REFERENCES
Babincev, I. M. and Vuleti
´
c, D. V. (2016). Web application
security analysis using the kali linux operating system.
Vojnotehni
ˇ
cki glasnik, 64(2):513–531.
Bairwa, S., Mewara, B., and Gajrani, J. (2014). Vulnerabil-
ity scanners-a proactive approach to assess web appli-
cation security. arXiv preprint arXiv:1403.6955.
Bau, J., Wang, F., Bursztein, E., Mutchler, P., and Mitchell,
J. C. (2012). Vulnerability factors in new web appli-
cations: Audit tools, developer selection & languages.
Stanford, Tech. Rep.
BAYKARA, M. (2018). Investigation and comparison of
web application vulnerabilities test tools.
Charpentier Rojas, J. E. (2013). Web application security.
Eshete, B., Villafiorita, A., and Weldemariam, K. (2011).
Early detection of security misconfiguration vulnera-
bilities in web applications. In 2011 Sixth Interna-
tional Conference on Availability, Reliability and Se-
curity, pages 169–174. IEEE.
Gunawan, T. S., Lim, M. K., Zulkurnain, N. F., and Kartiwi,
M. (2018). On the review and setup of security audit
using kali linux. Indonesian Journal of Electrical En-
gineering and Computer Science, 11(1):51–59.
Joshi, C. and Singh, U. K. (2016). Performance evaluation
of web application security scanners for more effec-
tive defense. International Journal of Scientific and
Research Publications (IJSRP), 6(6):660–667.
M. Sevri, N. T. (2016). An infrastructure model to detect
and prevent web attacks.
Mahmoud, S. K., Alfonse, M., Roushdy, M. I., and Salem,
A.-B. M. (2017). A comparative analysis of cross site
scripting (xss) detecting and defensive techniques. In
2017 Eighth International Conference on Intelligent
Computing and Information Systems (ICICIS), pages
36–42. IEEE.
Mitropoulos, D., Louridas, P., Polychronakis, M., and
Keromytis, A. D. (2017). Defending against web ap-
plication attacks: approaches, challenges and implica-
tions. IEEE Transactions on Dependable and Secure
Computing, 16(2):188–203.
Montieri, A., Ciuonzo, D., Bovenzi, G., Persico, V., and
Pescap
´
e, A. (2019). A dive into the dark web: Hierar-
chical traffic classification of anonymity tools. IEEE
Transactions on Network Science and Engineering.
Nath, H. V. (2011). Vulnerability assessment methods–a
review. In International Conference on Network Se-
curity and Applications, pages 1–10. Springer.
Qadir, S. and Quadri, S. (2016). Information availability:
An insight into the most important attribute of in-
formation security. Journal of Information Security,
7(3):185–194.
Subedi, B., Alsadoon, A., Prasad, P., and Elchouemi, A.
(2016). Secure paradigm for web application develop-
ment. In 2016 15th RoEduNet Conference: Network-
ing in Education and Research, pages 1–6. IEEE.
Sumra, I. A., Hasbullah, H. B., and AbManan, J.-l. B.
(2015). Attacks on security goals (confidentiality, in-
tegrity, availability) in vanet: a survey. In Vehicu-
lar Ad-Hoc Networks for Smart Cities, pages 51–61.
Springer.
Tajpour, A., Ibrahim, S., and Masrom, M. (2011). Sql in-
jection detection and prevention techniques. Interna-
tional Journal of Advancements in Computing Tech-
nology, 3(7):82–91.
Walden, J. (2008). Integrating web application security into
the it curriculum. In Proceedings of the 9th ACM SIG-
ITE conference on Information technology education,
pages 187–192.
Website Security Analysis of Department and Integrated Services One Door of XYZ Regency using Kali Linux
233