DefinePK

DefinePK hosts the largest index of Pakistani journals, research articles, news headlines, and videos. It also offers chapter-level book search.

Securing Web Applications: A Practical Approach to Mitigating OWASP Top 10 Vulnerabilities


Article Information

Title: Securing Web Applications: A Practical Approach to Mitigating OWASP Top 10 Vulnerabilities

Authors: Shah Aftab Khan, Nazia Azim, Asad Iqbal, Hassan Abbas, Sawera Qureshi

Journal: VFAST Transactions on Software Engineering

HEC Recognition History
Category From To
Y 2024-10-01 2025-12-31
Y 2023-07-01 2024-09-30
Y 2022-07-01 2023-06-30
Y 2021-07-01 2022-06-30

Publisher: VFAST-Research Platform

Country: Pakistan

Year: 2025

Volume: 13

Issue: 2

Language: en

DOI: 10.21015/vtse.v13i2.2145

Categories

Abstract

The exponential growth of online platforms and application has made us believe that securing web apps is more important to mitigate attacks viz., data breaches, frauds, unauthorized access etc. But web applications are still vulnerable in a number of ways that can be abused by attackers. In this context, we propose a pipeline to identify and reduce security threats in web applications, focusing on the OWASP Top 10 vulnerabilities — highly publicized risks with clear exploitation vector; namely: injection attacks, broken authentication, sensitive data exposure or cross-site scripting. For every vulnerability, we cover them with practical demonstrations by using BeeWAP (Beehive's Educational Web Application Platform), an intentionally vulnerable web application for the Web testing and security education purpose. The vulnerabilities are analyzed based on real-world contexts in BeeWAP platform, which helps to assess the implications of web application security. We are using techniques of standard tools like Burp Suite to find these weak points and also implementing countermeasures, hence gives an all-in-one manual focused on securing applications from threats.It elaborates a methodology to identify vulnerabilities, perform risk analysis to develop security models that respond specifically to the identified OWASP Top 10 vulnerabilities. In this paper, we demonstrate real-time risk mitigation by simulating common attack vectors and showing the resulting insight into good practices for securing web applications. In this direction, the present paper tries to step forward towards reconciliation between theory and practice, by providing a structured model that represents a compromise that security personnel and developers can use directly in order to improve defensive capability in applications. More specifically, our results emphasize the importance of constant vulnerability testing and continual training of cybersafety measures on protected infrastructures. These practices, when enacted by developers, can bolster defenses against the ever-evolving nature of cyber threats and ultimately lead to more trustworthy and reliable web applications.


Paper summary is not available for this article yet.

Loading PDF...

Loading Statistics...