Abstract
Web vulnerability scanners (WVSs) are tools that can detect security vulnerabilities in web services. Although both commercial and open-source WVSs exist, their vulnerability detection capability and performance vary. In this article, we report on a comparative study to determine the vulnerability detection capabilities of eight WVSs (both open and commercial) using two vulnerable web applications: WebGoat and Damn vulnerable web application. The eight WVSs studied were: Acunetix; HP WebInspect; IBM AppScan; OWASP ZAP; Skipfish; Arachni; Vega; and Iron WASP. The performance was evaluated using multiple evaluation metrics: precision; recall; Youden index; OWASP web benchmark evaluation; and the web application security scanner evaluation criteria. The experimental results show that, while the commercial scanners are effective in detecting security vulnerabilities, some open-source scanners (such as ZAP and Skipfish) can also be effective. In summary, this study recommends improving the vulnerability detection capabilities of both the open-source and commercial scanners to enhance code coverage and the detection rate, and to reduce the number of false-positives.
Original language | English |
---|---|
Pages (from-to) | 1842-1857 |
Number of pages | 16 |
Journal | Software - Practice and Experience |
Volume | 50 |
Issue number | 9 |
DOIs | |
Publication status | Published - 1 Sept 2020 |
Keywords
- commercial scanners
- detection capability
- open-source scanners
- software vulnerability
- vulnerable web application
ASJC Scopus subject areas
- Software