SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6859
A Review of Testing Technology in Web Application System
Anirban Bhar1, Soumya Bhattacharyya2, Sujata Kundu3 , Shyamapriya Chatterjee4
1,2,3,4Department of Information Technology, Narula Institute of Technology, Kolkata, India.
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Software testing is important activity in
Software Development Life Cycle. Software testing is the
process of assessing the functionality and correctness of a
program through execution or analysis. Software-testing
process is expensive and consumes a lot of time through
software development life cycle. As software systems grow,
manual software testing becomes more and more difficult.
Therefore, there was always a need to decrease. Software
testing that is not fully exhaustive can only suggest the
presence of flaws and cannot prove their absence; moreoverit
is impossible to completely test an application. Thisworkaims
at the process of identifying the bottlenecks that are very
common to test in web application systems, bottlenecks that
are application specific and testing type specific, analyze the
reasons and provide recommendations that will make
Software Testing [1] to happen without bottlenecks or with
minimum bottlenecks.
Key Words: SDLC, Testing, Web application systems,
Bottlenecks.
INTRODUCTION
Software testing plays a vital role in the software
development life-cycle to recognize the difficulties in the
process very well [2]. The objective of testing is to find
problems and fix them to improve quality (Fig.1). Software
testing typically represents 40% of a software development
budget.
There are four main objectives of software testing [3]:
1) Demonstration: It demonstrates functions under special
conditions and shows thatproductsarereadyforintegration
or use.
2) Detection: It discovers defects, errors and deficiencies. It
determines system capabilities and limitations, quality of
components, work products and the system.
3) Prevention: It provides information to prevent or reduce
the number of errors clarify system specifications and
performance. Identify ways toavoidrisk andproblemsinthe
future.
4) Improving Quality: By doing effective testing, we can
minimize errors and hence improve the quality of software
[4].
Fig.1
Testing is the primary method that the Organization uses to
evaluate software under development. Software quality is
nothing but the fulfillment of the end user requirements.
Main areas where developers need to focus upon are quality
assurance, quality planning and quality control. Software
testing plays an important role in these areas by providing
the way of reducing the bugs from the application.
Software testing techniques is categorized in two main
areas: Manual testing and automated testing.
Automation Testing uses automation tools to execute test
cases. In manual testing, test cases are executed by a human
tester and software. Automated testing is significantlyfaster
than a manual approach. Automation is one major solution
for reducing high testing effort. Automating certain manual
tasks from software testing process can save a lot of testing
time. It can help in performing repetitive tasks more quickly
than manual testing.
Manual Testing vs. Automated Testing
In manual testing (as the name suggests), test cases are
executed manually (by a human, that is) withoutanysupport
from tools or scripts. But with automated testing, test cases
are executed with the assistance of tools, scripts, and
software.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6860
Testing is an integral part of any successful software project.
The type of testing (manual or automated) depends on
various factors, including project requirements, budget,
timeline, expertise, and suitability. Three vital factors of any
project are of course time, cost, and quality – the goal of any
successful project is to reduce the cost and time required to
complete it successfully while maintaining quality output.
When it comes to testing, one type may accomplish this goal
better than the other.
In short, manual testing is best suited to the following
areas/scenarios:
Exploratory Testing: This type of testing requires the tester’s
knowledge, experience, analytical/logical skills, creativity,
and intuition. The test is characterizedherebypoorlywritten
specification documentation, and/or a short time for
execution. We need the human skills to execute the testing
process in this scenario.
Usability Testing: This is an area in which you need to
measure how user-friendly, efficient, or convenient the
software or product is for the end users. Here, human
observation is the most important factor, so a manual
approach is preferable.
Ad-hoc Testing: In this scenario, there is nospecificapproach.
It is a totally unplanned method of testing where the
understanding and insight of the tester is the only important
factor.
Automated testing is the preferred option in the following
areas/scenarios:
Regression Testing: Here, automated testing is suitable
because of frequent code changes and the ability to run the
regressions in a timely manner.
Load Testing: Automated testing is also the best way to
completethe testing efficiently when it comes toloadtesting.
Learn more about load testing with our best practices guide
here.
Repeated Execution: Testing which requires the repeated
execution of a task is best automated.
Performance Testing: Similarly, testing which requires the
simulation of thousands of concurrent users requires
automation.
Web Application Architecture
Web application architecture defines the interactions
between applications, middleware systems and databasesto
ensuremultiple applicationscan work together.Whenauser
types in a URL and taps “Go,” the browser will find the
Internet-facing computer the website lives on and requests
that particular page.
The server then responds by sending files over to the
browser. After that action, the browserexecutesthosefilesto
show the requested page to the user. Now, the user gets to
interact with the website. Of course, all of these actions are
executed within a matter of seconds. Otherwise, users
wouldn’t bother with websites.
What’s important here is the code, which has been parsed by
the browser. This very code may or may not have specific
instructions telling the browser how to react to a wideswath
of inputs. As a result, web application architecture includes
all sub-components and external applications interchanges
for an entire software application.
Of course, it is designed to function efficiently while meeting
its specific needs and goals. Web application architecture is
critical since the majority of global network traffic, andevery
single app and device uses web-based communication. It
deals with scale, efficiency, robustness, and security.
Fig.2
Classes of Threats
Here are the different types of threats which can be used to
take advantage of security vulnerability.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6861
Privilege Elevation: Privilege elevation is a class of attack
where a hacker has an account on a system and uses it to
increase his system privileges to a higher level than he/she
was not meant to have. If successful, this type of attack can
result in a hacker gaining privileges as high as root on a UNIX
system. Once a hacker gains super-user privileges, he is able
to run code with this level of privilege and the entire system
is effectively compromised.
SQL Injection: SQL injection is the most common application
layer attack technique used by hackers, in which malicious
SQL statementsare inserted into an entry field for execution.
SQL injection attacks are very critical as an attacker can get
critical information from the server database. It is a type of
attack which takes the advantage of loopholes present in the
implementation of web applications that allows a hacker to
hack the system. To check the SQL injection we have to take
care of input fields like text boxes, comments, etc. To prevent
injections, special characters should be either properly
handled or skipped from the input.
Unauthorized Data Access: One of the more popular types of
attacks is gaining unauthorized access to data within an
application. Data can be accessed on servers or onanetwork.
Unauthorized access includes:
 Unauthorized access to data via data-fetching
operations
 Unauthorized access to reusable client
authenticationinformationbymonitoringtheaccess
of others
 Unauthorized access to data by monitoring the
access of others
URL Manipulation: URL manipulation is the process of
manipulating the website URL query strings & capture of the
important information by hackers. This happens when the
application uses the HTTP GET method to pass information
between the client and the server. The information is passed
in parameters in the query string. The tester can modify a
parameter value in the query string to check if the server
accepts it.
Denial of Service: A denial-of-service (DoS) attack is an
explicit attempt to make a machine or network resource
unavailable to its legitimate users. Applications can also be
attacked in ways that render the application, and sometimes
the entire machine, unusable.
Data Manipulation: In data manipulation, a hacker changes
data used by a website in order to gain some advantage or to
embarrass the website’s owners. Hackers will often gain
access to HTML pages and change them to be satirical or
offensive.
Identity Spoofing: Identity spoofing is a technique where a
hacker uses the credentials of a legitimate user or device to
launch attacks against network hosts, steal data or bypass
access controls. Preventing this attack requires IT-
infrastructure and network-level mitigations.
Cross-Site Scripting (XSS): Cross-site scripting is a computer
security vulnerability found in web applications. XSSenables
attackers to inject client-sidescriptintoWebpagesviewedby
other users and trick a user into clicking on that URL. Once
executed by the other user’s browser, this code could then
perform actions such as completely changing the behaviorof
the website, stealing personal data, or performing actions on
behalf of the user.
Web Based Application Testing Methodologies
Different types of testing techniques like coverage testing,
structural testing, statistical testing, combinatorial
interaction testing, penetration testing, Search based
software engineering testing, UniqueInput/Outputmethod
using Genetic Algorithms [5],Web application Slicing[6],[7],
Hierarchical testing [8], Bypass testing, Cross Browser
compatibility testing [9], Leveraging User session Data
Testing have been presented by various researchers in the
context of web application testing [10].
Structural Testing - Data flow analysis on web
applications is performed and model for testing the
application is built dynamically.
Statistical Testing– Input Sequence is generated to testthe
interactions with web applicationsbasedontheprofileuseof
the web application.
Mutation Testing – The technique of introducing faulty
code (called mutants) into the source code deliberately at
predetermined points and testing the software to uncover
any unknown errors. It is one of the effective coverage
criterion techniques for testing of web applications [11].
Combinatorial InteractionTesting-Usingacombinationof
different techniques by first designing a unique input space
matrix for the web application
Penetration Testing - Automated tests which are run
simulating the active attacks to expose the susceptibilities
of the web applications.
Search Based Software Engineering Testing -
Exploration of solutions within a state space and
calculating a fitness function to the solution iteratively until
we arrive at a most optimal solution. The technique is
employed for branch coverage of web applications.
Using UIO and Genetic Algorithms - Path selection is
done based on a unique input/output (UIO) algorithm and
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6862
automatic test case generation using Genetic Algorithms
which results in the best test sequences.
GUI Interaction Testing - GUI widgets events sequencesare
performed and the web application tested for correctnessby
observing the state of the GUI widgets.
Web Application Slicing - Reduced web application which
behaves completely as the original one with respect to some
criterion and performing the testing.
Cross Browser Compatibility testing - Subjecting web
applications to deployment across different browsers for
adherence to expected results.
Hierarchical Strategy - High level operational profile is
developed enumerating frequency of use of operations and
a high level function group to thoroughly test such an
operation or related components is done.
Bypass Testing - Bypass client side checking by providing
invalid inputs to web application to check correctness and
security of the web application.
Leveraging User Session Data - Test cases are
generated by applying strategies to collected user
interactions in the form of URL’s and name-value pairs.
Browser Fuzzing By Scheduled Mutation - Browsers are
validated by using the static and dynamic ways, the former
based on the input format while the latter randomly
executing instructions giving one input at a time.
Invariant Based Technique - Testing the web
application by crawling the web pages, and formally
designing a state flow graph with all the possible user
interaction sequences resulting in the possibleuserinterface
states.
Model Based Testing Technique - Web application is
reduced to a state transition graph and navigation through
links is tested to ascertain correct behaviour of the web
application.
CONCLUSION
In this paper we introduced a set of related search based
testing algorithms, adapted for web application testing and
augmented the approach with static and dynamic seeding.
This paper also shows, there are many issues raised by web
application testing, such as dynamic type binding and user
interface inference that create novel challenges for search
based testing that have not previously been addressed.
Dynamically mined value seeding approachcan significantly
reduce effort and increase effectiveness for web application
testing.
REFERENCES
[1] Brain Marick, Classic Testing Mistakes, RSTAR97
conference
[2] Introduction to software testing available at
http://www.onestopsoftwaretesting.com/introductionand-
importance-of-software-testing-in-sdlc/
[3] Anju Bansal, International Journal of Computer Science
and Mobile Computing, Vol.3 Issue.6, June- 2014, pg. 579-
584
[4] F. Saglietti, N. Oster, and F. Pinte, “White and grey-box
verification and validation approaches for safetyand
security-critical software systems,” Information Security
Technical Report, vol. 13, no. 1, pp. 10–16, 2008.
[5] Poonam Soni, Dr. Sanjay Tyagi, ―Testing Web
Applications Using UIO with GA‖, The International Journal
of Soft Computing and Software Engineering Volume3,Issue
5, May 2013 ISSN: 2277 128X.
[6] Lei Xu, Baowen Xu, Zhenqiang Chen, Jixiang Jiang,
Huowang Chen, “Regression Testing for Web Applications
Based on Slicing”, Proceedings of the 27th Annual
International Computer Software and Applications
Conference (COMPSAC’03) 0730-3157/03 2003 IEEE.
[7] Filippo Ricca, “Analysis, Testing and Re-structuring of
Web Applications”, Proceedings of the 20th IEEE
International Conference on Software Maintenance
(ICSM’04) 1063-6773/04 2004 IEEE.
[8] Jeff Tian, Li Ma, Zhao Li and A. G¨unes¸ Koru, “A
Hierarchical Strategy for Testing Web-Based Applications
and Ensuring Their Reliability”, Proceedings of the 27th
Annual International Computer Software and Applications
Conference (COMPSAC’03) 0730-3157/03 2003 IEEE.
[9] Ali Mesbah,Mukul R.Prasad,―AutomatedCross-Browser
Compatibility Testing‖, ICSE ’11, May 21–28, 2011, Waikiki,
Honolulu, HI, USA.
[10] Sebastian Elbaum, Member, Gregg Rothermel, Srikanth
Karre, Marc Fisher II. ―Leveraging User-Session Data to
Support Web Application Testing‖, IEEE Transactions on
Software Engineering, Vol. 31, No. 3, March 2005.
[11] Hanh Le Thi My, Nguyen Thanh, Khuat Thanh, ―Survey
on Mutation-based Test Data Generation‖, International
Journal of Electrical and Computer Engineering (IJECE), Vol
5, No 5, 2015.

More Related Content

What's hot

Software reliability & quality
Software reliability & qualitySoftware reliability & quality
Software reliability & qualityNur Islam
 
11.performance testing methodologies and tools
11.performance testing methodologies and tools11.performance testing methodologies and tools
11.performance testing methodologies and toolsAlexander Decker
 
Performance testing methodologies and tools
Performance testing methodologies and toolsPerformance testing methodologies and tools
Performance testing methodologies and toolsAlexander Decker
 
IRJET- Android Malware Detection using Deep Learning
IRJET- Android Malware Detection using Deep LearningIRJET- Android Malware Detection using Deep Learning
IRJET- Android Malware Detection using Deep LearningIRJET Journal
 
A Combined Approach of Software Metrics and Software Fault Analysis to Estima...
A Combined Approach of Software Metrics and Software Fault Analysis to Estima...A Combined Approach of Software Metrics and Software Fault Analysis to Estima...
A Combined Approach of Software Metrics and Software Fault Analysis to Estima...IOSR Journals
 
A deployment scenario a taxonomy mapping and keyword searching for the appl...
A deployment scenario   a taxonomy mapping and keyword searching for the appl...A deployment scenario   a taxonomy mapping and keyword searching for the appl...
A deployment scenario a taxonomy mapping and keyword searching for the appl...Conference Papers
 
Validation of early testing method for e government projects by requirement ...
Validation of early testing method for e  government projects by requirement ...Validation of early testing method for e  government projects by requirement ...
Validation of early testing method for e government projects by requirement ...Conference Papers
 
Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...Conference Papers
 
Developing software analyzers tool using software reliability growth model
Developing software analyzers tool using software reliability growth modelDeveloping software analyzers tool using software reliability growth model
Developing software analyzers tool using software reliability growth modelIAEME Publication
 
Automated Testing: An Edge Over Manual Software Testing
Automated Testing: An Edge Over Manual Software TestingAutomated Testing: An Edge Over Manual Software Testing
Automated Testing: An Edge Over Manual Software Testingijtsrd
 
A Survey of Software Reliability factor
A Survey of Software Reliability factorA Survey of Software Reliability factor
A Survey of Software Reliability factorIOSR Journals
 
A new approach for formal behavioral
A new approach for formal behavioralA new approach for formal behavioral
A new approach for formal behavioralijfcstjournal
 
System analysis and_design.docx
System analysis and_design.docxSystem analysis and_design.docx
System analysis and_design.docxAlaJebnoun
 
Step by-step mobile testing approaches and strategies
Step by-step mobile testing approaches and strategiesStep by-step mobile testing approaches and strategies
Step by-step mobile testing approaches and strategiesAlisha Henderson
 
A Compound Metric for Identification of Fault Prone Modules
A Compound Metric for Identification of Fault Prone ModulesA Compound Metric for Identification of Fault Prone Modules
A Compound Metric for Identification of Fault Prone Modulesiosrjce
 

What's hot (19)

Software reliability & quality
Software reliability & qualitySoftware reliability & quality
Software reliability & quality
 
11.performance testing methodologies and tools
11.performance testing methodologies and tools11.performance testing methodologies and tools
11.performance testing methodologies and tools
 
Performance testing methodologies and tools
Performance testing methodologies and toolsPerformance testing methodologies and tools
Performance testing methodologies and tools
 
IRJET- Android Malware Detection using Deep Learning
IRJET- Android Malware Detection using Deep LearningIRJET- Android Malware Detection using Deep Learning
IRJET- Android Malware Detection using Deep Learning
 
A Combined Approach of Software Metrics and Software Fault Analysis to Estima...
A Combined Approach of Software Metrics and Software Fault Analysis to Estima...A Combined Approach of Software Metrics and Software Fault Analysis to Estima...
A Combined Approach of Software Metrics and Software Fault Analysis to Estima...
 
A deployment scenario a taxonomy mapping and keyword searching for the appl...
A deployment scenario   a taxonomy mapping and keyword searching for the appl...A deployment scenario   a taxonomy mapping and keyword searching for the appl...
A deployment scenario a taxonomy mapping and keyword searching for the appl...
 
Avnish
AvnishAvnish
Avnish
 
Validation of early testing method for e government projects by requirement ...
Validation of early testing method for e  government projects by requirement ...Validation of early testing method for e  government projects by requirement ...
Validation of early testing method for e government projects by requirement ...
 
Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...
 
Developing software analyzers tool using software reliability growth model
Developing software analyzers tool using software reliability growth modelDeveloping software analyzers tool using software reliability growth model
Developing software analyzers tool using software reliability growth model
 
Bug Tracking Java Project
Bug Tracking Java ProjectBug Tracking Java Project
Bug Tracking Java Project
 
Automated Testing: An Edge Over Manual Software Testing
Automated Testing: An Edge Over Manual Software TestingAutomated Testing: An Edge Over Manual Software Testing
Automated Testing: An Edge Over Manual Software Testing
 
A Survey of Software Reliability factor
A Survey of Software Reliability factorA Survey of Software Reliability factor
A Survey of Software Reliability factor
 
A new approach for formal behavioral
A new approach for formal behavioralA new approach for formal behavioral
A new approach for formal behavioral
 
System analysis and_design.docx
System analysis and_design.docxSystem analysis and_design.docx
System analysis and_design.docx
 
T0 numtq0nje=
T0 numtq0nje=T0 numtq0nje=
T0 numtq0nje=
 
Step by-step mobile testing approaches and strategies
Step by-step mobile testing approaches and strategiesStep by-step mobile testing approaches and strategies
Step by-step mobile testing approaches and strategies
 
A Compound Metric for Identification of Fault Prone Modules
A Compound Metric for Identification of Fault Prone ModulesA Compound Metric for Identification of Fault Prone Modules
A Compound Metric for Identification of Fault Prone Modules
 
Chap1 RE Introduction
Chap1 RE IntroductionChap1 RE Introduction
Chap1 RE Introduction
 

Similar to IRJET-A Review of Testing Technology in Web Application System

IRJET- Website Health Checker
IRJET- Website Health CheckerIRJET- Website Health Checker
IRJET- Website Health CheckerIRJET Journal
 
mastering_web_testing_how_to_make_the_most_of_frameworks.pptx
mastering_web_testing_how_to_make_the_most_of_frameworks.pptxmastering_web_testing_how_to_make_the_most_of_frameworks.pptx
mastering_web_testing_how_to_make_the_most_of_frameworks.pptxsarah david
 
mastering_web_testing_how_to_make_the_most_of_frameworks.pdf
mastering_web_testing_how_to_make_the_most_of_frameworks.pdfmastering_web_testing_how_to_make_the_most_of_frameworks.pdf
mastering_web_testing_how_to_make_the_most_of_frameworks.pdfsarah david
 
IRJET- Testing Web Application using Vulnerability Scan
IRJET- Testing Web Application using Vulnerability ScanIRJET- Testing Web Application using Vulnerability Scan
IRJET- Testing Web Application using Vulnerability ScanIRJET Journal
 
Selenium - A Trending Automation Testing Tool
Selenium - A Trending Automation Testing ToolSelenium - A Trending Automation Testing Tool
Selenium - A Trending Automation Testing Toolijtsrd
 
IRJET- Cross Platform Penetration Testing Suite
IRJET-  	  Cross Platform Penetration Testing SuiteIRJET-  	  Cross Platform Penetration Testing Suite
IRJET- Cross Platform Penetration Testing SuiteIRJET Journal
 
New Model to Achieve Software Quality Assurance (SQA) in Web Application
New Model to Achieve Software Quality Assurance (SQA) in Web ApplicationNew Model to Achieve Software Quality Assurance (SQA) in Web Application
New Model to Achieve Software Quality Assurance (SQA) in Web Applicationijsrd.com
 
Systematic Review Automation in Cyber Security
Systematic Review Automation in Cyber SecuritySystematic Review Automation in Cyber Security
Systematic Review Automation in Cyber SecurityYogeshIJTSRD
 
Reliability Improvement with PSP of Web-Based Software Applications
Reliability Improvement with PSP of Web-Based Software ApplicationsReliability Improvement with PSP of Web-Based Software Applications
Reliability Improvement with PSP of Web-Based Software ApplicationsCSEIJJournal
 
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.IRJET Journal
 
Comparative study of Cyber Security Assessment Tools
Comparative study of Cyber Security Assessment ToolsComparative study of Cyber Security Assessment Tools
Comparative study of Cyber Security Assessment ToolsIRJET Journal
 
Unit Testing Essay
Unit Testing EssayUnit Testing Essay
Unit Testing EssayDani Cox
 
A Study on Vulnerability Management
A Study on Vulnerability ManagementA Study on Vulnerability Management
A Study on Vulnerability ManagementIRJET Journal
 
Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...iosrjce
 
Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...Michael Hidalgo
 
Self-Protecting Technology for Web Applications
Self-Protecting Technology for Web ApplicationsSelf-Protecting Technology for Web Applications
Self-Protecting Technology for Web ApplicationsIRJET Journal
 
The Complete Web Application Security Testing Checklist
The Complete Web Application Security Testing ChecklistThe Complete Web Application Security Testing Checklist
The Complete Web Application Security Testing ChecklistCigital
 
Running Head LAB 51LAB 57Lab 5.docx
Running Head  LAB 51LAB 57Lab 5.docxRunning Head  LAB 51LAB 57Lab 5.docx
Running Head LAB 51LAB 57Lab 5.docxtoddr4
 
IRJET- Android Malware Detection System
IRJET-  	  Android Malware Detection SystemIRJET-  	  Android Malware Detection System
IRJET- Android Malware Detection SystemIRJET Journal
 

Similar to IRJET-A Review of Testing Technology in Web Application System (20)

IRJET- Website Health Checker
IRJET- Website Health CheckerIRJET- Website Health Checker
IRJET- Website Health Checker
 
mastering_web_testing_how_to_make_the_most_of_frameworks.pptx
mastering_web_testing_how_to_make_the_most_of_frameworks.pptxmastering_web_testing_how_to_make_the_most_of_frameworks.pptx
mastering_web_testing_how_to_make_the_most_of_frameworks.pptx
 
mastering_web_testing_how_to_make_the_most_of_frameworks.pdf
mastering_web_testing_how_to_make_the_most_of_frameworks.pdfmastering_web_testing_how_to_make_the_most_of_frameworks.pdf
mastering_web_testing_how_to_make_the_most_of_frameworks.pdf
 
IRJET- Testing Web Application using Vulnerability Scan
IRJET- Testing Web Application using Vulnerability ScanIRJET- Testing Web Application using Vulnerability Scan
IRJET- Testing Web Application using Vulnerability Scan
 
Selenium - A Trending Automation Testing Tool
Selenium - A Trending Automation Testing ToolSelenium - A Trending Automation Testing Tool
Selenium - A Trending Automation Testing Tool
 
IRJET- Cross Platform Penetration Testing Suite
IRJET-  	  Cross Platform Penetration Testing SuiteIRJET-  	  Cross Platform Penetration Testing Suite
IRJET- Cross Platform Penetration Testing Suite
 
New Model to Achieve Software Quality Assurance (SQA) in Web Application
New Model to Achieve Software Quality Assurance (SQA) in Web ApplicationNew Model to Achieve Software Quality Assurance (SQA) in Web Application
New Model to Achieve Software Quality Assurance (SQA) in Web Application
 
Systematic Review Automation in Cyber Security
Systematic Review Automation in Cyber SecuritySystematic Review Automation in Cyber Security
Systematic Review Automation in Cyber Security
 
Reliability Improvement with PSP of Web-Based Software Applications
Reliability Improvement with PSP of Web-Based Software ApplicationsReliability Improvement with PSP of Web-Based Software Applications
Reliability Improvement with PSP of Web-Based Software Applications
 
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
 
Comparative study of Cyber Security Assessment Tools
Comparative study of Cyber Security Assessment ToolsComparative study of Cyber Security Assessment Tools
Comparative study of Cyber Security Assessment Tools
 
Unit Testing Essay
Unit Testing EssayUnit Testing Essay
Unit Testing Essay
 
A Study on Vulnerability Management
A Study on Vulnerability ManagementA Study on Vulnerability Management
A Study on Vulnerability Management
 
J017325660
J017325660J017325660
J017325660
 
Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...
 
Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...
 
Self-Protecting Technology for Web Applications
Self-Protecting Technology for Web ApplicationsSelf-Protecting Technology for Web Applications
Self-Protecting Technology for Web Applications
 
The Complete Web Application Security Testing Checklist
The Complete Web Application Security Testing ChecklistThe Complete Web Application Security Testing Checklist
The Complete Web Application Security Testing Checklist
 
Running Head LAB 51LAB 57Lab 5.docx
Running Head  LAB 51LAB 57Lab 5.docxRunning Head  LAB 51LAB 57Lab 5.docx
Running Head LAB 51LAB 57Lab 5.docx
 
IRJET- Android Malware Detection System
IRJET-  	  Android Malware Detection SystemIRJET-  	  Android Malware Detection System
IRJET- Android Malware Detection System
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 

Recently uploaded (20)

ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 

IRJET-A Review of Testing Technology in Web Application System

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6859 A Review of Testing Technology in Web Application System Anirban Bhar1, Soumya Bhattacharyya2, Sujata Kundu3 , Shyamapriya Chatterjee4 1,2,3,4Department of Information Technology, Narula Institute of Technology, Kolkata, India. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Software testing is important activity in Software Development Life Cycle. Software testing is the process of assessing the functionality and correctness of a program through execution or analysis. Software-testing process is expensive and consumes a lot of time through software development life cycle. As software systems grow, manual software testing becomes more and more difficult. Therefore, there was always a need to decrease. Software testing that is not fully exhaustive can only suggest the presence of flaws and cannot prove their absence; moreoverit is impossible to completely test an application. Thisworkaims at the process of identifying the bottlenecks that are very common to test in web application systems, bottlenecks that are application specific and testing type specific, analyze the reasons and provide recommendations that will make Software Testing [1] to happen without bottlenecks or with minimum bottlenecks. Key Words: SDLC, Testing, Web application systems, Bottlenecks. INTRODUCTION Software testing plays a vital role in the software development life-cycle to recognize the difficulties in the process very well [2]. The objective of testing is to find problems and fix them to improve quality (Fig.1). Software testing typically represents 40% of a software development budget. There are four main objectives of software testing [3]: 1) Demonstration: It demonstrates functions under special conditions and shows thatproductsarereadyforintegration or use. 2) Detection: It discovers defects, errors and deficiencies. It determines system capabilities and limitations, quality of components, work products and the system. 3) Prevention: It provides information to prevent or reduce the number of errors clarify system specifications and performance. Identify ways toavoidrisk andproblemsinthe future. 4) Improving Quality: By doing effective testing, we can minimize errors and hence improve the quality of software [4]. Fig.1 Testing is the primary method that the Organization uses to evaluate software under development. Software quality is nothing but the fulfillment of the end user requirements. Main areas where developers need to focus upon are quality assurance, quality planning and quality control. Software testing plays an important role in these areas by providing the way of reducing the bugs from the application. Software testing techniques is categorized in two main areas: Manual testing and automated testing. Automation Testing uses automation tools to execute test cases. In manual testing, test cases are executed by a human tester and software. Automated testing is significantlyfaster than a manual approach. Automation is one major solution for reducing high testing effort. Automating certain manual tasks from software testing process can save a lot of testing time. It can help in performing repetitive tasks more quickly than manual testing. Manual Testing vs. Automated Testing In manual testing (as the name suggests), test cases are executed manually (by a human, that is) withoutanysupport from tools or scripts. But with automated testing, test cases are executed with the assistance of tools, scripts, and software.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6860 Testing is an integral part of any successful software project. The type of testing (manual or automated) depends on various factors, including project requirements, budget, timeline, expertise, and suitability. Three vital factors of any project are of course time, cost, and quality – the goal of any successful project is to reduce the cost and time required to complete it successfully while maintaining quality output. When it comes to testing, one type may accomplish this goal better than the other. In short, manual testing is best suited to the following areas/scenarios: Exploratory Testing: This type of testing requires the tester’s knowledge, experience, analytical/logical skills, creativity, and intuition. The test is characterizedherebypoorlywritten specification documentation, and/or a short time for execution. We need the human skills to execute the testing process in this scenario. Usability Testing: This is an area in which you need to measure how user-friendly, efficient, or convenient the software or product is for the end users. Here, human observation is the most important factor, so a manual approach is preferable. Ad-hoc Testing: In this scenario, there is nospecificapproach. It is a totally unplanned method of testing where the understanding and insight of the tester is the only important factor. Automated testing is the preferred option in the following areas/scenarios: Regression Testing: Here, automated testing is suitable because of frequent code changes and the ability to run the regressions in a timely manner. Load Testing: Automated testing is also the best way to completethe testing efficiently when it comes toloadtesting. Learn more about load testing with our best practices guide here. Repeated Execution: Testing which requires the repeated execution of a task is best automated. Performance Testing: Similarly, testing which requires the simulation of thousands of concurrent users requires automation. Web Application Architecture Web application architecture defines the interactions between applications, middleware systems and databasesto ensuremultiple applicationscan work together.Whenauser types in a URL and taps “Go,” the browser will find the Internet-facing computer the website lives on and requests that particular page. The server then responds by sending files over to the browser. After that action, the browserexecutesthosefilesto show the requested page to the user. Now, the user gets to interact with the website. Of course, all of these actions are executed within a matter of seconds. Otherwise, users wouldn’t bother with websites. What’s important here is the code, which has been parsed by the browser. This very code may or may not have specific instructions telling the browser how to react to a wideswath of inputs. As a result, web application architecture includes all sub-components and external applications interchanges for an entire software application. Of course, it is designed to function efficiently while meeting its specific needs and goals. Web application architecture is critical since the majority of global network traffic, andevery single app and device uses web-based communication. It deals with scale, efficiency, robustness, and security. Fig.2 Classes of Threats Here are the different types of threats which can be used to take advantage of security vulnerability.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6861 Privilege Elevation: Privilege elevation is a class of attack where a hacker has an account on a system and uses it to increase his system privileges to a higher level than he/she was not meant to have. If successful, this type of attack can result in a hacker gaining privileges as high as root on a UNIX system. Once a hacker gains super-user privileges, he is able to run code with this level of privilege and the entire system is effectively compromised. SQL Injection: SQL injection is the most common application layer attack technique used by hackers, in which malicious SQL statementsare inserted into an entry field for execution. SQL injection attacks are very critical as an attacker can get critical information from the server database. It is a type of attack which takes the advantage of loopholes present in the implementation of web applications that allows a hacker to hack the system. To check the SQL injection we have to take care of input fields like text boxes, comments, etc. To prevent injections, special characters should be either properly handled or skipped from the input. Unauthorized Data Access: One of the more popular types of attacks is gaining unauthorized access to data within an application. Data can be accessed on servers or onanetwork. Unauthorized access includes:  Unauthorized access to data via data-fetching operations  Unauthorized access to reusable client authenticationinformationbymonitoringtheaccess of others  Unauthorized access to data by monitoring the access of others URL Manipulation: URL manipulation is the process of manipulating the website URL query strings & capture of the important information by hackers. This happens when the application uses the HTTP GET method to pass information between the client and the server. The information is passed in parameters in the query string. The tester can modify a parameter value in the query string to check if the server accepts it. Denial of Service: A denial-of-service (DoS) attack is an explicit attempt to make a machine or network resource unavailable to its legitimate users. Applications can also be attacked in ways that render the application, and sometimes the entire machine, unusable. Data Manipulation: In data manipulation, a hacker changes data used by a website in order to gain some advantage or to embarrass the website’s owners. Hackers will often gain access to HTML pages and change them to be satirical or offensive. Identity Spoofing: Identity spoofing is a technique where a hacker uses the credentials of a legitimate user or device to launch attacks against network hosts, steal data or bypass access controls. Preventing this attack requires IT- infrastructure and network-level mitigations. Cross-Site Scripting (XSS): Cross-site scripting is a computer security vulnerability found in web applications. XSSenables attackers to inject client-sidescriptintoWebpagesviewedby other users and trick a user into clicking on that URL. Once executed by the other user’s browser, this code could then perform actions such as completely changing the behaviorof the website, stealing personal data, or performing actions on behalf of the user. Web Based Application Testing Methodologies Different types of testing techniques like coverage testing, structural testing, statistical testing, combinatorial interaction testing, penetration testing, Search based software engineering testing, UniqueInput/Outputmethod using Genetic Algorithms [5],Web application Slicing[6],[7], Hierarchical testing [8], Bypass testing, Cross Browser compatibility testing [9], Leveraging User session Data Testing have been presented by various researchers in the context of web application testing [10]. Structural Testing - Data flow analysis on web applications is performed and model for testing the application is built dynamically. Statistical Testing– Input Sequence is generated to testthe interactions with web applicationsbasedontheprofileuseof the web application. Mutation Testing – The technique of introducing faulty code (called mutants) into the source code deliberately at predetermined points and testing the software to uncover any unknown errors. It is one of the effective coverage criterion techniques for testing of web applications [11]. Combinatorial InteractionTesting-Usingacombinationof different techniques by first designing a unique input space matrix for the web application Penetration Testing - Automated tests which are run simulating the active attacks to expose the susceptibilities of the web applications. Search Based Software Engineering Testing - Exploration of solutions within a state space and calculating a fitness function to the solution iteratively until we arrive at a most optimal solution. The technique is employed for branch coverage of web applications. Using UIO and Genetic Algorithms - Path selection is done based on a unique input/output (UIO) algorithm and
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6862 automatic test case generation using Genetic Algorithms which results in the best test sequences. GUI Interaction Testing - GUI widgets events sequencesare performed and the web application tested for correctnessby observing the state of the GUI widgets. Web Application Slicing - Reduced web application which behaves completely as the original one with respect to some criterion and performing the testing. Cross Browser Compatibility testing - Subjecting web applications to deployment across different browsers for adherence to expected results. Hierarchical Strategy - High level operational profile is developed enumerating frequency of use of operations and a high level function group to thoroughly test such an operation or related components is done. Bypass Testing - Bypass client side checking by providing invalid inputs to web application to check correctness and security of the web application. Leveraging User Session Data - Test cases are generated by applying strategies to collected user interactions in the form of URL’s and name-value pairs. Browser Fuzzing By Scheduled Mutation - Browsers are validated by using the static and dynamic ways, the former based on the input format while the latter randomly executing instructions giving one input at a time. Invariant Based Technique - Testing the web application by crawling the web pages, and formally designing a state flow graph with all the possible user interaction sequences resulting in the possibleuserinterface states. Model Based Testing Technique - Web application is reduced to a state transition graph and navigation through links is tested to ascertain correct behaviour of the web application. CONCLUSION In this paper we introduced a set of related search based testing algorithms, adapted for web application testing and augmented the approach with static and dynamic seeding. This paper also shows, there are many issues raised by web application testing, such as dynamic type binding and user interface inference that create novel challenges for search based testing that have not previously been addressed. Dynamically mined value seeding approachcan significantly reduce effort and increase effectiveness for web application testing. REFERENCES [1] Brain Marick, Classic Testing Mistakes, RSTAR97 conference [2] Introduction to software testing available at http://www.onestopsoftwaretesting.com/introductionand- importance-of-software-testing-in-sdlc/ [3] Anju Bansal, International Journal of Computer Science and Mobile Computing, Vol.3 Issue.6, June- 2014, pg. 579- 584 [4] F. Saglietti, N. Oster, and F. Pinte, “White and grey-box verification and validation approaches for safetyand security-critical software systems,” Information Security Technical Report, vol. 13, no. 1, pp. 10–16, 2008. [5] Poonam Soni, Dr. Sanjay Tyagi, ―Testing Web Applications Using UIO with GA‖, The International Journal of Soft Computing and Software Engineering Volume3,Issue 5, May 2013 ISSN: 2277 128X. [6] Lei Xu, Baowen Xu, Zhenqiang Chen, Jixiang Jiang, Huowang Chen, “Regression Testing for Web Applications Based on Slicing”, Proceedings of the 27th Annual International Computer Software and Applications Conference (COMPSAC’03) 0730-3157/03 2003 IEEE. [7] Filippo Ricca, “Analysis, Testing and Re-structuring of Web Applications”, Proceedings of the 20th IEEE International Conference on Software Maintenance (ICSM’04) 1063-6773/04 2004 IEEE. [8] Jeff Tian, Li Ma, Zhao Li and A. G¨unes¸ Koru, “A Hierarchical Strategy for Testing Web-Based Applications and Ensuring Their Reliability”, Proceedings of the 27th Annual International Computer Software and Applications Conference (COMPSAC’03) 0730-3157/03 2003 IEEE. [9] Ali Mesbah,Mukul R.Prasad,―AutomatedCross-Browser Compatibility Testing‖, ICSE ’11, May 21–28, 2011, Waikiki, Honolulu, HI, USA. [10] Sebastian Elbaum, Member, Gregg Rothermel, Srikanth Karre, Marc Fisher II. ―Leveraging User-Session Data to Support Web Application Testing‖, IEEE Transactions on Software Engineering, Vol. 31, No. 3, March 2005. [11] Hanh Le Thi My, Nguyen Thanh, Khuat Thanh, ―Survey on Mutation-based Test Data Generation‖, International Journal of Electrical and Computer Engineering (IJECE), Vol 5, No 5, 2015.