Assessing Vulnerability Detection Tools for Authentication
Keywords:
Vulnerability assessment, Cyber attacks, Computer security, VAPTAbstract
In this research paper, we perform a comprehensive analysis of the current state of vulnerability detection tools for authenti- cation. The increasing number of data breaches and cyber-attacks has made it essential for organizations to regularly assess the security of their authentication systems. The purpose of this research is to evaluate the effectiveness and efficiency of several commonly used vulnera- bility assessment tools for authentication/authorization and related areas. The study includes a comparison of the features, capabilities, and scope of the selected tools. The results of the analysis provide valuable insights into the strengths and limitations of the different tools and can help bring light to some flaws. The paper concludes by providing recommendations for future research in this field.
Downloads
References
M. Tolbert, “Vulnerabilities of multi-factor authentication in modern computer networks,” Ph.D. dissertation, Worcester Polytechnic Insti- tute, 2021.
Y. He, W. Wang, Y. Teng, Q. Wang, M. Wang, and J. Lin, “2022 ieee wireless communications and networking conference (wcnc),” 2022, pp. 992–997.
PortSwigger. (2022) Oauth 2.0 authentication vulnerabilities. portswigger.net https : / / portswigger . net / web-security / oauth (10/07/2022).
Al-Aziz and H. Kim, “Comparative study of vulnerability detec- tion tools,” International Journal of Advanced Computer Science and Applications, vol. 6, no. 7, pp. 214–220, 2015.
Y. Zhang, X. Chen, and D. Chen, “Evaluating vulnerability detection tools,” Journal of Cyber Security Technology, vol. 1, no. 3, pp. 164– 178, 2017.
Goyal and Y. Singh, “A comparative study of commercial and open source vulnerability scanners,” International Journal of Computer Sci- ence and Mobile Computing, vol. 8, no. 10, pp. 78–85, 2019.
R. Vaarandi and M. Vilo, “Evaluating web application vulnerability scanners,” Journal of Information Security and Applications, vol. 27, pp. 63–73, 2016.
Hars, Y. Liu, and S. Jajodia, “Evaluating the effectiveness of vulner- ability scanners for industrial control systems,” Computers & Security, vol. 53, pp. 73–93, 2015.
S. T. P. Ltd. How we helped india’s leading e-commerce company secure its web application and mobile app with vapt. [Online]. Available: https://securelayer7.net/blog/how-we-helped-indias-leading-e-commerce-company-secure-its-web-application-and-mobile-app-with-vapt/
C. C. Ltd. How we performed vapt for a multinational bank in europe and improved its online banking security. [Online]. Available: https://cybersecconsulting.com/case-studies/vapt-for-bank.html
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Saru Chandrakar, Siddharth, Ani Thomas
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.