SlideShare a Scribd company logo
1 of 5
Download to read offline
International Journal of Electrical, Electronics and Computers (EEC Journal) [Vol-4, Issue-1, Jan-Feb 2019]
https://dx.doi.org/10.22161/eec.4.1.2 ISSN: 2456-2319
www.eecjournal.com Page | 15
Web Applications Assessment Tools:
Comparison and Discussion
Mohamad Swead1, Dr. Muhammad Mazen Almustafa2
1Department of web sciences, Syrian Virtual University
E-Mail: Mohamad_68263@svuonline.org
2Department of web sciences, Syrian Virtual University
E-Mail: t_mmustafa@svuonline.org
Abstract— Recently web applications have proliferated
rapidly, with the world increasingly dependent on
financial transactions, purchasing, billing, education,
medicine, and many more. But the security of these
applications is worrying because it directly affects the
end-user. Therefore, it is necessary to detect security
vulnerabilities in those applications that may cause
significant user problems. Most commonly used approach
to detect those vulnerabilities are assessments tools like
web scanners.
This paper will focus on usage of these web scanners and
their related methodology to detect the various
vulnerabilities in web applications and then compare
these scanners depending on results.
Keywords— Web scanner, SQL Injection, XSS,
Vulnerability, Assessment.
I. INTRODUCTION
One of the common misconceptions regarding
information security that they are related to computer
information! However, information security relates to all
aspects of information processing, transfer and storage,
whether through electronic or paper-based means.
From the very beginning of the emergence of
technology and computers, and throughout their growth
period, information security has been a difficult
challenge. The concept of information security is broad
but can be shortened by blocking access to information
and protecting data from unauthorized access.
The security features of Web applications are very
similar to the security features of other software systems
in terms of data confidentiality and integrity as well as the
period in which the application remains available for use.
The security features of Web applications are very
similar to the security features of other software systems
in terms of data confidentiality and integrity as well as the
period in which the application remains available for use.
There are still many security gaps in web applications as
developers often try to add many functions to their
applications, which requires the writing of many codes
that increase the likelihood of the emergence of coding
errors and thus increase the chances of security
vulnerabilities that are used to attack Web applications
and steal data or stop the web application for example.
Detecting or evaluating security vulnerabilities in
particular applications aims to identify weaknesses in
those applications in order to protect themfrom bad usage
by those who aim to harm those applications either by
targeting the availability of those applications or by
stealing certain critical information. Through this
proactive approach, application developers can identify
and overcome vulnerabilities before anyone else knows or
even before they are released to users.
II. WEB APPLICATION ASSESSMENT
TOOLS
Web application security assessment tools are divided
into several categories, including analysis of source code
(White Box), web application scanners (Black Box),
database scanners and other miscellaneous tools. The
most common security tools used to evaluate Web
applications are the analysis of source codes as well as
Web application scanners which we will focus on and test
some of these tools in this paper. [1]
Source code analysis (White Box) shows good results
in detecting security vulnerabilities in web applications,
but are useful only if the source code for those
applications is available, making this method limited.
Web application scanners (black box), which simulates
attacks on web applications in order to get the gaps and
threats in those applications, these tools usually have
some problems related to performance, speed and
accuracy.
III. WEB APPLICATION SECURITY
PROJECT (OWASP)
As a result of the increasing the importance of
application security, an open source and non-profit
organization focused on the security of web applications
emerged by clarifying the most important gaps, statistics
International Journal of Electrical, Electronics and Computers (EEC Journal) [Vol-3, Issue-1, Jan-Feb 2017]
https://dx.doi.org/10.24001/eec ISSN: 2456-2319
www.eecjournal.com Page |
16
and other important issues in this area (OWASP).
OWASP was founded on December 1, 2001 and was
established as a non-profit charity in the United States on
April 21, 2004 to ensure support and continued work.
OWASP is an open source community dedicated to
enabling organizations to develop and operate
applications that can be trusted and provide all documents
and forums free of charge to anyone who wishes to
improve application security. [1]
OWASP focuses on providing a higher level of security
for online applications by identifying vulnerabilities in
which applications may be vulnerable and which, if
exploited by attackers, could result in a loss of security
and confidentiality or a complete disruption of the
application. For example, security vulnerabilities may
exist in a particular application because of a query or
query for unreliable data, or by the possibility of breaking
authentication and session management. In addition,
cross-site scripting XSS is another security vulnerability
that is added to the list of vulnerabilities that threaten
Web applications where an attacker injects malicious
scripts into web pages. Another security vulnerability is
SQL injection, in which the attacker injects SQL
instruction into the application database through the same
interface, making the attacker able to review important
data or even modify the database. [1]
IV. VULNERABILITY SCANNERS
In this section, we will sort out some of web
applications scanner (Black Box):
A. SecuBat
SecuBat is an open source tool developed by a group of
researchers at the university of Vienna, based on black
box approach by crawling and scanning the Web
application for security vulnerabilities. This tool targets
four main vulnerabilities; SQL injection, simple reflected
XSS, encoded reflected XSS and Form-Redirecting XSS.
[2]
i) SecuBat components
This scanner consists of three main components;
• Crawling module: Collecting information about
targeted web application.
• Attack module: lunching series of attacks
towards targeted website depending on crawling results.
• Analysis module: analysis results of previous
stage in order to specify vulnerabilities in targeted web
application. [2]
ii) Implementation
SecuBat has been implemented using Windows Forms
.NET application in C#. In order to maintain a flexible
and open design, a general and modular structure has
been used, which, as we mentioned earlier, consists of
several modules (crawling, attack, analysis), which can be
called separately.
In terms of performance, Secure Bat was able to launch
15 to 20 attacks at the same time without forming a
burden on the processor of the computer from which the
attack is launched.
The following figure illustrates the attack architecture
followed by Secure Bat [2]
Fig.1: SecBat Architecture
iii) Results
We have install this tool in order to test it and here are the results;
International Journal of Electrical, Electronics and Computers (EEC Journal) [Vol-3, Issue-1, Jan-Feb 2017]
https://dx.doi.org/10.24001/eec ISSN: 2456-2319
www.eecjournal.com Page | 17
• Tool has an easy interface to use as appears in below figure;
Fig.2: SecBat GUI
• Tool is very limited
• We weren’t able to crawl on more than a URL at
a time
• We weren’t able to launch an attack where tool
became non-responsive and needs to be restarted
• Very limited in reporting if you wish to use units
of
B. Nessus
Nessus is a vulnerability scanner developed by Tenable
network security which cares about IT vulnerability
management. [3] Multiple scanning can be launched at a
time by crawling and detecting vulnerabilities in web
applications, then categorize these vulnerabilities
depending on its severity as the following; Critical, High,
Medium, Low, Info. This tool uses Client-Server model
where the session is controlled by user and the test runs on
server. In order to use this tool, you need to buy a license,
however trial version is provided.
Once scan is completed results can be shown in two
different ways depending on host or on vulnerability type
and results can be exported as HTML, PDF or CSV. [3]
We have installed trial version for testing purpose and after
testing more than 50 URL we have come with below
results;
• User interface as below figure
Fig.3: Nessus Web Interface
•
International Journal of Electrical, Electronics and Computers (EEC Journal) [Vol-3, Issue-1, Jan-Feb 2017]
https://dx.doi.org/10.24001/eec ISSN: 2456-2319
www.eecjournal.com Page |
18
Configuration of targeted host is somehow easy to use
with a lot of options where we can choose whether we
want to scan host for open ports or just for web
applications vulnerabilities.
• Generated report is providing description for all
vulnerabilities occurred in scanning.
• Crawling doesn’t show any information about
targeted host like used technologies (ASP, PHP, ...) or
server type (Apache, IIS, ...).
• We can scan full network subnet such as
192.168.1.0/24
C. ACUNETIX
ACUNETIX is company which have developed tools to
scan, analyze and mitigate web applications and websites.
This tool mainly focuses on web related attacks such as
SQL injection, XSS and more than 3000 type of
vulnerabilities. [4]
It automatically crawls targeted web application and
performs black box techniques. It works depending on
three main criteria includes;
• Target specification: ACUNETIX checks targets
and collect information regarding web technologies used,
web server type (APACHE, IIS ...) and then response with
proper filtering tests.
The figure below shows targeted URL specifications
Fig.4: ACUNTIX target specifications
• Site crawling and structure mapping: First the index file is located by URL, then specifying contained links, forms,
input fields and client side scripts that build a list of directories and files inside the web application.
The figure below shows site structure
Fig.5: ACUNTIX targeted site structure
• Pattern analysis: This process is executed against targeted URL in order to detect any available threats or
vulnerabilities.
The figure below shows discovered vulnerabilities
Fig.6: ACUNTIX Discovered vulnerabilities
International Journal of Electrical, Electronics and Computers (EEC Journal) [Vol-3, Issue-1, Jan-Feb 2017]
https://dx.doi.org/10.24001/eec ISSN: 2456-2319
www.eecjournal.com Page | 19
D. Tools Comparison
We have tried during our research to test main web scanners tools and we have come with below results on the basis of the
vulnerabilities these tools detect.
Table 1: Vulnerabilities based comparison
Secure BATNessusACUNETIXVulnerabilities
√√√SQL Injection
√√√Cross site Scripting
√√Improper Error
Management
√√Remote Code Execution
√Rogue Servers
In the following table, we will find comparison on different bases such (Ease of use,response time, reporting)
Table.2: Performance based comparison.
Secure
BAT
NessusACUNETIXFunction
GoodFairVery goodEase of use
GoodWeakGoodResponse time
WeakGoodVery goodReporting
V. CONCLUSION
Many kinds of techniques can be used to list the
vulnerabilities present in web applications. Assessment of
these vulnerabilities represents a significant role in securing
business environment. No one tool can detect all kinds of
vulnerabilities or providing easy environment to manage or
even building different kinds or reports that supported by
graphs.
In this research, we have focused on providing test bed to
test different kinds of tools in order to show their capabilities
and compare between it. There was another tool that we
couldn’t test it due to some limitation in providing proper
test bed for that or due to license issue like NIKTO,
BURPSUITE.
ACKNOWLEDGEMENTS
We would like to thank all people who help us especially
our families.
REFERENCES
[1] OWASP, 1 October 2018. [Online]. Available:
https://www.owasp.org/index.php/Main_Page.
[2] E. K. C. K. a. N. J. Stefan Kals, “SecuBat: A Web
Vulnerability Scanner,” International World Wide Web
Conference Committee, pp. 247-256, 2006.
[3] Nessus. [Online]. Available:
https://www.tenable.com/products/nessus/nessus-
professional. [Accessed 1 10 2018].
[4] ACUNTIX. [Online]. Available:
https://www.acunetix.com/. [Accessed 1 10 2018].
[5] C. Baojiang, L. Baolian and H. Tingting, “Reverse
analysis method of static XSS defect detection
technique based on database query language,” in P2P,
Parallel, Grid, Cloud and Internet Computing
(3PGCIC), 2014 Ninth International Conference on,
2014.

More Related Content

What's hot

Detect sqli attacks in web apps using nvs
Detect sqli attacks in web apps using nvsDetect sqli attacks in web apps using nvs
Detect sqli attacks in web apps using nvsijcseit
 
Research Article On Web Application Security
Research Article On Web Application SecurityResearch Article On Web Application Security
Research Article On Web Application SecuritySaadSaif6
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniqueseSAT Journals
 
Contending Malware Threat using Hybrid Security Model
Contending Malware Threat using Hybrid Security ModelContending Malware Threat using Hybrid Security Model
Contending Malware Threat using Hybrid Security ModelIRJET Journal
 
APPLICATION WHITELISTING: APPROACHES AND CHALLENGES
APPLICATION WHITELISTING: APPROACHES AND CHALLENGESAPPLICATION WHITELISTING: APPROACHES AND CHALLENGES
APPLICATION WHITELISTING: APPROACHES AND CHALLENGESIJCSEIT Journal
 
Routine Detection Of Web Application Defence Flaws
Routine Detection Of Web Application Defence FlawsRoutine Detection Of Web Application Defence Flaws
Routine Detection Of Web Application Defence FlawsIJTET Journal
 
IRJET - Web Vulnerability Scanner
IRJET - Web Vulnerability ScannerIRJET - Web Vulnerability Scanner
IRJET - Web Vulnerability ScannerIRJET Journal
 
SQL Injection Prevention by Adaptive Algorithm
SQL Injection Prevention by Adaptive AlgorithmSQL Injection Prevention by Adaptive Algorithm
SQL Injection Prevention by Adaptive AlgorithmIOSR Journals
 
Analysis of XSS attack Mitigation techniques based on Platforms and Browsers
Analysis of XSS attack Mitigation techniques based on Platforms and BrowsersAnalysis of XSS attack Mitigation techniques based on Platforms and Browsers
Analysis of XSS attack Mitigation techniques based on Platforms and Browserscscpconf
 
IRJET - Detecting Spiteful Accounts in Social Network
IRJET - Detecting Spiteful Accounts in Social NetworkIRJET - Detecting Spiteful Accounts in Social Network
IRJET - Detecting Spiteful Accounts in Social NetworkIRJET Journal
 
Sqlas tool to detect and prevent attacks in php web applications
Sqlas tool to detect and prevent attacks in php web applicationsSqlas tool to detect and prevent attacks in php web applications
Sqlas tool to detect and prevent attacks in php web applicationsijsptm
 
SOURCE CODE ANALYSIS TO REMOVE SECURITY VULNERABILITIES IN JAVA SOCKET PROGR...
SOURCE CODE ANALYSIS TO REMOVE SECURITY  VULNERABILITIES IN JAVA SOCKET PROGR...SOURCE CODE ANALYSIS TO REMOVE SECURITY  VULNERABILITIES IN JAVA SOCKET PROGR...
SOURCE CODE ANALYSIS TO REMOVE SECURITY VULNERABILITIES IN JAVA SOCKET PROGR...IJNSA Journal
 
IRJET- Testing Web Application using Vulnerability Scan
IRJET- Testing Web Application using Vulnerability ScanIRJET- Testing Web Application using Vulnerability Scan
IRJET- Testing Web Application using Vulnerability ScanIRJET Journal
 

What's hot (15)

Detect sqli attacks in web apps using nvs
Detect sqli attacks in web apps using nvsDetect sqli attacks in web apps using nvs
Detect sqli attacks in web apps using nvs
 
Survey mobile app
Survey mobile appSurvey mobile app
Survey mobile app
 
Research Article On Web Application Security
Research Article On Web Application SecurityResearch Article On Web Application Security
Research Article On Web Application Security
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniques
 
Contending Malware Threat using Hybrid Security Model
Contending Malware Threat using Hybrid Security ModelContending Malware Threat using Hybrid Security Model
Contending Malware Threat using Hybrid Security Model
 
APPLICATION WHITELISTING: APPROACHES AND CHALLENGES
APPLICATION WHITELISTING: APPROACHES AND CHALLENGESAPPLICATION WHITELISTING: APPROACHES AND CHALLENGES
APPLICATION WHITELISTING: APPROACHES AND CHALLENGES
 
Routine Detection Of Web Application Defence Flaws
Routine Detection Of Web Application Defence FlawsRoutine Detection Of Web Application Defence Flaws
Routine Detection Of Web Application Defence Flaws
 
IRJET - Web Vulnerability Scanner
IRJET - Web Vulnerability ScannerIRJET - Web Vulnerability Scanner
IRJET - Web Vulnerability Scanner
 
SQL Injection Prevention by Adaptive Algorithm
SQL Injection Prevention by Adaptive AlgorithmSQL Injection Prevention by Adaptive Algorithm
SQL Injection Prevention by Adaptive Algorithm
 
Analysis of XSS attack Mitigation techniques based on Platforms and Browsers
Analysis of XSS attack Mitigation techniques based on Platforms and BrowsersAnalysis of XSS attack Mitigation techniques based on Platforms and Browsers
Analysis of XSS attack Mitigation techniques based on Platforms and Browsers
 
IRJET - Detecting Spiteful Accounts in Social Network
IRJET - Detecting Spiteful Accounts in Social NetworkIRJET - Detecting Spiteful Accounts in Social Network
IRJET - Detecting Spiteful Accounts in Social Network
 
Ijcatr04041018
Ijcatr04041018Ijcatr04041018
Ijcatr04041018
 
Sqlas tool to detect and prevent attacks in php web applications
Sqlas tool to detect and prevent attacks in php web applicationsSqlas tool to detect and prevent attacks in php web applications
Sqlas tool to detect and prevent attacks in php web applications
 
SOURCE CODE ANALYSIS TO REMOVE SECURITY VULNERABILITIES IN JAVA SOCKET PROGR...
SOURCE CODE ANALYSIS TO REMOVE SECURITY  VULNERABILITIES IN JAVA SOCKET PROGR...SOURCE CODE ANALYSIS TO REMOVE SECURITY  VULNERABILITIES IN JAVA SOCKET PROGR...
SOURCE CODE ANALYSIS TO REMOVE SECURITY VULNERABILITIES IN JAVA SOCKET PROGR...
 
IRJET- Testing Web Application using Vulnerability Scan
IRJET- Testing Web Application using Vulnerability ScanIRJET- Testing Web Application using Vulnerability Scan
IRJET- Testing Web Application using Vulnerability Scan
 

Similar to Web Applications Assessment Tools: Comparison and Discussion

Vulnerability Management System
Vulnerability Management SystemVulnerability Management System
Vulnerability Management SystemIRJET Journal
 
IRJET- Underpinning the Impact of Web Application Security on Businesses ...
IRJET-  	  Underpinning the Impact of Web Application Security on Businesses ...IRJET-  	  Underpinning the Impact of Web Application Security on Businesses ...
IRJET- Underpinning the Impact of Web Application Security on Businesses ...IRJET Journal
 
A Study on Vulnerability Management
A Study on Vulnerability ManagementA Study on Vulnerability Management
A Study on Vulnerability ManagementIRJET Journal
 
QUALITY ASSURANCE AND INTEGRATION TESTING ASPECTS IN WEB BASED APPLICATIONS
QUALITY ASSURANCE AND INTEGRATION TESTING ASPECTS IN WEB BASED APPLICATIONSQUALITY ASSURANCE AND INTEGRATION TESTING ASPECTS IN WEB BASED APPLICATIONS
QUALITY ASSURANCE AND INTEGRATION TESTING ASPECTS IN WEB BASED APPLICATIONSIJCSEA Journal
 
Vulnerability Management in IT Infrastructure
Vulnerability Management in IT InfrastructureVulnerability Management in IT Infrastructure
Vulnerability Management in IT InfrastructureIRJET Journal
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...ijcseit
 
DETECT SQLI ATTACKS IN WEB APPS USING NVS
DETECT SQLI ATTACKS IN WEB APPS USING NVSDETECT SQLI ATTACKS IN WEB APPS USING NVS
DETECT SQLI ATTACKS IN WEB APPS USING NVSijcseit
 
SECURING THE WEB DOMAIN BASED ON HASHING
SECURING THE WEB DOMAIN BASED ON HASHINGSECURING THE WEB DOMAIN BASED ON HASHING
SECURING THE WEB DOMAIN BASED ON HASHINGAM Publications
 
website vulnerability scanner and reporter research paper
website vulnerability scanner and reporter research paperwebsite vulnerability scanner and reporter research paper
website vulnerability scanner and reporter research paperBhagyashri Chalakh
 
Standardizing Source Code Security Audits
Standardizing Source Code Security AuditsStandardizing Source Code Security Audits
Standardizing Source Code Security Auditsijseajournal
 
IRJET-A Review of Testing Technology in Web Application System
IRJET-A Review of Testing Technology in Web Application SystemIRJET-A Review of Testing Technology in Web Application System
IRJET-A Review of Testing Technology in Web Application SystemIRJET Journal
 
OFFTECH TOOL AND END URL FINDER
OFFTECH TOOL AND END URL FINDEROFFTECH TOOL AND END URL FINDER
OFFTECH TOOL AND END URL FINDERIRJET Journal
 
SOURCE CODE ANALYSIS TO REMOVE SECURITY VULNERABILITIES IN JAVA SOCKET PROGRA...
SOURCE CODE ANALYSIS TO REMOVE SECURITY VULNERABILITIES IN JAVA SOCKET PROGRA...SOURCE CODE ANALYSIS TO REMOVE SECURITY VULNERABILITIES IN JAVA SOCKET PROGRA...
SOURCE CODE ANALYSIS TO REMOVE SECURITY VULNERABILITIES IN JAVA SOCKET PROGRA...IJNSA Journal
 
COMBINING REUSABLE TEST CASES AND CONTINUOUS SECURITY TESTING FOR REDUCING WE...
COMBINING REUSABLE TEST CASES AND CONTINUOUS SECURITY TESTING FOR REDUCING WE...COMBINING REUSABLE TEST CASES AND CONTINUOUS SECURITY TESTING FOR REDUCING WE...
COMBINING REUSABLE TEST CASES AND CONTINUOUS SECURITY TESTING FOR REDUCING WE...ijseajournal
 
Self-Protecting Technology for Web Applications
Self-Protecting Technology for Web ApplicationsSelf-Protecting Technology for Web Applications
Self-Protecting Technology for Web ApplicationsIRJET Journal
 
Analytic Hierarchy Process-based Fuzzy Measurement to Quantify Vulnerabilitie...
Analytic Hierarchy Process-based Fuzzy Measurement to Quantify Vulnerabilitie...Analytic Hierarchy Process-based Fuzzy Measurement to Quantify Vulnerabilitie...
Analytic Hierarchy Process-based Fuzzy Measurement to Quantify Vulnerabilitie...IJCNCJournal
 
ANALYTIC HIERARCHY PROCESS-BASED FUZZY MEASUREMENT TO QUANTIFY VULNERABILITIE...
ANALYTIC HIERARCHY PROCESS-BASED FUZZY MEASUREMENT TO QUANTIFY VULNERABILITIE...ANALYTIC HIERARCHY PROCESS-BASED FUZZY MEASUREMENT TO QUANTIFY VULNERABILITIE...
ANALYTIC HIERARCHY PROCESS-BASED FUZZY MEASUREMENT TO QUANTIFY VULNERABILITIE...IJCNCJournal
 
Analytic Hierarchy Process-based Fuzzy Measurement to Quantify Vulnerabilitie...
Analytic Hierarchy Process-based Fuzzy Measurement to Quantify Vulnerabilitie...Analytic Hierarchy Process-based Fuzzy Measurement to Quantify Vulnerabilitie...
Analytic Hierarchy Process-based Fuzzy Measurement to Quantify Vulnerabilitie...IJCNCJournal
 
Web Application Testing for Today’s Biggest and Emerging Threats
Web Application Testing for Today’s Biggest and Emerging ThreatsWeb Application Testing for Today’s Biggest and Emerging Threats
Web Application Testing for Today’s Biggest and Emerging ThreatsAlan Kan
 

Similar to Web Applications Assessment Tools: Comparison and Discussion (20)

Vulnerability Management System
Vulnerability Management SystemVulnerability Management System
Vulnerability Management System
 
IRJET- Underpinning the Impact of Web Application Security on Businesses ...
IRJET-  	  Underpinning the Impact of Web Application Security on Businesses ...IRJET-  	  Underpinning the Impact of Web Application Security on Businesses ...
IRJET- Underpinning the Impact of Web Application Security on Businesses ...
 
A Study on Vulnerability Management
A Study on Vulnerability ManagementA Study on Vulnerability Management
A Study on Vulnerability Management
 
QUALITY ASSURANCE AND INTEGRATION TESTING ASPECTS IN WEB BASED APPLICATIONS
QUALITY ASSURANCE AND INTEGRATION TESTING ASPECTS IN WEB BASED APPLICATIONSQUALITY ASSURANCE AND INTEGRATION TESTING ASPECTS IN WEB BASED APPLICATIONS
QUALITY ASSURANCE AND INTEGRATION TESTING ASPECTS IN WEB BASED APPLICATIONS
 
Vulnerability Management in IT Infrastructure
Vulnerability Management in IT InfrastructureVulnerability Management in IT Infrastructure
Vulnerability Management in IT Infrastructure
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...
 
DETECT SQLI ATTACKS IN WEB APPS USING NVS
DETECT SQLI ATTACKS IN WEB APPS USING NVSDETECT SQLI ATTACKS IN WEB APPS USING NVS
DETECT SQLI ATTACKS IN WEB APPS USING NVS
 
SECURING THE WEB DOMAIN BASED ON HASHING
SECURING THE WEB DOMAIN BASED ON HASHINGSECURING THE WEB DOMAIN BASED ON HASHING
SECURING THE WEB DOMAIN BASED ON HASHING
 
website vulnerability scanner and reporter research paper
website vulnerability scanner and reporter research paperwebsite vulnerability scanner and reporter research paper
website vulnerability scanner and reporter research paper
 
Standardizing Source Code Security Audits
Standardizing Source Code Security AuditsStandardizing Source Code Security Audits
Standardizing Source Code Security Audits
 
IRJET-A Review of Testing Technology in Web Application System
IRJET-A Review of Testing Technology in Web Application SystemIRJET-A Review of Testing Technology in Web Application System
IRJET-A Review of Testing Technology in Web Application System
 
OFFTECH TOOL AND END URL FINDER
OFFTECH TOOL AND END URL FINDEROFFTECH TOOL AND END URL FINDER
OFFTECH TOOL AND END URL FINDER
 
SOURCE CODE ANALYSIS TO REMOVE SECURITY VULNERABILITIES IN JAVA SOCKET PROGRA...
SOURCE CODE ANALYSIS TO REMOVE SECURITY VULNERABILITIES IN JAVA SOCKET PROGRA...SOURCE CODE ANALYSIS TO REMOVE SECURITY VULNERABILITIES IN JAVA SOCKET PROGRA...
SOURCE CODE ANALYSIS TO REMOVE SECURITY VULNERABILITIES IN JAVA SOCKET PROGRA...
 
Research Paper
Research PaperResearch Paper
Research Paper
 
COMBINING REUSABLE TEST CASES AND CONTINUOUS SECURITY TESTING FOR REDUCING WE...
COMBINING REUSABLE TEST CASES AND CONTINUOUS SECURITY TESTING FOR REDUCING WE...COMBINING REUSABLE TEST CASES AND CONTINUOUS SECURITY TESTING FOR REDUCING WE...
COMBINING REUSABLE TEST CASES AND CONTINUOUS SECURITY TESTING FOR REDUCING WE...
 
Self-Protecting Technology for Web Applications
Self-Protecting Technology for Web ApplicationsSelf-Protecting Technology for Web Applications
Self-Protecting Technology for Web Applications
 
Analytic Hierarchy Process-based Fuzzy Measurement to Quantify Vulnerabilitie...
Analytic Hierarchy Process-based Fuzzy Measurement to Quantify Vulnerabilitie...Analytic Hierarchy Process-based Fuzzy Measurement to Quantify Vulnerabilitie...
Analytic Hierarchy Process-based Fuzzy Measurement to Quantify Vulnerabilitie...
 
ANALYTIC HIERARCHY PROCESS-BASED FUZZY MEASUREMENT TO QUANTIFY VULNERABILITIE...
ANALYTIC HIERARCHY PROCESS-BASED FUZZY MEASUREMENT TO QUANTIFY VULNERABILITIE...ANALYTIC HIERARCHY PROCESS-BASED FUZZY MEASUREMENT TO QUANTIFY VULNERABILITIE...
ANALYTIC HIERARCHY PROCESS-BASED FUZZY MEASUREMENT TO QUANTIFY VULNERABILITIE...
 
Analytic Hierarchy Process-based Fuzzy Measurement to Quantify Vulnerabilitie...
Analytic Hierarchy Process-based Fuzzy Measurement to Quantify Vulnerabilitie...Analytic Hierarchy Process-based Fuzzy Measurement to Quantify Vulnerabilitie...
Analytic Hierarchy Process-based Fuzzy Measurement to Quantify Vulnerabilitie...
 
Web Application Testing for Today’s Biggest and Emerging Threats
Web Application Testing for Today’s Biggest and Emerging ThreatsWeb Application Testing for Today’s Biggest and Emerging Threats
Web Application Testing for Today’s Biggest and Emerging Threats
 

Recently uploaded

Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncssuser2ae721
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniquesugginaramesh
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 

Recently uploaded (20)

Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniques
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 

Web Applications Assessment Tools: Comparison and Discussion

  • 1. International Journal of Electrical, Electronics and Computers (EEC Journal) [Vol-4, Issue-1, Jan-Feb 2019] https://dx.doi.org/10.22161/eec.4.1.2 ISSN: 2456-2319 www.eecjournal.com Page | 15 Web Applications Assessment Tools: Comparison and Discussion Mohamad Swead1, Dr. Muhammad Mazen Almustafa2 1Department of web sciences, Syrian Virtual University E-Mail: Mohamad_68263@svuonline.org 2Department of web sciences, Syrian Virtual University E-Mail: t_mmustafa@svuonline.org Abstract— Recently web applications have proliferated rapidly, with the world increasingly dependent on financial transactions, purchasing, billing, education, medicine, and many more. But the security of these applications is worrying because it directly affects the end-user. Therefore, it is necessary to detect security vulnerabilities in those applications that may cause significant user problems. Most commonly used approach to detect those vulnerabilities are assessments tools like web scanners. This paper will focus on usage of these web scanners and their related methodology to detect the various vulnerabilities in web applications and then compare these scanners depending on results. Keywords— Web scanner, SQL Injection, XSS, Vulnerability, Assessment. I. INTRODUCTION One of the common misconceptions regarding information security that they are related to computer information! However, information security relates to all aspects of information processing, transfer and storage, whether through electronic or paper-based means. From the very beginning of the emergence of technology and computers, and throughout their growth period, information security has been a difficult challenge. The concept of information security is broad but can be shortened by blocking access to information and protecting data from unauthorized access. The security features of Web applications are very similar to the security features of other software systems in terms of data confidentiality and integrity as well as the period in which the application remains available for use. The security features of Web applications are very similar to the security features of other software systems in terms of data confidentiality and integrity as well as the period in which the application remains available for use. There are still many security gaps in web applications as developers often try to add many functions to their applications, which requires the writing of many codes that increase the likelihood of the emergence of coding errors and thus increase the chances of security vulnerabilities that are used to attack Web applications and steal data or stop the web application for example. Detecting or evaluating security vulnerabilities in particular applications aims to identify weaknesses in those applications in order to protect themfrom bad usage by those who aim to harm those applications either by targeting the availability of those applications or by stealing certain critical information. Through this proactive approach, application developers can identify and overcome vulnerabilities before anyone else knows or even before they are released to users. II. WEB APPLICATION ASSESSMENT TOOLS Web application security assessment tools are divided into several categories, including analysis of source code (White Box), web application scanners (Black Box), database scanners and other miscellaneous tools. The most common security tools used to evaluate Web applications are the analysis of source codes as well as Web application scanners which we will focus on and test some of these tools in this paper. [1] Source code analysis (White Box) shows good results in detecting security vulnerabilities in web applications, but are useful only if the source code for those applications is available, making this method limited. Web application scanners (black box), which simulates attacks on web applications in order to get the gaps and threats in those applications, these tools usually have some problems related to performance, speed and accuracy. III. WEB APPLICATION SECURITY PROJECT (OWASP) As a result of the increasing the importance of application security, an open source and non-profit organization focused on the security of web applications emerged by clarifying the most important gaps, statistics
  • 2. International Journal of Electrical, Electronics and Computers (EEC Journal) [Vol-3, Issue-1, Jan-Feb 2017] https://dx.doi.org/10.24001/eec ISSN: 2456-2319 www.eecjournal.com Page | 16 and other important issues in this area (OWASP). OWASP was founded on December 1, 2001 and was established as a non-profit charity in the United States on April 21, 2004 to ensure support and continued work. OWASP is an open source community dedicated to enabling organizations to develop and operate applications that can be trusted and provide all documents and forums free of charge to anyone who wishes to improve application security. [1] OWASP focuses on providing a higher level of security for online applications by identifying vulnerabilities in which applications may be vulnerable and which, if exploited by attackers, could result in a loss of security and confidentiality or a complete disruption of the application. For example, security vulnerabilities may exist in a particular application because of a query or query for unreliable data, or by the possibility of breaking authentication and session management. In addition, cross-site scripting XSS is another security vulnerability that is added to the list of vulnerabilities that threaten Web applications where an attacker injects malicious scripts into web pages. Another security vulnerability is SQL injection, in which the attacker injects SQL instruction into the application database through the same interface, making the attacker able to review important data or even modify the database. [1] IV. VULNERABILITY SCANNERS In this section, we will sort out some of web applications scanner (Black Box): A. SecuBat SecuBat is an open source tool developed by a group of researchers at the university of Vienna, based on black box approach by crawling and scanning the Web application for security vulnerabilities. This tool targets four main vulnerabilities; SQL injection, simple reflected XSS, encoded reflected XSS and Form-Redirecting XSS. [2] i) SecuBat components This scanner consists of three main components; • Crawling module: Collecting information about targeted web application. • Attack module: lunching series of attacks towards targeted website depending on crawling results. • Analysis module: analysis results of previous stage in order to specify vulnerabilities in targeted web application. [2] ii) Implementation SecuBat has been implemented using Windows Forms .NET application in C#. In order to maintain a flexible and open design, a general and modular structure has been used, which, as we mentioned earlier, consists of several modules (crawling, attack, analysis), which can be called separately. In terms of performance, Secure Bat was able to launch 15 to 20 attacks at the same time without forming a burden on the processor of the computer from which the attack is launched. The following figure illustrates the attack architecture followed by Secure Bat [2] Fig.1: SecBat Architecture iii) Results We have install this tool in order to test it and here are the results;
  • 3. International Journal of Electrical, Electronics and Computers (EEC Journal) [Vol-3, Issue-1, Jan-Feb 2017] https://dx.doi.org/10.24001/eec ISSN: 2456-2319 www.eecjournal.com Page | 17 • Tool has an easy interface to use as appears in below figure; Fig.2: SecBat GUI • Tool is very limited • We weren’t able to crawl on more than a URL at a time • We weren’t able to launch an attack where tool became non-responsive and needs to be restarted • Very limited in reporting if you wish to use units of B. Nessus Nessus is a vulnerability scanner developed by Tenable network security which cares about IT vulnerability management. [3] Multiple scanning can be launched at a time by crawling and detecting vulnerabilities in web applications, then categorize these vulnerabilities depending on its severity as the following; Critical, High, Medium, Low, Info. This tool uses Client-Server model where the session is controlled by user and the test runs on server. In order to use this tool, you need to buy a license, however trial version is provided. Once scan is completed results can be shown in two different ways depending on host or on vulnerability type and results can be exported as HTML, PDF or CSV. [3] We have installed trial version for testing purpose and after testing more than 50 URL we have come with below results; • User interface as below figure Fig.3: Nessus Web Interface •
  • 4. International Journal of Electrical, Electronics and Computers (EEC Journal) [Vol-3, Issue-1, Jan-Feb 2017] https://dx.doi.org/10.24001/eec ISSN: 2456-2319 www.eecjournal.com Page | 18 Configuration of targeted host is somehow easy to use with a lot of options where we can choose whether we want to scan host for open ports or just for web applications vulnerabilities. • Generated report is providing description for all vulnerabilities occurred in scanning. • Crawling doesn’t show any information about targeted host like used technologies (ASP, PHP, ...) or server type (Apache, IIS, ...). • We can scan full network subnet such as 192.168.1.0/24 C. ACUNETIX ACUNETIX is company which have developed tools to scan, analyze and mitigate web applications and websites. This tool mainly focuses on web related attacks such as SQL injection, XSS and more than 3000 type of vulnerabilities. [4] It automatically crawls targeted web application and performs black box techniques. It works depending on three main criteria includes; • Target specification: ACUNETIX checks targets and collect information regarding web technologies used, web server type (APACHE, IIS ...) and then response with proper filtering tests. The figure below shows targeted URL specifications Fig.4: ACUNTIX target specifications • Site crawling and structure mapping: First the index file is located by URL, then specifying contained links, forms, input fields and client side scripts that build a list of directories and files inside the web application. The figure below shows site structure Fig.5: ACUNTIX targeted site structure • Pattern analysis: This process is executed against targeted URL in order to detect any available threats or vulnerabilities. The figure below shows discovered vulnerabilities Fig.6: ACUNTIX Discovered vulnerabilities
  • 5. International Journal of Electrical, Electronics and Computers (EEC Journal) [Vol-3, Issue-1, Jan-Feb 2017] https://dx.doi.org/10.24001/eec ISSN: 2456-2319 www.eecjournal.com Page | 19 D. Tools Comparison We have tried during our research to test main web scanners tools and we have come with below results on the basis of the vulnerabilities these tools detect. Table 1: Vulnerabilities based comparison Secure BATNessusACUNETIXVulnerabilities √√√SQL Injection √√√Cross site Scripting √√Improper Error Management √√Remote Code Execution √Rogue Servers In the following table, we will find comparison on different bases such (Ease of use,response time, reporting) Table.2: Performance based comparison. Secure BAT NessusACUNETIXFunction GoodFairVery goodEase of use GoodWeakGoodResponse time WeakGoodVery goodReporting V. CONCLUSION Many kinds of techniques can be used to list the vulnerabilities present in web applications. Assessment of these vulnerabilities represents a significant role in securing business environment. No one tool can detect all kinds of vulnerabilities or providing easy environment to manage or even building different kinds or reports that supported by graphs. In this research, we have focused on providing test bed to test different kinds of tools in order to show their capabilities and compare between it. There was another tool that we couldn’t test it due to some limitation in providing proper test bed for that or due to license issue like NIKTO, BURPSUITE. ACKNOWLEDGEMENTS We would like to thank all people who help us especially our families. REFERENCES [1] OWASP, 1 October 2018. [Online]. Available: https://www.owasp.org/index.php/Main_Page. [2] E. K. C. K. a. N. J. Stefan Kals, “SecuBat: A Web Vulnerability Scanner,” International World Wide Web Conference Committee, pp. 247-256, 2006. [3] Nessus. [Online]. Available: https://www.tenable.com/products/nessus/nessus- professional. [Accessed 1 10 2018]. [4] ACUNTIX. [Online]. Available: https://www.acunetix.com/. [Accessed 1 10 2018]. [5] C. Baojiang, L. Baolian and H. Tingting, “Reverse analysis method of static XSS defect detection technique based on database query language,” in P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), 2014 Ninth International Conference on, 2014.