International Journal of Innovative Research in Computer Science and Technology
Year: 2025, Volume: 13, Issue: 2
First page : ( 89) Last page : ( 95)
Online ISSN : 2350-0557.
DOI: 10.55524/ijircst.2025.13.2.13 |
DOI URL: https://doi.org/10.55524/ijircst.2025.13.2.13
Crossref
This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/by/4.0)
Article Tools: Print the Abstract | Indexing metadata | How to cite item | Email this article | Post a Comment
ShriKrishna Balwante , Jyotiraditya Dhamdhere, Kunal Pawar
Modern businesses heavily depend on web applications, while these platforms consistently serve as the main focus for cybercriminals. Current research demonstrates the necessity of advanced vulnerability discovery techniques to protect sensitive information. Research on vulnerability scanners includes a review of static analysis methods, dynamic scanning methods, and automated framework integration, which this paper summarizes. The research shows that static analysis tools cover all code fully but generate many false alerts; thus, static testing and dynamic methods both have limitations in covering web application vulnerabilities effectively. The merger of information from various scanners as part of automated penetration testing frameworks produces superior detection accuracy as well as elevated recall and improved F-measures. Additional research must concentrate on developing more advanced methods for integration techniques combined with adaptive machine learning and artificial intelligence to minimize the number of incorrect alerts.
Assistant Professor, Department of Master of Computer Application, School of Engineering, Ajeenkya D Y Patil University, Pune, India
No. of Downloads: 14 | No. of Views: 414
Jashanpreet Singh, Rajiv Kumar.
July 2025 - Vol 13, Issue 4
Satyadhar Joshi.
July 2025 - Vol 13, Issue 4
Prasad S R, Deepali, Samarth Jain, Samyakth Kumar, Sudeep D Gowda.
July 2025 - Vol 13, Issue 4