This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP Knowledge Graph"

From OWASP
Jump to: navigation, search
(How can I participate in your project?)
(Main)
 
(7 intermediate revisions by one other user not shown)
Line 1: Line 1:
 
=Main=
 
=Main=
  
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div>
+
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[Image:OWASP Inactive Banner.jpg|800px| link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Inactive_Projects]] </div>
  
 
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-
 
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-
Line 30: Line 30:
  
  
[mailto:cicerogadelha@gmail.com Cicero Gadelha]
+
[mailto:cicero.gadelha@owasp.org Cicero Gadelha]
  
 
== Related Projects ==
 
== Related Projects ==
Line 70: Line 70:
  
 
==If I am not a programmer can I participate in your project?==
 
==If I am not a programmer can I participate in your project?==
 +
 +
Absolutely yes.
  
 
= Acknowledgements =
 
= Acknowledgements =
Line 101: Line 103:
  
 
=Minimum Viable Product=
 
=Minimum Viable Product=
<!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.-->
+
 
<span style="color:#ff0000">
+
Creation of a model that provides:
This page is where you should indicate what is the minimum set of functionality that is required to make this a useful product that addresses your core security concern.
+
# Creation of Graphs using triples.
Defining this information helps the project leader to think about what is the critical functionality that a user needs for this project to be useful, thereby helping determine what the priorities should be on the roadmap.  And it also helps reviewers who are evaluating the project to determine if the functionality sufficiently provides the critical functionality to determine if the project should be promoted to the next project category.
+
# Representation of vulnerabilities.
</span>
+
# Study, detect and explore vulnerabilities.
 +
 
  
  

Latest revision as of 10:44, 19 May 2015

OWASP Inactive Banner.jpg


OWASP Knowledge Graph

A tool that makes possible to consult the knowledge base providing informations about web vulnerabilities, the tool will also provide a way to check servers detecting vulnerabilities contained in knowledge base.

Description

This project uses the knowledge graphs to represent web vulnerabilities into a knowledge base. Using this base will be possible to detect vulnerabilities in systems and have a better understand of how they work.


Licensing

This program is free software: you can redistribute it and/or modify it under the terms of the link GNU General Public License 3.0 as published by the Free Software Foundation.

Project Resources

  • key files are being translated and will be available soon.

Project Leader

Cicero Gadelha

Related Projects

Classifications

Project Type Files TOOL.jpg
Incubator Project Owasp-builders-small.png
Owasp-breakers-small.png
Affero General Public License 3.0

News and Events

  • First meeting, Chapter Fortaleza


How can I participate in your project?

The project is at the very beginning and there are many possibilities, please get in contact with:

If I am not a programmer can I participate in your project?

Absolutely yes.

Team

  • Felipe Albuquerque

The OWASP Knowledge Graph is selecting members for the team.

If you would like to contribute please contact:

Roadmap

  1. Define the graph structure to store data in a efficient way.
  2. Represent in graphs the top 10 vulnerabilities.
  3. Create a tool to use the knowledge graph to detect vulnerabilities and explore theirs caracteristics.
  4. Conduct an evaluation of results.
  5. Expand the knwoledge graph storing more vulnerabilities.

Subsequent Releases will add

Getting Involved

Creation of a model that provides:

  1. Creation of Graphs using triples.
  2. Representation of vulnerabilities.
  3. Study, detect and explore vulnerabilities.