Baseline: Metrics for setting a baseline for web vulnerability scanners

Huning Dai; Michael Glass; Gail E. Kaiser

Baseline: Metrics for setting a baseline for web vulnerability scanners
Dai, Huning
Glass, Michael
Kaiser, Gail E.
Technical reports
Computer Science
Permanent URL:
Columbia University Computer Science Technical Reports
Part Number:
Department of Computer Science, Columbia University
Publisher Location:
New York
As web scanners are becoming more popular because they are faster and cheaper than security consultants, the trend of relying on these scanners also brings a great hazard: users can choose a weak or outdated scanner and trust incomplete results. Therefore, benchmarks are created to both evaluate and compare the scanners. Unfortunately, most existing benchmarks suffer from various drawbacks, often by testing against inappropriate criteria that does not reflect the user's needs. To deal with this problem, we present an approach called Baseline that coaches the user in picking the minimal set of weaknesses (i.e., a baseline) that a qualified scanner should be able to detect and also helps the user evaluate the effectiveness and efficiency of the scanner in detecting those chosen weaknesses. Baseline's goal is not to serve as a generic ranking system for web vulnerability scanners, but instead to help users choose the most appropriate scanner for their specific needs.
Computer science
Item views:
text | xml
Suggested Citation:
Huning Dai, Michael Glass, Gail E. Kaiser, 2010, Baseline: Metrics for setting a baseline for web vulnerability scanners, Columbia University Academic Commons, http://hdl.handle.net/10022/AC:P:10517.

In Partnership with the Center for Digital Research and Scholarship at Columbia University Libraries/Information Services | Terms of Use | Copyright