Assessing Vulnerability Detection Tools for Authentication

Authors

  • Saru Chandrakar Bhilai Institute of Technology, Durg, Chhattisgarh, India
  • Siddharth Bhilai Institute of Technology, Durg, Chhattisgarh, India
  • Ani Thomas Bhilai Institute of Technology, Durg, Chhattisgarh, India

Keywords:

Vulnerability assessment, Cyber attacks, Computer security, VAPT

Abstract

In this research paper, we perform a comprehensive analysis of the current state of vulnerability detection tools for authenti- cation. The increasing number of data breaches and cyber-attacks has made it essential for organizations to regularly assess the security of their authentication systems. The purpose of this research is to evaluate the effectiveness and efficiency of several commonly used vulnera- bility assessment tools for authentication/authorization and related areas. The study includes a comparison of the features, capabilities, and scope of the selected tools. The results of the analysis provide valuable insights into the strengths and limitations of the different tools and can help bring light to some flaws. The paper concludes by providing recommendations for future research in this field.

Downloads

Download data is not yet available.

References

M. Tolbert, “Vulnerabilities of multi-factor authentication in modern computer networks,” Ph.D. dissertation, Worcester Polytechnic Insti- tute, 2021.

Y. He, W. Wang, Y. Teng, Q. Wang, M. Wang, and J. Lin, “2022 ieee wireless communications and networking conference (wcnc),” 2022, pp. 992–997.

PortSwigger. (2022) Oauth 2.0 authentication vulnerabilities. portswigger.net https : / / portswigger . net / web-security / oauth (10/07/2022).

Al-Aziz and H. Kim, “Comparative study of vulnerability detec- tion tools,” International Journal of Advanced Computer Science and Applications, vol. 6, no. 7, pp. 214–220, 2015.

Y. Zhang, X. Chen, and D. Chen, “Evaluating vulnerability detection tools,” Journal of Cyber Security Technology, vol. 1, no. 3, pp. 164– 178, 2017.

Goyal and Y. Singh, “A comparative study of commercial and open source vulnerability scanners,” International Journal of Computer Sci- ence and Mobile Computing, vol. 8, no. 10, pp. 78–85, 2019.

R. Vaarandi and M. Vilo, “Evaluating web application vulnerability scanners,” Journal of Information Security and Applications, vol. 27, pp. 63–73, 2016.

Hars, Y. Liu, and S. Jajodia, “Evaluating the effectiveness of vulner- ability scanners for industrial control systems,” Computers & Security, vol. 53, pp. 73–93, 2015.

S. T. P. Ltd. How we helped india’s leading e-commerce company secure its web application and mobile app with vapt. [Online]. Available: https://securelayer7.net/blog/how-we-helped-indias-leading-e-commerce-company-secure-its-web-application-and-mobile-app-with-vapt/

C. C. Ltd. How we performed vapt for a multinational bank in europe and improved its online banking security. [Online]. Available: https://cybersecconsulting.com/case-studies/vapt-for-bank.html

Downloads

Published

24.03.2024

How to Cite

Chandrakar, S. ., Siddharth, S., & Thomas, A. . (2024). Assessing Vulnerability Detection Tools for Authentication. International Journal of Intelligent Systems and Applications in Engineering, 12(18s), 765–772. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/5165

Issue

Section

Research Article