The web today is a rising universe of interlinked web pages and web apps, crawling with videos, photos and interactive content. Web is very interactive nowadays to which we are calling web intelligence. The security standards we are providing with the web are not benchmark enough, it requires more security. It leads us to learn and develop intelligent web security testing with threat assessment and client server penetration testing. It results about security of any website you are testing. In this paper, we have implemented threat assessment and attacks which can be possible on web by using burp suite. We have also demonstrated about procedure of threat and attack testing and client server penetration using burp suite. The last paper has concluded corrective action to protect your web from various implemented as well as tested threats and attacks.
- Web security
- Cyber security
- Web intelligence
- Penetration testing
- Attack assessment
This is a preview of subscription content, access via your institution.
Tax calculation will be finalised at checkout
Purchases are for personal use onlyLearn about institutional subscriptions
<-!Burp Suite: Video Tutorials - Portswigger.net at https://portswigger.net/burp/tutorials/Burp Suite - Portswigger.net at https://portswigger.net/burp/ !->
OSPI Threat Assessment (2013). http://www.k12.wa.us/.
Meier, J. D., Mackman A., Dunner, M., & Vasireddy S. (2010). Ray escamilla and anandha murukan improving web application security: threats and countermeasures. http://msdn.microsoft.com.
Gohel, H. A. (2014). Looking back at the evolution of the internet. CSI Communications—Knowledge Digest for IT Community 38(6), 23–26. http://www.csi-india.org/.
Fonseca, J. (2011). CISUC—Polithecnic Institute of Guarda, Guarda; Vieira, M.; Madeira, H. Testing and Comparing Web Vulnerability Scanning Tools for SQL Injection and XSS Attacks, Available at: http://ieeexplore.ieee.org/.
Microsoft Improving Web Application Security: Threats and Countermeasures. (2013). http://msdn.microsoft.com/.
Trustwave. (2014). Application Vulnerability Trends Report. https://www2.trustwave.com (2014).
PortSwigger “PortSwigger Web Security Blog”.(2014). http://blog.portswigger.net/.
Vangie Beal Spider. (2014). http://www.webopedia.com/.
Antonyms Open Web Application Security Project (OWASP). (2013). https://www.owasp.org.
Hardik, G. (2015). Design and development of combined algorithm computing technique to enhance web security. International Journal of Innovative and Emerging Research in Engineering (IJIERE), 2(1), 76–79.
Hardik, G. (2015). Design of intelligent web based social media for data personalization. International Journal of Innovative and Emerging Research in Engineering(IJIERE) 2.1: 42–45.
Hardik, G., & Upadhyay, A. (2012). Reinforcement of knowledge grid multi-agent model for e-governance inventiveness in India. Academic Journal 53.3: 232.
Gohel, H., & Gondalia, V. (2013). Executive information advancement of knowledge based decision support system for organization of United Kingdom.
Jenniferc. (2014). A burp suite tutorial: learn the basics. https://www.udemy.com.
Gohel, H. (2015). Role of machine translation for multilingual social media. CSI Communications—Knowledge Digest for IT Community 35–38.
Gohel, H., & Sharma, Priyanka. (2015). Study of quantum computing with significance of machine learning. CSI Communications—Knowledge Digest for IT Community, 38(11), 21–23.
Editors and Affiliations
© 2016 Springer Science+Business Media Singapore
About this paper
Cite this paper
Gohel, H., Sharma, P. (2016). Intelligent Web Security Testing with Threat Assessment and Client Server Penetration. In: Satapathy, S., Joshi, A., Modi, N., Pathak, N. (eds) Proceedings of International Conference on ICT for Sustainable Development. Advances in Intelligent Systems and Computing, vol 409. Springer, Singapore. https://doi.org/10.1007/978-981-10-0135-2_54
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-0133-8
Online ISBN: 978-981-10-0135-2