• DocumentCode
    155195
  • Title

    W-VST: A Testbed for Evaluating Web Vulnerability Scanner

  • Author

    Yuan-Hsin Tung ; Shian-Shyong Tseng ; Jen-Feng Shih ; Hwai-Ling Shan

  • Author_Institution
    Telecommun. Lab., Chunghwa Telecom Co. Ltd., Taiwan
  • fYear
    2014
  • fDate
    2-3 Oct. 2014
  • Firstpage
    228
  • Lastpage
    233
  • Abstract
    In the recent years, web applications have become increasingly popular for delivering security critical services. Because web applications are exposed to various threats and attacks, numerous tools, including commercial tools and open source software, have been developed for detecting web application vulnerabilities, called web vulnerability scanner. Many studies have focused on evaluating web vulnerability scanners by comparing the vulnerability coverage, precision, recall, and time complexity. However, tremendous new attack scenarios and various hacking techniques usually cause erroneous judgement by the scanners and a comprehensive scan often results in redundant vulnerability alerts. Therefore, an efficient detection tools is essential and can be extremely helpful to the users. In this paper, we propose the advanced confusion matrix to estimate the performance of Web vulnerability scanners and then propose a cost-effective approach with three main phases to evaluating vulnerability scanners by additionally considering the reduction of redundant vulnerability alert. We define the redundant alert problem in scanner evaluation based upon two attributes, true duplication (TD) and false duplication (FD). Accordingly, we build up the Web Vulnerability Scanner Testbed, W-VST. Two experiments have been made to evaluate the performance. The experimental results indicate that our evaluation approach can verify the performance of scanners and W-VST is efficient in tool evaluation.
  • Keywords
    Internet; computer crime; program testing; W-VST; Web application; Web applications; Web vulnerability scanner testbed; advanced confusion matrix; attack scenarios; commercial tools; false duplication; hacking techniques; open source software; performance estimation; recall; redundant vulnerability alert; security critical services; time complexity; true duplication; vulnerability coverage; Computer hacking; Software; Telecommunications; Testing; Time measurement; advanced confusion matrix; cost-effective evaluation; security; vulnerability detection; web vulnerability;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Quality Software (QSIC), 2014 14th International Conference on
  • Conference_Location
    Dallas, TX
  • ISSN
    1550-6002
  • Print_ISBN
    978-1-4799-7197-8
  • Type

    conf

  • DOI
    10.1109/QSIC.2014.50
  • Filename
    6958409