate, Potsdam.
  14. Petar ýisar* and Sanja Maraviü ýisar**, ResearchGate, Belgrade-Zemun, 2016.
  15. Sandeep kaur ,Gaganpreet kaur , Mohammad Shabaz , "A Secure Two-Factor Authentication Framework in Cloud Computing," Hindawi, Arba Minch, 2022.