Detection and analysis of the most vulnerable places of web resources

Keywords: vulnerability, web resource, detection and monitoring, threat, OpenVAS and ElasticSearch

Abstract

This article provides a description of the most popular vulnerabilities of web resources, indicates the places targeted by attackers' attacks, and also offers tools for detecting and analyzing vulnerabilities, namely OpenVAS and ElasticSearch. OpenVAS was chosen because it has a number of significant advantages among the existing tools for detecting vulnerabilities. The installation was performed and the technology of these systems was shown

References

1. Gaolong W., Yongzhen L. Design and implementation of a web application vulnerability detection system. 2022 International Symposium on Advances in Informatics, Electronics and Education (ISAIEE), Frankfurt, Germany, 17–19 December 2022. 2022.
2. Source Code Vulnerability Detection Using Vulnerability Dependency Representation Graph / H. Yang et al. 2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Wuhan, China, 9–11 December 2022. 2022.
3. Deep Analysis of Attacks and Vulnerabilities of Web Security / N. Chillur et al. Futuristic Trends in Networks and Computing Technologies. Singapore, 2022. P. 1087–1097.
4. Kaur G., Lashkari A. H. Information Technology Risk Management. Advances in Cybersecurity Management. Cham, 2021. P. 269–287.
5. Летичевський О.О. Сучасні наукові проблеми кібербезпеки. Вісник НАН України. 2023. № 2. С. 12—20.

Abstract views: 0
PDF Downloads: 0
Published
2023-09-24
How to Cite
Pavlenko, A., & Kostiuchko , S. (2023). Detection and analysis of the most vulnerable places of web resources. COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION, (52), 85-93. https://doi.org/10.36910/6775-2524-0560-2023-52-11
Section
Computer science and computer engineering