International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 183 - Number 29 |
Year of Publication: 2021 |
Authors: Akwasi Amponsah, Richard Amankwah, Daniel PaaKorsah |
10.5120/ijca2021921677 |
Akwasi Amponsah, Richard Amankwah, Daniel PaaKorsah . Application of T-SEC to Measure the Performance of Static Analyzers and Penetration Testing Approaches. International Journal of Computer Applications. 183, 29 ( Oct 2021), 33-36. DOI=10.5120/ijca2021921677
Software vulnerability analysis is very relevant in the process of investigating the existence of bugs (referred to as vulnerabilities) in software application. Recently, several empirical studies such as static code analyzers (SCA) and penetration testing approaches such as web vulnerability scanners (WVS) have been purported to aid the analysis of vulnerabilities in web applications. Although, there are several SCA and penetration testing tools (both open and commercial source) proposed in literature, the performance of these tools varies and make vendors skeptical in relation to the one most suited for detecting a particular type of vulnerability or bug, have a high precision and recall value, a low false positive and a high detection rate.In this study, we applied the standard evaluation criteria (T-SEC), namely precision and recall, Youden index, OWASP web benchmark evaluation (WBE) and the web application security scanner evaluation criteria (WASSEC) to measure the performance of the aforementioned approaches using the Damn Vulnerable Web Application (DVWA) and extracted report from the Juliet Test Suite.