Introduction
Recently, a good number of web controls vulnerability has been quickly growing over the last few years. According to the estimated figures that were released recently, it indicated that during the years of 2007 and 2009, the number of web vulnerability increased in the regular order of magnitude or strength. The reason for the increase of these web-based application include; the highest market of the occupancy by the web control and secondly is that this web-based control security rose due to the very high utility value of the ActiveX controls. Furthermore, these web applications come with a good number of applications. Some of them include today online business. Under this category is comprised of several other businesses. The following are just example; banking, shopping, admissions by the university, among other activities which are done online. Unfortunately, there are other vulnerabilities which allow the attacker to interfere with the webs application control of the data it contains. As a result, this creates a possible problem and threats to the owners. For this reason, there was a need to develop software that could protect the data of individual accounts from such unscrupulous attackers. This method is by use of fuzzing (paper 1).
The security vulnerabilities that are published today in the various security mailing, the lists are detected using the fuzzing method. Fuzzing method function of the basis of faulty input procedure, of which by the act of sending various data, it will try to check and detect any security vulnerability. When choosing the fuzzing method of security vulnerability test, there are a good number of factors which must exist. These include the target programs, the format type of data existing, the skills of the investigating personnel among other factors. However, the procedures for conducting the test are the same (paper 2).
There are a lot of developments to improve the traditional vulnerability model test. These include the addition of the scanning analysis module, heuristic ways of generating the test data model and finally the OllyDbg analysis test model. Generally, fuzzing method checks the security of data in the following steps, the preparation phase before the actual test, the test phases were some tests generated about the attributes, function and functional dimensions on the preparatory phase. Next is the test report phase where the test report includes similar abnormal events except the fuzzing test and document test (paper 3).
Conclusion
In conclusion, the development of the vulnerability test model that based on the web has indeed helped in the protection of private data from unauthorized attackers. Additionally, this web-based security has contributed to the drastic decrease of threats from the network.
References
Nunes, F. J. B., & Albuquerque, A. B. (2016). A Proposal for Systematic Mapping Study of Software Security Testing, Verification and Validation. World Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering, 10, 869-875.
Sablotny, M., Jensen, B. S., & Johnson, C. W. (2018, November). Recurrent Neural Networks for Fuzz Testing Web Browsers. In International Conference on Information Security and Cryptology (pp. 354-370). Springer, Cham.[3]. Takanen, A., Demott, J. D., Miller, C., & Kettunen, A. (2018). Fuzzing for software security testing and quality assurance. Artech House.
Cite this page
Essay Sample on Security Vulnerability in Web Controls Based on Fuzzing. (2022, Nov 16). Retrieved from https://proessays.net/essays/essay-sample-on-security-vulnerability-in-web-controls-based-on-fuzzing
If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:
- WordPress Essay Example
- Essay Sample on Impacts of Technology on Computer Networking
- Essay Example on Cybersecurity: Time for Governments to Act to Curb Threats
- Why I Would be Good for the Program? - Personal Statement
- Essay Example on Build a Gaming PC: A Guide to Components, Software & Peripherals
- Designing a Database: Pros & Cons - Essay Sample
- Paper Sample on Technology: Key to Organizational Success Through Information Systems