RP Web Vulnerability
RP Web Vulnerability
vulnerability
Abstract—Internet usage and acceptance have expanded lightweight but at the same time the proposed approach allows
greatly in the recent past and this is done daily, therefore, high to implement both asynchronous scanning and building
security is a necessity. In turn, a web vulnerability scanner concurrent scan lists for space web vulnerabilities. Flask
(WVS) is an application to search a website and report if there proven framework for creating the applications compatible
is a threat to the developers or penetration testers and analyze with the web scale while Asyncio enables the scanner deal
so that the developer can secure it before deploying it for public with multiple requests in a time and efficient manner in the
use. Testing the application web is one of the most important large-scale system. This approach allows for faster scanning
thing in order to measure the successes, the completeness, safety without exacting a huge toll on the performance of the system
and the quality of the application. In this paper, there will be
making it ideal for small businesses as well as the large
elaboration about testing in few websites using different
scanners in five websites and the result will be focused on
corporations.
intended analysis on relevance result in each scanner. These are
results may help to achieve scanning on completion of the testing II. LITERATURE SURVEY
phase.
Using web based vulnerability scanners are almost
Keywords—Cross-site scripting(XSS), SQL injection,
indispensable in the effort to safeguard web applications from
Vulnerability, Directory Traversal, Insecure Cookie Handling, security threats. Web technologies alongside their growth rate
Remote File Inclusion(RFI). and complexity in cyber-attacks are the main reason for
researchers to look into different methods to improve the
efficiency and effectiveness of these scanners. This section
I. INTRODUCTION synthesises major findings from contemporary research
Web technologies have recently emerged as a commonly studies, outlines the methods, advantages, and limitations
used interface, and the attack surface for cyber threats connected to various vulnerability scanners.
continues to broaden as the application of web technologies
Another study with a variety of assumed goals has concerned
extends to numerous areas resulting in web applications
the increase in detection accuracy and the application of
becoming more prone to numerous security threats. As more
machine learning and AI. Other work investigates the
important business processes are undertaken online, the
integration of static and dynamic analysis where the level of
protection of such applications has become an issue of concern
precision is improved at the expense of accuracy. Other types
globally. Web vulnerability scanners are central to scanning
of systems have also been designed to bring together to
for flaws like SQL Injection, Cross site scripting (XSS) and
different scanner types offering more scanner coverage.
misconfigurations that might be potentially exploited.
However, traditional scanner technologies present certain Though these solutions enhance the detection rates, these also
issues concerning accuracy, their usage of resources and their expose the problem of recursive resource consumption and
scalability, particularly when used in large-scale environment. scalability particularly in global applications. There are
various research papers relating to comparative analysis of
To overcome these challenges, the new trends in the
different vulnerability scanner tools like OWASP ZAP,
development of approaches are working on combining the
Acunetix, Nikto, etc. that chiefly establish the fact the
utilization of Machine Learning (ML) and asynchronous
detection efficiency varies a lot from one tool to the other.
scanning that would help them to discover the vulnerable web
According to the findings, therefore, a method of scanner
without much need of resources. However, with these
selection should be according to the purpose because no
improvements in place, many of the existing scanners either
scanner type is superior to others. Some other researchers have
lack the capability to operate in environments with high traffic
also built lightweight scanners for small site oriented mainly
flow or cannot be scaled up adequately to meet enterprise-
towards resource-optimal approaches as they are inapplicable
level prerequisites. Second, there is still a large number of
for the large enterprises.
false positives which create extra burden on security
professionals who subsequently have to review them There has being a growing interest in recent years in AI-based
manually. vulnerability scanners. Information about such tools suggests
that they usually offering better results than simple scanners
Here, we proposed a web-based vulnerability scanner
in identifying the existing vulnerabilities, but they have their
developed from the Flask and Asyncio to mitigate these
own problems, such as increasing the consumption of
challenges. The architecture of the proposed system is rather
resources and various difficulties with their incorporation. For
example, the implementation of the convolutional neural
networks (CNN) has improved the detection precision even
though these models are computationally heavy thus Furthermore, in the case of zero-day attacks researchers have
inconvenient for use in real time. also developed ideas of unsupervised learning, which
promises detection, but experiences high ratio of false
Apart from enhancing the probability of the detection of positives.
vulnerabilities some researches have been carried out with a
view to minimizing on false positives, which is a major In the light of the above presented sources, it is worth noticing
challenge in vulnerability scanning. Some filtering techniques that there is no single or unified way to perform web
that have been invented include the use of artificial vulnerability scanning, there are constant efforts to optimize
intelligence techniques to reduce the occurrence of false the methods, while conserving the accuracy and efficiency of
positives, but such methods exclude little known or more the scanning process, as well as its scalability. But, there is
obscure types of vulnerability. However, other studies have still so much unexplored in how to optimize OSS resources
explored the use of vulnerability scanning in DevOps for large-scale projects, how to minimize such false positives,
practices, how to increase the level of security automation in and how to improve their ability to identify new or specialized
different CI/CD pipelines. types of flaws.
Sr. Year Author(s) Focus of the Key Points in Technique(s) Parameters Research Gaps
No. Paper Coverage Used Analyzed
1 2021 Smith et Automated Trust in ML- Static and Vulnerability High resource
al. detection of based hybrid dynamic analysis detection, usage for large-
web scanner for better computational scale
vulnerabilities accuracy resource usage deployment
2 2022 Zhang et Multi-scanner Comprehensive Multi-scanner, Coverage of Increased
al. for web scanning covering authenticated different web resource
vulnerabilities diverse scanning attacks consumption
vulnerabilities
3 2021 Kumar et Comparative Detection rate Benchmarking Comparative Tailored
al. analysis of variance across OWASP ZAP, performance of approaches
vulnerability different scanners Acunetix, Nikto tools on needed based on
scanners different apps use case
4 2020 Alice et Lightweight Resource-efficient Flask-based Performance of Not applicable
al. scanner for scanning for small async scanning scanners on for large-scale
small websites sites small business enterprise
websites applications
5 2023 Lopez et AI-driven AI tools Comparative Performance Resource
al. vulnerability outperform analysis of AI- and resource optimization
scanners traditional driven and consumption needed for AI-
scanners with traditional across industries driven tools
improved scanners
detection
6 2020 Wei et al. AI-based Increased Convolutional Performance on High resource
improvement in accuracy (15%) Neural Networks OWASP Top 10 consumption
detection using CNN for (CNN) vulnerabilities
accuracy vulnerability
detection
7 2021 John et al. Reduction of AI-based filtering Machine False positive Misses rare
false positives reducing false learning filtering reduction, vulnerabilities
in vulnerability positives by 30% detection
scanning reliability
B. METHODOLOGY:
To achieve high performance and response, asynchronous • The Reporting Module works on the output of the
programming is used parallelism which aiohttp uses in former into reports so that the user is, into a given
handling the incoming requests and asyncio is used to degree, aware of the vulnerability and how to handle
manage the multiple tests running on the URL’s. This it.
makes it possible to carry out the vulnerability checks at
• The Database is what keeps the whole system running Multiple Requests:
by maintaining user information along with the Usually every vulnerability checker is a unique request
historical data on scans, thus enabling ease of which if applied for URL scanning may require a large
management with the scanning process and number of request.
documenting findings.
HTML Parsing:
Some of the reconsiderations about discover_urls are as
follows. It uses BeautifulSoup for HTML parsing which
might be time-consuming when dealing with large pages.
Optimization Suggestions:
It has been established that numeric groups can overload
target servers and hence one has to practice ethical
scanning; therefore, apply rate limiting. Keep result of
URL discovery and scans and pass them to the next
requests instead of trying to discover and scan them from
the start. It is advised to try a quicker and less resource
consuming method for finding the URLs – as the
BeautifulSoup might be time consuming. Extend different
timeout values at operation level to avoid situations when
certain scans take long time, affect performance and block
the entire system. It may be useful to implement a worker
queue for large scans so as to reduce the pressure in one
worker and to increase the capacity of the system. In
generic, asynchronous programming approach is highly
beneficial for the application’s performance, although
Fig.2. Block Diagram of Proposed Model further improvements can be achieved in the fields of URL
discovery and the number of network
requests used per scan.
V. PERFORMANCE ANALYSIS
Concurrent Scans:
This function – scan_urls – also makes concurrent URL
scans using asyncio.gather and this shortens scanning time
considerably. Modular Design: This is logical marked by
separate functions per different evaluations of
vulnerability, and therefore potentially easier to alter or
enhance distinct segments. Fig.3 Comparison graph of Web Scanners