Volltext-Downloads (blau) und Frontdoor-Views (grau)

Automatic Vulnerability Detection in Web Applications

  • Web applications play a crucial role in modern business operations but remain prime targets for cyberattacks due to the sensitive data they handle. Despite continuous advancements in cybersecurity, many applications are still susceptible to common vulnerabilities such as SQL Injection (SQLi), Cross-Site Scripting (XSS), Local File Inclusion (LFI), and Remote Code Execution (RCE), many of which areWeb applications play a crucial role in modern business operations but remain prime targets for cyberattacks due to the sensitive data they handle. Despite continuous advancements in cybersecurity, many applications are still susceptible to common vulnerabilities such as SQL Injection (SQLi), Cross-Site Scripting (XSS), Local File Inclusion (LFI), and Remote Code Execution (RCE), many of which are listed in the OWASP Top 10. Existing security tools often provide limited coverage, focusing on specific aspects like SSL validation or static code analysis, while failing to comprehensively detect and confirm exploitation attempts in real-world scenarios. This thesis addresses these gaps by leveraging AI-driven attack automation for vulnerability detection and analysis. The system integrates automated reconnaissance, penetration testing, and AI-assisted exploitation validation to identify security flaws dynamically. Unlike conventional tools that rely on static analysis, this approach executes real attack scenarios, analyzes system responses, and determines whether an exploit truly succeeded. The research specifically evaluates the effectiveness of AI models in generating attack execution commands, constructing multi-stage attack chains, and assessing post-exploitation outcomes. The system is tested against a controlled vulnerable web environment, measuring its accuracy, efficiency, and reliability in detecting and validating real vulnerabilities. A structured methodology is followed, beginning with a comprehensive literature review of web vulnerabilities and attack automation techniques, followed by the design, development, and experimental evaluation of the AI-driven penetration testing framework. The results indicate significant challenges in AI-assisted exploitation validation, with both models exhibiting high false positive rates and misclassification of vulnerabilities. However, the study highlights key areas for improvement, including enhancing AI’s exploit validation mechanisms and reducing false positives through contextual analysis. By bridging the gap between automated attack execution and intelligent exploit validation, this research contributes to the advancement of AI-driven penetration testing methodologies. The findings underscore the potential and limitations of current AI models in cybersecurity, paving the way for future enhancements in AI-assisted vulnerability assessment and exploitation validation techniques.show moreshow less

Download full text files

  • Master_Thesis_Patel_Dharmik.pdf
    eng

Export metadata

Statistics

frontdoor_oas
Metadaten
Document Type:Master's Thesis
Zitierlink: https://opus.hs-offenburg.de/10516
Bibliografische Angaben
Title (English):Automatic Vulnerability Detection in Web Applications
Author:Dharmik Patel
Advisor:Daniel Hammer, Lucas Kneffel
Year of Publication:2025
Publishing Institution:Hochschule Offenburg
Granting Institution:Hochschule Offenburg
Place of publication:Offenburg
Publisher:Hochschule Offenburg
Page Number:50
Language:English
Inhaltliche Informationen
Institutes:Fakultät Medien (M) (ab 22.04.2021)
Collections of the Offenburg University:Abschlussarbeiten / Master-Studiengänge / ENITS
DDC classes:600 Technik, Medizin, angewandte Wissenschaften
Tag:Artificial Intelligence; IT Security
Formale Angaben
Open Access: Closed 
Licence (German):License LogoUrheberrechtlich geschützt