TechRxiv
CRISIS_2020_paper_34 (1).pdf (190.12 kB)
Download file

An OWASP Top Ten Driven Survey on Web Application Protection Methods

Download (190.12 kB)
preprint
posted on 2020-11-20, 14:29 authored by Ouissem Ben Fredj, omar cheikhrouhouomar cheikhrouhou, Moez KrichenMoez Krichen, Habib Hamam, Abdelouahid Derhab
Web applications (WAs) are constantly evolving and deployed at broad scale. However, they are exposed to a variety of attacks. The biggest challenge facing organizations is how to develop a WA that fulfills their requirements with respect to sensitive data exchange, E-commerce, and secure workflows. This paper identifies the most critical web vulnerabilities according to OWASP Top Ten, their corresponding attacks, and their countermeasures. The application of these countermeasures will guarantee the protection of the WAs against the most severe attacks and prevent several unknown exploits.

History

Email Address of Submitting Author

moez.krichen@redcad.org

ORCID of Submitting Author

0000-0001-8873-9755

Submitting Author's Institution

Al-baha University

Submitting Author's Country

  • Saudi Arabia

Usage metrics

    Licence

    Exports