Penetration Testing Analysis with Standardized Report Generation Article Swipe
YOU?
·
· 2021
· Open Access
·
· DOI: https://doi.org/10.2991/ahis.k.210913.045
Penetration testing is a mirrored cyber-attack defined for identifying vulnerabilities and flaws in a computer system/Network/Web application-the organization appoints experts to conduct the test and present the details for deeper interpretation.One of the critical components of securing the network is to perform penetration tests of the network and web applications.In this paper, the industry-known OWASP (Open Web Application Security Project) vulnerability tool and three vulnerable web applications in a lab setup are explored and presented with a detailed analysis.Further, three penetration test reports are selected, and comprehensive analysis and reports are generated from the proposed setup.After the observation, it's understood that there is a lack of standardization format of the penetration testing reports.Therefore, this paper presents a format that will cater to the understanding of domain knowledge experts, decision-making bodies, and board members of the top executives of an organization for making further decisions on improving the robustness of their network and web applications.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.2991/ahis.k.210913.045
- https://www.atlantis-press.com/article/125960824.pdf
- OA Status
- hybrid
- Cited By
- 6
- References
- 27
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W3202927067
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W3202927067Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.2991/ahis.k.210913.045Digital Object Identifier
- Title
-
Penetration Testing Analysis with Standardized Report GenerationWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2021Year of publication
- Publication date
-
2021-01-01Full publication date if available
- Authors
-
Kousik Barik, A Abirami, Saptarshi Das, Karabi Konar, Archita BanerjeeList of authors in order
- Landing page
-
https://doi.org/10.2991/ahis.k.210913.045Publisher landing page
- PDF URL
-
https://www.atlantis-press.com/article/125960824.pdfDirect link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
hybridOpen access status per OpenAlex
- OA URL
-
https://www.atlantis-press.com/article/125960824.pdfDirect OA link when available
- Concepts
-
Penetration (warfare), Computer science, Engineering, Operations researchTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
6Total citation count in OpenAlex
- Citations by year (recent)
-
2024: 3, 2023: 1, 2022: 2Per-year citation counts (last 5 years)
- References (count)
-
27Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W3202927067 |
|---|---|
| doi | https://doi.org/10.2991/ahis.k.210913.045 |
| ids.doi | https://doi.org/10.2991/ahis.k.210913.045 |
| ids.mag | 3202927067 |
| ids.openalex | https://openalex.org/W3202927067 |
| fwci | 1.86768205 |
| type | article |
| title | Penetration Testing Analysis with Standardized Report Generation |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | |
| biblio.first_page | |
| topics[0].id | https://openalex.org/T10400 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9175000190734863 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1705 |
| topics[0].subfield.display_name | Computer Networks and Communications |
| topics[0].display_name | Network Security and Intrusion Detection |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C80107235 |
| concepts[0].level | 2 |
| concepts[0].score | 0.6056824326515198 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q7162625 |
| concepts[0].display_name | Penetration (warfare) |
| concepts[1].id | https://openalex.org/C41008148 |
| concepts[1].level | 0 |
| concepts[1].score | 0.4456496834754944 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[1].display_name | Computer science |
| concepts[2].id | https://openalex.org/C127413603 |
| concepts[2].level | 0 |
| concepts[2].score | 0.18997061252593994 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q11023 |
| concepts[2].display_name | Engineering |
| concepts[3].id | https://openalex.org/C42475967 |
| concepts[3].level | 1 |
| concepts[3].score | 0.06690990924835205 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q194292 |
| concepts[3].display_name | Operations research |
| keywords[0].id | https://openalex.org/keywords/penetration |
| keywords[0].score | 0.6056824326515198 |
| keywords[0].display_name | Penetration (warfare) |
| keywords[1].id | https://openalex.org/keywords/computer-science |
| keywords[1].score | 0.4456496834754944 |
| keywords[1].display_name | Computer science |
| keywords[2].id | https://openalex.org/keywords/engineering |
| keywords[2].score | 0.18997061252593994 |
| keywords[2].display_name | Engineering |
| keywords[3].id | https://openalex.org/keywords/operations-research |
| keywords[3].score | 0.06690990924835205 |
| keywords[3].display_name | Operations research |
| language | en |
| locations[0].id | doi:10.2991/ahis.k.210913.045 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4386872602 |
| locations[0].source.issn | 2589-4900, 2731-7900 |
| locations[0].source.type | conference |
| locations[0].source.is_oa | False |
| locations[0].source.issn_l | 2589-4900 |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | Atlantis Highlights in Computer Sciences/Atlantis highlights in computer sciences |
| locations[0].source.host_organization | https://openalex.org/P4310315540 |
| locations[0].source.host_organization_name | Atlantis Press |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310315540 |
| locations[0].source.host_organization_lineage_names | Atlantis Press |
| locations[0].license | cc-by-nc |
| locations[0].pdf_url | https://www.atlantis-press.com/article/125960824.pdf |
| locations[0].version | publishedVersion |
| locations[0].raw_type | proceedings-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by-nc |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Atlantis Highlights in Computer Sciences |
| locations[0].landing_page_url | https://doi.org/10.2991/ahis.k.210913.045 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5010619713 |
| authorships[0].author.orcid | https://orcid.org/0000-0001-9296-9561 |
| authorships[0].author.display_name | Kousik Barik |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Kousik Barik |
| authorships[0].is_corresponding | False |
| authorships[1].author.id | https://openalex.org/A5071635531 |
| authorships[1].author.orcid | |
| authorships[1].author.display_name | A Abirami |
| authorships[1].affiliations[0].raw_affiliation_string | Bannari Amman Institute of Technology, Erode, India |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | A Abirami |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Bannari Amman Institute of Technology, Erode, India |
| authorships[2].author.id | https://openalex.org/A5011415435 |
| authorships[2].author.orcid | https://orcid.org/0000-0002-0188-945X |
| authorships[2].author.display_name | Saptarshi Das |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Saptarshi Das |
| authorships[2].is_corresponding | False |
| authorships[3].author.id | https://openalex.org/A5027719630 |
| authorships[3].author.orcid | |
| authorships[3].author.display_name | Karabi Konar |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Karabi Konar |
| authorships[3].is_corresponding | False |
| authorships[4].author.id | https://openalex.org/A5057912248 |
| authorships[4].author.orcid | |
| authorships[4].author.display_name | Archita Banerjee |
| authorships[4].affiliations[0].raw_affiliation_string | JIS Institute of Advanced Studies & Research, JIS University, Kolkata, India |
| authorships[4].author_position | last |
| authorships[4].raw_author_name | Archita Banerjee |
| authorships[4].is_corresponding | False |
| authorships[4].raw_affiliation_strings | JIS Institute of Advanced Studies & Research, JIS University, Kolkata, India |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://www.atlantis-press.com/article/125960824.pdf |
| open_access.oa_status | hybrid |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Penetration Testing Analysis with Standardized Report Generation |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10400 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9175000190734863 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1705 |
| primary_topic.subfield.display_name | Computer Networks and Communications |
| primary_topic.display_name | Network Security and Intrusion Detection |
| related_works | https://openalex.org/W2748952813, https://openalex.org/W2390279801, https://openalex.org/W2358668433, https://openalex.org/W2376932109, https://openalex.org/W2001405890, https://openalex.org/W2382290278, https://openalex.org/W2478288626, https://openalex.org/W2350741829, https://openalex.org/W2530322880, https://openalex.org/W1596801655 |
| cited_by_count | 6 |
| counts_by_year[0].year | 2024 |
| counts_by_year[0].cited_by_count | 3 |
| counts_by_year[1].year | 2023 |
| counts_by_year[1].cited_by_count | 1 |
| counts_by_year[2].year | 2022 |
| counts_by_year[2].cited_by_count | 2 |
| locations_count | 1 |
| best_oa_location.id | doi:10.2991/ahis.k.210913.045 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4386872602 |
| best_oa_location.source.issn | 2589-4900, 2731-7900 |
| best_oa_location.source.type | conference |
| best_oa_location.source.is_oa | False |
| best_oa_location.source.issn_l | 2589-4900 |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | Atlantis Highlights in Computer Sciences/Atlantis highlights in computer sciences |
| best_oa_location.source.host_organization | https://openalex.org/P4310315540 |
| best_oa_location.source.host_organization_name | Atlantis Press |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310315540 |
| best_oa_location.source.host_organization_lineage_names | Atlantis Press |
| best_oa_location.license | cc-by-nc |
| best_oa_location.pdf_url | https://www.atlantis-press.com/article/125960824.pdf |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | proceedings-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by-nc |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Atlantis Highlights in Computer Sciences |
| best_oa_location.landing_page_url | https://doi.org/10.2991/ahis.k.210913.045 |
| primary_location.id | doi:10.2991/ahis.k.210913.045 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4386872602 |
| primary_location.source.issn | 2589-4900, 2731-7900 |
| primary_location.source.type | conference |
| primary_location.source.is_oa | False |
| primary_location.source.issn_l | 2589-4900 |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | Atlantis Highlights in Computer Sciences/Atlantis highlights in computer sciences |
| primary_location.source.host_organization | https://openalex.org/P4310315540 |
| primary_location.source.host_organization_name | Atlantis Press |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310315540 |
| primary_location.source.host_organization_lineage_names | Atlantis Press |
| primary_location.license | cc-by-nc |
| primary_location.pdf_url | https://www.atlantis-press.com/article/125960824.pdf |
| primary_location.version | publishedVersion |
| primary_location.raw_type | proceedings-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by-nc |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Atlantis Highlights in Computer Sciences |
| primary_location.landing_page_url | https://doi.org/10.2991/ahis.k.210913.045 |
| publication_date | 2021-01-01 |
| publication_year | 2021 |
| referenced_works | https://openalex.org/W3111959114, https://openalex.org/W3040021990, https://openalex.org/W2283823671, https://openalex.org/W3168881492, https://openalex.org/W3135109547, https://openalex.org/W3124756206, https://openalex.org/W3020788524, https://openalex.org/W3046133755, https://openalex.org/W3158731422, https://openalex.org/W3029841032, https://openalex.org/W3170518756, https://openalex.org/W2886143408, https://openalex.org/W2970004437, https://openalex.org/W3047757823, https://openalex.org/W2808680185, https://openalex.org/W2979496624, https://openalex.org/W3088560299, https://openalex.org/W1587035026, https://openalex.org/W3186745756, https://openalex.org/W3168798228, https://openalex.org/W3181787448, https://openalex.org/W2342922302, https://openalex.org/W2971802583, https://openalex.org/W3123676596, https://openalex.org/W3101488839, https://openalex.org/W3018623989, https://openalex.org/W2837225770 |
| referenced_works_count | 27 |
| abstract_inverted_index.a | 3, 13, 68, 76, 103, 116 |
| abstract_inverted_index.an | 138 |
| abstract_inverted_index.in | 12, 67 |
| abstract_inverted_index.is | 2, 39, 102 |
| abstract_inverted_index.of | 31, 35, 44, 105, 108, 124, 133, 137, 148 |
| abstract_inverted_index.on | 144 |
| abstract_inverted_index.to | 20, 40, 121 |
| abstract_inverted_index.Web | 56 |
| abstract_inverted_index.and | 10, 24, 47, 62, 73, 85, 88, 130, 151 |
| abstract_inverted_index.are | 71, 83, 90 |
| abstract_inverted_index.for | 7, 28, 140 |
| abstract_inverted_index.lab | 69 |
| abstract_inverted_index.the | 22, 26, 32, 37, 45, 52, 93, 96, 109, 122, 134, 146 |
| abstract_inverted_index.top | 135 |
| abstract_inverted_index.web | 48, 65, 152 |
| abstract_inverted_index.from | 92 |
| abstract_inverted_index.it's | 98 |
| abstract_inverted_index.lack | 104 |
| abstract_inverted_index.test | 23, 81 |
| abstract_inverted_index.that | 100, 118 |
| abstract_inverted_index.this | 50, 113 |
| abstract_inverted_index.tool | 61 |
| abstract_inverted_index.will | 119 |
| abstract_inverted_index.with | 75 |
| abstract_inverted_index.(Open | 55 |
| abstract_inverted_index.OWASP | 54 |
| abstract_inverted_index.board | 131 |
| abstract_inverted_index.cater | 120 |
| abstract_inverted_index.flaws | 11 |
| abstract_inverted_index.paper | 114 |
| abstract_inverted_index.setup | 70 |
| abstract_inverted_index.tests | 43 |
| abstract_inverted_index.their | 149 |
| abstract_inverted_index.there | 101 |
| abstract_inverted_index.three | 63, 79 |
| abstract_inverted_index.deeper | 29 |
| abstract_inverted_index.domain | 125 |
| abstract_inverted_index.format | 107, 117 |
| abstract_inverted_index.making | 141 |
| abstract_inverted_index.paper, | 51 |
| abstract_inverted_index.bodies, | 129 |
| abstract_inverted_index.conduct | 21 |
| abstract_inverted_index.defined | 6 |
| abstract_inverted_index.details | 27 |
| abstract_inverted_index.experts | 19 |
| abstract_inverted_index.further | 142 |
| abstract_inverted_index.members | 132 |
| abstract_inverted_index.network | 38, 46, 150 |
| abstract_inverted_index.perform | 41 |
| abstract_inverted_index.present | 25 |
| abstract_inverted_index.reports | 82, 89 |
| abstract_inverted_index.testing | 1, 111 |
| abstract_inverted_index.Project) | 59 |
| abstract_inverted_index.Security | 58 |
| abstract_inverted_index.analysis | 87 |
| abstract_inverted_index.appoints | 18 |
| abstract_inverted_index.computer | 14 |
| abstract_inverted_index.critical | 33 |
| abstract_inverted_index.detailed | 77 |
| abstract_inverted_index.experts, | 127 |
| abstract_inverted_index.explored | 72 |
| abstract_inverted_index.mirrored | 4 |
| abstract_inverted_index.presents | 115 |
| abstract_inverted_index.proposed | 94 |
| abstract_inverted_index.securing | 36 |
| abstract_inverted_index.decisions | 143 |
| abstract_inverted_index.generated | 91 |
| abstract_inverted_index.improving | 145 |
| abstract_inverted_index.knowledge | 126 |
| abstract_inverted_index.presented | 74 |
| abstract_inverted_index.selected, | 84 |
| abstract_inverted_index.components | 34 |
| abstract_inverted_index.executives | 136 |
| abstract_inverted_index.robustness | 147 |
| abstract_inverted_index.understood | 99 |
| abstract_inverted_index.vulnerable | 64 |
| abstract_inverted_index.Application | 57 |
| abstract_inverted_index.Penetration | 0 |
| abstract_inverted_index.identifying | 8 |
| abstract_inverted_index.penetration | 42, 80, 110 |
| abstract_inverted_index.setup.After | 95 |
| abstract_inverted_index.applications | 66 |
| abstract_inverted_index.cyber-attack | 5 |
| abstract_inverted_index.observation, | 97 |
| abstract_inverted_index.organization | 17, 139 |
| abstract_inverted_index.applications. | 153 |
| abstract_inverted_index.comprehensive | 86 |
| abstract_inverted_index.understanding | 123 |
| abstract_inverted_index.vulnerability | 60 |
| abstract_inverted_index.industry-known | 53 |
| abstract_inverted_index.application-the | 16 |
| abstract_inverted_index.applications.In | 49 |
| abstract_inverted_index.decision-making | 128 |
| abstract_inverted_index.standardization | 106 |
| abstract_inverted_index.vulnerabilities | 9 |
| abstract_inverted_index.analysis.Further, | 78 |
| abstract_inverted_index.interpretation.One | 30 |
| abstract_inverted_index.reports.Therefore, | 112 |
| abstract_inverted_index.system/Network/Web | 15 |
| cited_by_percentile_year.max | 97 |
| cited_by_percentile_year.min | 89 |
| countries_distinct_count | 0 |
| institutions_distinct_count | 5 |
| citation_normalized_percentile.value | 0.84043879 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |