scholarly journals Cloud based Agile Methodology Test Automation for Web Application by Using Tanh Activated Clustering and Classification Model (TACC) in Machine Learning

Webology ◽  
2021 ◽  
Vol 18 (Special Issue 05) ◽  
pp. 1137-1157
Author(s):  
V. Vamsi Krishna ◽  
G. Gopinath

Automatic functional tests are a long-standing issue in software development projects, and they are still carried out manually. The Selenium testing framework has gained popularity as an active community and standard environment for automated assessment of web applications. As a result, the trend setting of web services is evolving on a daily basis, and there is a need to improve automatic testing. The study involves to make the system to understand the experiences of previous test cases and apply new cases to predict the status of test case using Tanh activated Clustering and Classification model (TACC). The primary goal is to improve the model's clustering and classification output. The outcomes show that the TACC model has increased performance and demonstrated that automated testing results can be predicted, which is cost effective and reduces manual effort to a greater extent.

2019 ◽  
Vol 10 (2) ◽  
pp. 1-26 ◽  
Author(s):  
Munish Khanna ◽  
Naresh Chauhan ◽  
Dilip Kumar Sharma

Regression testing of evolving software is a critical constituent of the software development process. Due to resources constraints, test case prioritization is one of the strategies followed in regression testing during which a test case that satisfies predefined objectives the most, as the tester perceives, would be executed the earliest. In this study, all the experiments were performed on three web applications consisting of 65 to 100 pages with lines of code ranging from 5000 to 7000. Various state-of-the-art approaches such as, heuristic approaches, Greedy approaches, and meta heuristic approaches were applied so as to identify the prioritized test sequence which maximizes the value of average percentage of fault detection. Performance of these algorithms was compared using different parameters and it was concluded that the Artificial Bee Colony algorithm performs better than all. Two novel greedy algorithms are also proposed in the study, of which the goal is to smartly manage the state of a tie, where a tie exhibits the condition that all the test cases participating in the tie are of equal significance in achieving the objective. It has also been validated that the performance of these novel proposed algorithm(s) is better than that of traditionally followed greedy approach, most of the time.


Author(s):  
Jesús Morán ◽  
Cristian Augusto ◽  
Antonia Bertolino ◽  
Claudio De La Riva ◽  
Javier Tuya

Web application testing is a great challenge due to the management of complex asynchronous communications, the concurrency between the clients-servers, and the heterogeneity of resources employed. It is difficult to ensure that a test case is re-running in the same conditions because it can be executed in undesirable ways according to several environmental factors that are not easy to fine-grain control such as network bottlenecks, memory issues or screen resolution. These environmental factors can cause flakiness, which occurs when the same test case sometimes obtains one test outcome and other times another outcome in the same application due to the execution of environmental factors. The tester usually stops relying on flaky test cases because their outcome varies during the re-executions. To fix and reduce the flakiness it is very important to locate and understand which environmental factors cause the flakiness. This paper is focused on the localization of the root cause of flakiness in web applications based on the characterization of the different environmental factors that are not controlled during testing. The root cause of flakiness is located by means of spectrum-based localization techniques that analyse the test execution under different combinations of the environmental factors that can trigger the flakiness. This technique is evaluated with an educational web platform called FullTeaching. As a result, our technique was able to locate automatically the root cause of flakiness and provide enough information to both understand it and fix it.


2021 ◽  
Vol 3 (2) ◽  
pp. 149
Author(s):  
Ripto Mukti Wibowo ◽  
Aruji Sulaksono

Web applications are needed as a solution to the use of internet technology that can be accessed globally, capable of displaying information that is rich in content, cost effective, easy to use and can also be accessed by anyone, anytime and anywhere. In the second quarter of 2020, Wearesocial released information related to internet users in the world around 4.54 billion with 59% penetration. People become very dependent on the internet and also technology. This condition was also triggered due to the Covid-19 pandemic.One thing that becomes an issue on website application security is internet attacks on website platforms and we never expected the vulnerability. One type of attack or security threat that often arises and often occurs is Cross Site Scripting (XSS). XSS is one of Top 10 Open Web Application Security Projects (OWASP) lists.There are several alternatives that we can use to prevent cyber-attack. OWASP Security Shepherd can be used as a way to prevent XSS attacks. The OWASP Security Shepherd project allows users to learn or develop their manual penetration testing skills. In this research, there are several case examples or challenges that we can use as a simulation of the role of OWASP Security Shepherd to detect this XSS. The purpose of this paper is to conduct a brief and clear review of technology on OWASP Security Shepherd. This technology was chosen as an appropriate and inexpensive alternative for users to ward off XSS attacks.


Symmetry ◽  
2020 ◽  
Vol 12 (11) ◽  
pp. 1770 ◽  
Author(s):  
Kavita Sahu ◽  
Fahad A. Alzahrani ◽  
R. K. Srivastava ◽  
Rajeev Kumar

The development of web applications essentially relies on users’ demands who expect highly efficacious but cost effective software services. Managing time and cost so as to develop web applications that cater to the users’ need is a challenge for developers at present. Moreover, low-cost maintenance can only be achieved by enhancing the durability of the web applications. Identifying characteristics of durability is a complex task because the different experts have different opinions regarding the significance of characteristics that determine durability quotient of the web applications. As established by the best practices undertaken in this context, some experts consider quality to be the most important factor for determining durability. Therefore, the present study enlists multi-criteria decision-based symmetrical technique to address the multi-vector option availability for the apt selection of the characteristics for durability. Furthermore, it has also been identified that a numerical assessment of web applications’ durability can affect the service life and low-cost management in web applications. In this context, to achieve high durability and longevity in web applications, this paper attempts to illustrate and perform a numerical evaluation of durability characteristics. By understanding the various characteristics and their significance towards durability, the paper finds that the hesitant fuzzy-based symmetrical technique of the Analytic Hierarchy Process (AHP) and Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) is an effective methodology for evaluating web applications’ durability. For evaluating the quality of the results and establishing their sensitivity, the authors have assessed the outcomes on six different projects of the University. Additionally, results assessed and discussed in this paper would be a conclusive reference for the developers in their attempts to develop highly durable and manageable web applications.


Author(s):  
Akihiro Hori ◽  
Shingo Takada ◽  
Toshiyuki Kurabayashi ◽  
Haruto Tanno

Much work has been done on automating regression testing for applications. But most of them focus on test execution. Little work has been done on automatically determining if a test case passes or fails. This decision is often made by comparing the results of executing test cases on a base version of the application and post-modification version of the application. If the two results match, the test case passes, otherwise fails. However, to the best of our knowledge, there is no regression testing method for automatically deciding pass/fail of dynamic Web applications which use JavaScript or CSS. We propose a method that automatically decides if a dynamic Web application passes a regression test case. The basic idea is to obtain a screenshot each time the GUI of the Web application (i.e. Web page) changes its state, and then compare each corresponding screenshot to see if they match. The evaluation results showed that the accuracy rate of our approach is high and our approach can be considered as fast enough for practical use.


2013 ◽  
Vol 16 (1) ◽  
Author(s):  
Luis Rivero ◽  
Raimundo Barreto ◽  
Tayana Conte

Usability is one of the most relevant quality aspects in Web applications. A Web application is usable if it provides a friendly, direct and easy to understand interface. Many Usability Inspection Methods (UIMs) have been proposed as a cost effective way to enhance usability. However, many companies are not aware of these UIMs and consequently, are not using them. A secondary study can identify, evaluate and interpret all data that is relevant to the current knowledge available regarding UIMs that have been used to evaluate Web applications in the past few decades. Therefore, we have extended a systematic mapping study about Usability Evaluation Methods by analyzing 26 of its research papers from which we extracted and categorized UIMs. We provide practitioners and researches with the rationale to understand both the strengths and weaknesses of the emerging UIMs for the Web. Furthermore, we have summarized the relevant information of the UIMs, which suggested new ideas or theoretical basis regarding usability inspection in the Web domain. In addition, we present a new UIM and a tool for Web usability inspection starting from the results shown in this paper.


Author(s):  
M. M. Klymash ◽  
O. M. Shpur ◽  
N. V. Pelekh

In this paper has been improved technique of security of web services against DDOS attacks based on the analysis of service information, which is based on monitoring of session duration spelled out in log files. This will increase the effectiveness of monitoring the security of web applications in distributed information systems after the attack of the first stage of its protection. The algorithm for monitoring the status of system based on log messages that are written to a file during the firewall stage has been proposed. Each message receives information such as web service request time and ip address. Using the time of access to the web service, you can track the attendance, and in the case of sharp differences with the number of visits in the previous intervals, to say about a possible attack. IP addresses us by tracking the number of requests from each request source, tracking who is causing the attack. Investigation of the effectiveness developed web application security monitoring system in distributed information communications systems has shown that at a time when the number of visits is increasing dramatically, the schedule is growing rapidly. This indicates a possible attack. If the current number of visits increases 10 times more than the average per day, the system will notify you. To do this, the data on visits for the year were uploaded to the database and the system was checked when the load increased. From the test results, we were able to verify that as the number of visits for the current hour increased, the system reported an attack. To visually check the operation of the algorithm, a graphical interface was proposed, which shows the state of the system, and a schedule of visits at 3 intervals: per day, per month, per year. Visual inspection allows you to quickly make sure that the conclusion about the attack is not wrong


Author(s):  
Indra Kharisma Raharjana ◽  
Fadel Harris ◽  
Army Justitia

Background: Testing using Behavior-Driven Development (BDD) techniques is one of the practices of Agile software development. This technique composes a test-case based on a use case scenario, for web application acceptance tests.Objective:  In this study, we developed a tool to generate test case codes from BDD scenario definitions to help and facilitate practitioners to conduct testing.Methods: The generated test case code is made according to the codeception framework format so that it can be directly executed by the tester. The procedure is performed as follows:  map the correlation of the language used in BDD (gherkin language) and the code syntax of the test code in the codeception framework, designed the GUIs in such a way that users can easily transform the Use Case Scenario, built the tool so that it can generate test cases codes. Evaluation is done by gathering respondents; ask to run the application and gathering feedback from respondents.Results: This tool can generate a codeception test-case file based on the BDD scenario. Generated test cases can be directly used on codeception tools. The results of the evaluation show that the tools can help entry-level programmers in developing automated tests.Conclusion: The tool can help user especially entry-level programmers to generate BDD test-case and make easy for the users for testing the web applications.


2018 ◽  
Vol 7 (4.1) ◽  
pp. 14
Author(s):  
Najla’a Ateeq Mohammed Draib ◽  
Abu Bakar Md Sultan ◽  
Abdul Azim B Abd Ghani ◽  
Hazura Zulzalil

Structured query language injection vulnerability (SQLIV) is one of the most prevalent and serious web application vulnerabilities that can be exploited by SQL injection attack (SQLIA) to gain unauthorized access to restricted data, bypass authentication mechanism, and execute unauthorized data manipulation language. Hence, testing web applications for detecting such vulnerabilities is very imperative. Recently, several security testing approaches have been proposed to detect SQL injection vulnerabilities. However, there is no up-to-date comparative study of these approaches that could be used to help security practitioners and researchers in selecting an appropriate approach for their needs.In this paper, six criteria's are identified to compare and analyze security testing approaches; vulnerability covered, testing approach, tool automation, false positive mitigation, vulnerability fixing, and test case/data generation. Using these criteria, a comparison was carried out to contrast the most prominent security testing approaches available in the literature. These criteria will aid both practitioners and researchers to select appropriate approaches according to their needs. Additionally, it will provide researchers with guidance that could help them make a preliminary decision prior to their proposal of new security testing approaches.  


Author(s):  
Namita Mohan* Kamble ◽  
Ramakanth Kumar P*

Software tests must be repeated frequently throughout development cycles to attain certain quality. Every time program code is changed software assessments need to be repeated. Once created, automated tests may be run repeatedly at no extra value and they may be tons quicker than manually conducted test and free from human errors. Automated software program testing can lessen the time to run repetitive tests from days to hours. Test automation can easily run thousands of different complex test cases in each test run, so there is no manual testing involved. But Automation testing has its own disadvantages one of it is that the testers should come from a programming background. To eliminate this dependency over programmers Scriptless automation testing tools are emerging. There are many Scriptless GUI automation testing tools in the market that use various methods to achieve the goal, this paper proposes a new record and playback method to achieve the same using Selenium framework and JavaScript for web application.


Sign in / Sign up

Export Citation Format

Share Document