Corrective Maintenance Based Vulnerability Repair Procedure to Improve Web Application Security

Article Preview

Abstract:

In the internet age, the high efficiency and high profit activities must incorporate with the internet. Web Application (Web App) is an important IT product in the internet age. However, the network intrusions and security vulnerabilities have continued to threaten the operation of Web App. Penetration Testing (PT) is a critical step to identify security vulnerabilities. However, PT can not provide specific and effective follow-up work. For this, combining corrective maintenance with Web App repair operation will be discussed in this paper. And based on corrective maintenance, proposes a Web App Secure Repair Procedures (WASRP). Applying WASRP, the misjudgment ratio of security vulnerabilities and defects can be reduced. And assist to repair the security vulnerabilities and defects, effectively and concretely enhance the Web App security.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2085-2090

Citation:

Online since:

June 2012

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] G. McGraw: Software Security, IEEE Security and Privacy, vol. 2, no. 2 (2004), p.80.

Google Scholar

[2] A. Hall and R. Chapman: Correctness by Construction: Developing a Commercial Secure System, IEEE Software, (2002), p.18.

DOI: 10.1109/52.976937

Google Scholar

[3] N.G. Leveson: Safeware: System Safety and Computers, Addison-Wesley Publishing Company, MA (1995), in press.

Google Scholar

[4] J. Viega and G. McGraw: Building Secure Software, Addison-Wesley Publishing Company, MA (2002), in press.

Google Scholar

[5] G. McGraw: Software Security – Building Security In, Addison-Wesley Publishing Company, MA (2006), in press.

Google Scholar

[6] N. Davis, W. Humphrey, S.T. Redwine, G. Zibulski and G. McGraw: Processes for Producing Secure Software, IEEE Security & Privacy, vol. 2, no. 3 (2004), p.18.

DOI: 10.1109/msp.2004.21

Google Scholar

[7] Information on CERT/CC, http: /www. cert. org/stats/cert_stats. html.

Google Scholar

[8] Information on SANS Top-20 2011 Security Risks, http: /www. sans. org/top20.

Google Scholar

[9] Information on OWASP Top 10, http: /www. owasp. org. tw/blog.

Google Scholar

[10] B. Arkin, S. Stender and G. McGraw: Software Penetration Testing, IEEE Security & Privacy, vol. 3, no. 4 (2005), p.84.

DOI: 10.1109/msp.2005.23

Google Scholar

[11] M. Bishop: About Penetration Testing, IEEE Security & Privacy, vol. 5, no. 4 (2007), p.84.

Google Scholar

[12] J. Bau, E. Bursztein, D. Gupta and J. Mitchell: State of the Art: Automated Black-Box Web Application Vulnerability Testing, 2010 IEEE Symposium on Security and Privacy, (2010), p.332.

DOI: 10.1109/sp.2010.27

Google Scholar

[13] S.R. Schach: Object-Oriented Software Engineering, McGraw-Hill Companies, New York, NY (2008), in press.

Google Scholar

[14] R.S. Pressman: Software Engineering: A Practitioner's Approach, McGraw-Hill Companies, New York, NY (2010), in press.

Google Scholar

[15] S. Hussain, M.Z. Asghar, B. Ahmad and S. Ahmad: A Step towards Software Corrective Maintenance: Using RCM model, International Journal of Computer Science and Information Security Vol. 4, No. 1 & 2, (2009).

Google Scholar

[16] S. -T. Lai: Applying Design Quality Measurement Model for Reducing the Cost of Perfective Maintenance, Soochow Journal of Economics and Business, Vol. 50 (2005), p.67. (In Chinese).

Google Scholar