facto security standard of OWASP - the Open Web
Application Security Project.
Vulnerability scanners represent tools for
monitoring and management. They can be used to
check for security problems not only computer
networks and separate computers but also
applications, including web applications.
Many researchers have tackled the use of
vulnerability scanners for solving security problems
in web applications: Richard R. Linde, 1975; Kals S.
et el. 2006; The Government of the Hong Kong
Special Administrative Region, 2008; Fong E. et el.,
2008; Suto Larry, 2007; Kulmanov A and
Atymtayeva L, 2016; Nurmyshev S, et el., 2016.
Analysing the mentioned research and practical
experience, we realize that even though vulnerability
scanners are often used in web application security
assessment, there is little done on the development
of web-based vulnerability scanners using intelligent
expert-based tools. We can argue that embedding
expert systems in such vulnerability scanners would
not only increase effectiveness but would also
decrease the cost of an OWASP auditing process.
We can currently observe a great potential for
using expert systems in the process of information
security auditing, justified by research reported in
Atymtayeva L. et el., 2011, 2012, 2013, 2014;
Kanatov M. et el., 2014.
Summarizing the findings in the mentioned
research, we draw the conclusion that expert systems
can usefully help in decreasing the cost of
information security auditing that is characterized by
high complexity features.
For this reason, it is not surprising that recently
publications are increasing that are touching upon
this and envisioning adaptive network security:
Crispan Cowan et al., 1998; Robert E. Gleichauf
et.al., 2001; Wahyudi, Winda et al., 2007; Xiangqian
Chen, 2009; Ksiezopolski B. et al, 2009; Karthick R
et al., 2012 and etc.
We can distinguish between two major
technologies, namely: security analysis (safety
assessment) and detection of attacks (intrusion
detection).
The current paper focuses particularly on
security analysis. With regard to this, considering
the traditional active auditing process, we establish
that the network consists of communication
channels, routers, switches, hubs, servers, and so on.
All those network elements must be assessed for
their effectiveness as it concerns prevention of
attacks.
Vulnerability scanning tools allow us to explore
the network, by looking for 'weak places' and by
analysing identified issues, taking into account
corresponding scanning results; in this, different
kinds of reports can be generated.
A current web security scanner represents a
multi-functional and highly complex product.
Therefore, it must be tested and compared with
similar solutions which have a number of features. It
is therefore interesting to analyse and test such
scanners, and compare their features with similar
solutions.
Below we list several problem types that may
pop up during a scanning process:
–Backdoor in code from third-party libraries;
–Use of default or weak passwords;
–Misconfiguration of the firewall, web-servers
and other server infrastructure;
–Unnecessary network services;
--Discover the SQL Injections consequences.
These and other security problems may become a
reason for the high level of vulnerability of web
based applications.
Hearing 'panacea' success stories about powerful
security analysis systems (scanners), one would
come to believe that those systems are the definitive
security solution. However, it is not rare that a user
may encounter new kinds of vulnerability, for
example, in operating system that cannot be
captured by network security scanners. Usually, it
would happen because this vulnerability in operating
system work is not presented in the vulnerability
scanner database, and this is one of the aspects that
are inherent in all security analysis systems. Those
systems are intended to detect only known
vulnerabilities whose description is contained in
their databases. In this they are similar to anti-virus
applications that need to constantly update their
signature databases in order to work properly.
Thus, as mentioned already, we consider as a
possible solution direction the use of the multiple
expertises of auditors (referring to this as to a
knowledge base) in the productive OWASP auditing
process; this could be an effective update with
regard to the use of vulnerability scanners (Paul E.,
2006; Wichers D., 2013).
In the following sections we consider the
questions regarding the selection and using of
vulnerability scanners (Section 2), design and
simulation of fuzzy expert system in combination
with vulnerability scanners (Section 3). In
conclusion we summarize the research information
of the topic of this paper and give the directions for
further development.
An Intelligent Approach and Data Management in Active Security Auditing Processes for Web Based Applications
137