Paper 164
Paper 164
net/publication/363891246
CITATIONS READS
2 2,103
2 authors:
All content following this page was uploaded by Pramila M. Chawan on 28 September 2022.
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - In simple terms, a vulnerability in cyber security To avoid such situations manual testing, security audits, or
refers to any fault or flaw, or weakness in an information code inspections are to be performed by highly skilled cyber
system, internal controls, or system processes of an security engineers or experts. But as it is labour intensive
organization. It can also be defined as a flaw or a fault in the and expensive and prone to errors; automating the above
source code design which determines the application steps to discover respective vulnerabilities for the software
malfunctions. Therefore, a good Vulnerability Management applications is required.
plan should be implemented to avoid attacks on the system or
to minimize the damages produced by a cyberattack. To avoid 1.1 Software Vulnerabilities
such damages manual source code inspections or security
audits are performed, which requires highly trained cyber An error or a flaw or a weakness of the application's
security engineers, and it requires more time, which is prone to source code that an attacker or a hacker can take advantage
errors. For this reason, there is a need to automate such of is known as software vulnerability. These errors tend to
processes to discover vulnerabilities. This results in the make the system function abnormally and undesirable
implementation of the Vulnerability Management System, actions. These flaws or errors in code may arise due to the
which will automate security testing for the identification of lack of knowledge of the developer or programmer who is
vulnerabilities caused in the software products. developing the software application. These flaws may lead to
system crashes, loss of data, reputational damage, major
damage to the targeted system, loss of customers, personal
Key Words: Vulnerability, Vulnerability Management data being exposed, etc.
System, Algorithm, Software testing, Web based
application.
1.2 Types of Vulnerabilities
1.INTRODUCTION The common security goals i.e., confidentiality, availability,
integrity, non-repudiation, and usability, can be affected by
Many organizations have embraced the technologies such as the software vulnerabilities.
software applications, web applications, software products,
and many more to explore their new business opportunities Following listed below are cyberattacks associated with
and few organizations are being forced to adopt e-commerce software vulnerabilities:
due to advancements in software technologies, customers, or
competitors. Software applications and web applications Phishing: Phishing is a cyberattack that attempts to steal
have been gaining popularity day by day, and these sensitive information. This sensitive information can be login
applications come up with different components which are credentials and credit card details. This attack can also be a
highly complex and written by different software developers form of social engineering where an attacker tries to mislead
in different smaller chunks. Most of these applications fail to the user into clicking a malicious link created by the attacker,
give proper output due to untreated cases or flaws. downloading some malicious attachments, or revealing
Therefore, the software application or Operating system sensitive data.
which contains untreated cases, flaws, or weaknesses are
known as software vulnerabilities. Later, the flaws in the DDoS Attacks: Distributed denial of service attack is an
source code of the application can be exemplified as an entry attempt to spoil an online service or a website or a server or
point for the hacker and can be treated as a software network by making it unavailable by sending many access
vulnerability. requests that it cannot manage.
Despite all the security measures, the number of Computer Viruses: Computer code or a program that
vulnerabilities discovered continues to grow as the number modifies the way a computer behaves is known as Viruses.
of users using the internet has increased. Any device which They are meant to spread through contaminated data, files,
contains software functions can tend to have source code and insecure networks. And once it enters the system, it can
errors, logical errors, and flaws. Thus, the existence of replicate and spread from one program to another and infect
detection techniques is mandatory for software vulnerability other computer systems also.
remediation as well as prevention.
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 09 | Sep 2022 www.irjet.net p-ISSN: 2395-0072
Attack Vectors: Attack vector is a malicious term used to Jan-Min Chen.[6] In this paper, the author has implemented
discover system vulnerability points, launch cyberattacks or an automated vulnerability scanner that identifies the
install malicious software. Following are the four important injection attack vulnerabilities. This system automatically
attack vectors: Drive-by, Zero-day attack, MITM (man in the examines the website to find the XSS and SQL injection
middle), SQL Injection. vulnerabilities. The proposed system also uses NVD i.e.,
National Vulnerability Database.
Vulnerability Management System is not only intended to Andrey Fedorchenko.[7] In this research paper, the author
identify and evaluate vulnerability, but it will also generate a has proposed the process of integrating a vulnerability
detail report which will report of the vulnerability point database system. This integrated database can be used for the
found in the software application which will be tested. further application of security systems. In this paper, the
structure of the vulnerabilities database is suggested, and the
2. LITERATURE REVIEW process of vulnerabilities database generation is suggested.
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 09 | Sep 2022 www.irjet.net p-ISSN: 2395-0072
Reporting phase is initiated to generate a well informative The initial stage according to the phase diagram is inspection
report for the scan which was performed. which can be called as requirement or information gathering
stage. After phase 1, the next process involves mainly
crawling and parsing, and identifying new vulnerabilities.
Phase 2 is repeated until all the vulnerabilities of the
applications are not discovered. A further step includes
analysis of the vulnerabilities found to identify proper
definitions according to the OWASP and getting proper
remediation for the same. Further, this analysis is
summarized, and the final report is generated as an end
result.
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 09 | Sep 2022 www.irjet.net p-ISSN: 2395-0072
2. Dirbuster: 9. Uniscan:
DirBuster is an application with a GUI interface developed in An open-source program called Uniscan can check web
Java. It is used to find concealed files and directories by applications for serious flaws including cross-site scripting,
brute-forcing files & directories with the aim of gaining some blind SQL injection, remote file inclusion, web shell
significant information that could help in cyber-attacks. A vulnerabilities, and hidden backdoors, among others. In
wordlist could influence how effective such a tool is; the addition to assessing vulnerabilities, Uniscan has the ability
more effective the wordlist, the more effective the to search Google and Bing for domains using shared IP
instrument. addresses.
5. whois:
A query and response protocol i.e., WHOIS, which is
pronounced "who is," is frequently used for accessing
databases that list the registered users or assignees of
Internet resources like domain names, blocks of IP Fig -4: Screenshot for web app of VMS tool
addresses, and autonomous systems. On most UNIX
systems, the command-line utility used to do WHOIS
protocol searches is called whois. Additionally, Referral
Whois is a sibling protocol of WHOIS (RWhois).
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 4
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 09 | Sep 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 5
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 09 | Sep 2022 www.irjet.net p-ISSN: 2395-0072
[9] Ching-Huang Lin, Chih-Hao Chen, Chi-Sung Laih, “A University Ranking 2022) – 2nd Rank- Best Scientist,
Study and Implementation of Vulnerability Assessment VJTI Computer Science domain 1138th Rank- Best
and Misconfiguration Detection”, 2008 IEEE Asia-Pacific Scientist, Computer Science, India.
Services Computing Conference, 9-12 Dec. 2008, pp.
1252-1257, doi: 10.1109/APSCC.2008.212
[10] Yu, Y., Yang, Y., Gu, J., & Shen, L. (2011). Analysis and
suggestions for the security of web applications. In
Computer Science and Network Technology (ICCSNT),
2011 International Conference on, Vol. 1, pp. 236-240
[11] Pravin Kharat, Pramila Chawan, “Vulnerability
Management System”, 2021 International Research
Journal of Engineering and Technology (IRJET), 25-28
Nov 2021
BIOGRAPHIES
Pravin P. Kharat
1’st M Tech. Dept. of Computer
Author Engineering – NIMS, VJTI,
Photo Mumbai
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 6