APPLYING OF ATTACK TREES FOR ESTIMATION THE PROBABILITY OF A SUCCESSFUL ATTACK OF THE WEB-APPLICATION
Abstract
Keywords
Full Text:
PDF (Русский)References
López, J. M., Pascual, A., Masip, L., Granollers, T., Cardet, X. Influence of web content management systems in web content accessibility. IFIP Conference on Human-Computer Interaction, Springer, Berlin, Heidelberg, 2011, pp. 548-551.
Slider Revolution Plugin Critical Vulnerability Being Exploited. Available at: https://blog.sucuri.net/2014/09/slider-revolution-plugin-critical-vulnerability-being-exploited.html (accessed 7.09.2018).
Rehman, H., Nazir, M., Mustafa, K. Security of Web Application: State of the Art. Information, Communication and Computing Technology. ICICCT 2017. Communications in Computer and Information Science, Springer, Singapore, 2017, vol. 750, pp. 168-180.
Nagaraju, V., Fiondella, L., Wandji, T. A survey of fault and attack tree modeling and analysis for cyber risk management. Technologies for Homeland Security (HST), 2017 IEEE International Symposium, 2017, pp. 1-6.
Du, S., Zhu, H. Security assessment via attack tree model. Security Assessment in Vehicular Networks, Springer, New York, 2013, pp. 9-16.
Lepofsky, R. The manager's guide to web application security: a concise guide to the weaker side of the web. Apress, 2014. 232 p.
Tetskyi, A., Kharchenko, V., Uzun, D. Analysis of the Possibilities of Unauthorized Access in Content Management Systems Using Attack Trees. Proc. PhD Symposium at ICTERI 2018, Kyiv, Ukraine, May 14-17, 2018, CEUR-WS, vol. 2122, pp. 16-25.
Avtomatizirovannyi analiz koda: statistika uyazvimostei veb-prilozhenii za 2017 god [Automated code analysis: Web application vulnerability statistics for 2017]. Positive Technologies. Available at: https://www.ptsecurity.com/upload/corporate/ru-ru/analytics/PT-AI-Statistics-rus.pdf (accessed 7.09.2018).
Yu, X., Jiang, G. A Web Security Testing Method Based on Web Application Structure. Cloud Computing and Security. Lecture Notes in Computer Science, Springer, Cham, 2015, vol. 9483, pp. 244-258.
Zech, P., Felderer, M., Breu, R. Knowledge-based security testing of web applications by logic programming. International Journal on Software Tools for Technology Transfer, Springer, Berlin, Heidelberg, 2017, pp. 1-26.
National Vulnerability Database. Available at: https://nvd.nist.gov/ (accessed 7.09.2018).
Most Common Attacks Affecting Today’s Websites. Available at: https://blog.sucuri.net/2014/11/most-common-attacks-affecting-todays-websites.html (accessed 7.09.2018).
DOI: https://doi.org/10.32620/reks.2018.3.08
Refbacks
- There are currently no refbacks.