Mitigation of Learning Management System Vulnerabilities using Penetration Testing Methods
DOI:
https://doi.org/10.64163/jochac.v2i1.17Keywords:
Vulnerability Testing, Penetration Methods, Learning Management Systems, Cybersecurity, Security ResilienceAbstract
This research delves into vulnerability testing of Learning Management Systems (LMS) using penetration methods, aiming to enhance the security resilience of LMS platforms against cyber threats. By employing a structured penetration testing framework encompassing stages such as reconnaissance, scanning, gaining access, maintaining access, and covering tracks, the study seeks to identify and address potential vulnerabilities within LMS systems. The research contributes to fortifying LMS platforms by simulating attacks and evaluating system weaknesses to provide insights for effective security enhancementsReferences
M. Ghanem and T. Chen, "Reinforcement learning for efficient network penetration testing", Information, vol. 11, no. 1, p. 6, 2019. https://doi.org/10.3390/info11010006
T. Gunawan, M. Lim, N. Zulkurnain, & M. Kartiwi, "On the review and setup of security audit using kali linux", Indonesian Journal of Electrical Engineering and Computer Science, vol. 11, no. 1, p. 51, 2018. https://doi.org/10.11591/ijeecs.v11.i1.pp51-59
C. Susanto, K. Rizko, & D. Purbohadi, "Security assessment using nessus tool to determine security gaps on the repository web application in educational institutions", Emerging Information Science and Technology, vol. 1, no. 2, 2020. https://doi.org/10.18196/eist.128
N. Pirsa and S. Sumijan, "Vulnerability assessment of web applications using penetration testing", International Journal of Recent Technology and Engineering, vol. 8, no. 4, p. 1552-1556, 2019. https://doi.org/10.35940/ijrte.b2133.118419
J. Goel and B. Mehtre, "Vulnerability assessment & penetration testing as a cyber defence technology", Procedia Computer Science, vol. 57, p. 710-715, 2015. https://doi.org/10.1016/j.procs.2015.07.458
M. Ghanem and T. Chen, "Reinforcement learning for efficient network penetration testing", Information, vol. 11, no. 1, p. 6, 2019. https://doi.org/10.3390/info11010006
N. Koroniotis, N. Moustafa, B. Turnbull, F. Schiliro, P. Gauravaram, & H. Janicke, "A deep learning-based penetration testing framework for vulnerability identification in internet of things environments",, 2021. https://doi.org/10.48550/arxiv.2109.09259
A. Bacudio, X. Yuan, B. Chu, & M. Jones, "An overview of penetration testing", International Journal of Network Security & Its Applications, vol. 3, no. 6, p. 19-38, 2011. https://doi.org/10.5121/ijnsa.2011.3602
B. Arfaj, S. Mishra, & M. Alshehri, "Efficacy of unconventional penetration testing practices", Intelligent Automation & Soft Computing, vol. 31, no. 1, p. 223-239, 2022. https://doi.org/10.32604/iasc.2022.019485
H. Lu and Y. Yang, "Research on wifi penetration testing with kali linux", Complexity, vol. 2021, no. 1, 2021. https://doi.org/10.1155/2021/5570001
B. Arromdoni, "Web application vulnerability analysis using the owasp method (case study: ojs csfd uin sunan kalijaga yogyakarta)",, 2024. https://doi.org/10.4028/p-fosz2d
N. Koroniotis, N. Moustafa, B. Turnbull, F. Schiliro, P. Gauravaram, & H. Janicke, "A deep learning-based penetration testing framework for vulnerability identification in internet of things environments",, 2021. https://doi.org/10.48550/arxiv.2109.09259
Kongara, D., & Krishnama, S., "A process of penetration testing using various tools", MJCS, p. 94-104, 2023. https://doi.org/10.58496/mjcs/2023/014
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Journal of Cyber Health and Computer

This work is licensed under a Creative Commons Attribution 4.0 International License.