Requirement engineering for Web applications

Author(s):  
Li Zhang
2022 ◽  
pp. 453-479
Author(s):  
Layla Mohammed Alrawais ◽  
Mamdouh Alenezi ◽  
Mohammad Akour

The growth of web-based applications has increased tremendously from last two decades. While these applications bring huge benefits to society, yet they suffer from various security threats. Although there exist various techniques to ensure the security of web applications, still a large number of applications suffer from a wide variety of attacks and result in financial loses. In this article, a security-testing framework for web applications is proposed with an argument that security of an application should be tested at every stage of software development life cycle (SDLC). Security testing is initiated from the requirement engineering phase using a keyword-analysis phase. The output of the first phase serves as input to the next phase. Different case study applications indicate that the framework assists in early detection of security threats and applying appropriate security measures. The results obtained from the implementation of the proposed framework demonstrated a high detection ratio with a less false-positive rate.


2018 ◽  
Vol 6 (3) ◽  
pp. 93-117 ◽  
Author(s):  
Layla Mohammed Alrawais ◽  
Mamdouh Alenezi ◽  
Mohammad Akour

The growth of web-based applications has increased tremendously from last two decades. While these applications bring huge benefits to society, yet they suffer from various security threats. Although there exist various techniques to ensure the security of web applications, still a large number of applications suffer from a wide variety of attacks and result in financial loses. In this article, a security-testing framework for web applications is proposed with an argument that security of an application should be tested at every stage of software development life cycle (SDLC). Security testing is initiated from the requirement engineering phase using a keyword-analysis phase. The output of the first phase serves as input to the next phase. Different case study applications indicate that the framework assists in early detection of security threats and applying appropriate security measures. The results obtained from the implementation of the proposed framework demonstrated a high detection ratio with a less false-positive rate.


2018 ◽  
pp. 49-57
Author(s):  
N. A. Gluzman

In the modern educational space regarding the realities of the information society special importance is attached to issues related to the provision of a high level of informatization of education, which implies teachers’ mastering the necessary competencies and the ability to introduce e-learning resources into educational and training practice. Adobe Flash as one of the platforms for creating web applications and multimedia presentations enjoys greatest popularity with users including teachers. However, in connection with the announcement of discontinuing Adobe Flash support in 2020, the issue of choosing an analog to create web applications and presentations for use in teaching purposes is becoming particularly relevant. The article provides a comprehensive analysis of developing electronic educational resources by teachers using Adobe Flash and HTML5 for teaching math in primary school.


Author(s):  
Maragathavalli P. ◽  
Seshankkumar M. ◽  
Dhivakaran V. ◽  
Ravindran S.

Author(s):  
Lalit Kumar Garg ◽  
◽  
Preeti Rani ◽  
Deepika Goyal ◽  
◽  
...  

Author(s):  
Amit Sharma

Distributed Denial of Service attacks are significant dangers these days over web applications and web administrations. These assaults pushing ahead towards application layer to procure furthermore, squander most extreme CPU cycles. By asking for assets from web benefits in gigantic sum utilizing quick fire of solicitations, assailant robotized programs use all the capacity of handling of single server application or circulated environment application. The periods of the plan execution is client conduct checking and identification. In to beginning with stage by social affair the data of client conduct and computing individual user’s trust score will happen and Entropy of a similar client will be ascertained. HTTP Unbearable Load King (HULK) attacks are also evaluated. In light of first stage, in recognition stage, variety in entropy will be watched and malevolent clients will be recognized. Rate limiter is additionally acquainted with stop or downsize serving the noxious clients. This paper introduces the FAÇADE layer for discovery also, hindering the unapproved client from assaulting the framework.


Sign in / Sign up

Export Citation Format

Share Document