This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Knowledge Graph"
(→Minimum Viable Product) |
(→Minimum Viable Product) |
||
Line 104: | Line 104: | ||
=Minimum Viable Product= | =Minimum Viable Product= | ||
− | + | Creation of a model that provides: | |
# Creation of Graphs using triples. | # Creation of Graphs using triples. | ||
# Representation of vulnerabilities. | # Representation of vulnerabilities. |
Revision as of 04:03, 18 February 2015
OWASP Knowledge GraphA tool that makes possible to consult the knowledge base providing informations about web vulnerabilities, the tool will also provide a way to check servers detecting vulnerabilities contained in knowledge base. DescriptionThis project uses the knowledge graphs to represent web vulnerabilities into a knowledge base. Using this base will be possible to detect vulnerabilities in systems and have a better understand of how they work.
LicensingThis program is free software: you can redistribute it and/or modify it under the terms of the link GNU General Public License 3.0 as published by the Free Software Foundation. |
Project Resources
Project LeaderRelated ProjectsClassifications |
News and Events
|
How can I participate in your project?
The project is at the very beginning and there are many possibilities, please get in contact with:
If I am not a programmer can I participate in your project?
Absolutely yes.
Team
- Felipe Albuquerque
The OWASP Knowledge Graph is selecting members for the team.
If you would like to contribute please contact:
Roadmap
- Define the graph structure to store data in a efficient way.
- Represent in graphs the top 10 vulnerabilities.
- Create a tool to use the knowledge graph to detect vulnerabilities and explore theirs caracteristics.
- Conduct an evaluation of results.
- Expand the knwoledge graph storing more vulnerabilities.
Subsequent Releases will add
Getting Involved
Creation of a model that provides:
- Creation of Graphs using triples.
- Representation of vulnerabilities.
- Study, detect and explore vulnerabilities.