This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Knowledge Graph"
(→Minimum Viable Product) |
(→Minimum Viable Product) |
||
Line 104: | Line 104: | ||
=Minimum Viable Product= | =Minimum Viable Product= | ||
− | Use a model | + | Use a model that provides: |
− | # Creation of Graphs using triples | + | # Creation of Graphs using triples. |
− | # Representation of vulnerabilities | + | # Representation of vulnerabilities. |
+ | # Way to study, detect and explore vulnerabilities. | ||
Revision as of 04:01, 18 February 2015
OWASP Knowledge GraphA tool that makes possible to consult the knowledge base providing informations about web vulnerabilities, the tool will also provide a way to check servers detecting vulnerabilities contained in knowledge base. DescriptionThis project uses the knowledge graphs to represent web vulnerabilities into a knowledge base. Using this base will be possible to detect vulnerabilities in systems and have a better understand of how they work.
LicensingThis program is free software: you can redistribute it and/or modify it under the terms of the link GNU General Public License 3.0 as published by the Free Software Foundation. |
Project Resources
Project LeaderRelated ProjectsClassifications |
News and Events
|
How can I participate in your project?
The project is at the very beginning and there are many possibilities, please get in contact with:
If I am not a programmer can I participate in your project?
Absolutely yes.
Team
- Felipe Albuquerque
The OWASP Knowledge Graph is selecting members for the team.
If you would like to contribute please contact:
Roadmap
- Define the graph structure to store data in a efficient way.
- Represent in graphs the top 10 vulnerabilities.
- Create a tool to use the knowledge graph to detect vulnerabilities and explore theirs caracteristics.
- Conduct an evaluation of results.
- Expand the knwoledge graph storing more vulnerabilities.
Subsequent Releases will add
Getting Involved
Use a model that provides:
- Creation of Graphs using triples.
- Representation of vulnerabilities.
- Way to study, detect and explore vulnerabilities.