Reference Hub4
Security Testing Framework for Web Applications

Security Testing Framework for Web Applications

Layla Mohammed Alrawais, Mamdouh Alenezi, Mohammad Akour
Copyright: © 2018 |Volume: 6 |Issue: 3 |Pages: 25
ISSN: 2166-7160|EISSN: 2166-7179|EISBN13: 9781522546856|DOI: 10.4018/IJSI.2018070107
Cite Article Cite Article

MLA

Alrawais, Layla Mohammed, et al. "Security Testing Framework for Web Applications." IJSI vol.6, no.3 2018: pp.93-117. http://doi.org/10.4018/IJSI.2018070107

APA

Alrawais, L. M., Alenezi, M., & Akour, M. (2018). Security Testing Framework for Web Applications. International Journal of Software Innovation (IJSI), 6(3), 93-117. http://doi.org/10.4018/IJSI.2018070107

Chicago

Alrawais, Layla Mohammed, Mamdouh Alenezi, and Mohammad Akour. "Security Testing Framework for Web Applications," International Journal of Software Innovation (IJSI) 6, no.3: 93-117. http://doi.org/10.4018/IJSI.2018070107

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

The growth of web-based applications has increased tremendously from last two decades. While these applications bring huge benefits to society, yet they suffer from various security threats. Although there exist various techniques to ensure the security of web applications, still a large number of applications suffer from a wide variety of attacks and result in financial loses. In this article, a security-testing framework for web applications is proposed with an argument that security of an application should be tested at every stage of software development life cycle (SDLC). Security testing is initiated from the requirement engineering phase using a keyword-analysis phase. The output of the first phase serves as input to the next phase. Different case study applications indicate that the framework assists in early detection of security threats and applying appropriate security measures. The results obtained from the implementation of the proposed framework demonstrated a high detection ratio with a less false-positive rate.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.