OWASP Knowledge Graph

=Main=



{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-
 * valign="top" style="border-right: 1px dotted gray;padding-right:25px;" |

OWASP Knowledge Graph
A tool that makes possible to consult the knowledge base providing informations about web vulnerabilities, the tool will also provide a way to check servers detecting vulnerabilities contained in knowledge base.

Description
This project uses the knowledge graphs to represent web vulnerabilities into a knowledge base. Using this base will be possible to detect vulnerabilities in systems and have a better understand of how they work.

Licensing
This program is free software: you can redistribute it and/or modify it under the terms of the link GNU General Public License 3.0 as published by the Free Software Foundation.
 * valign="top" style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" |

Project Resources

 * key files are being translated and will be available soon.

Project Leader
[mailto:cicero.gadelha@owasp.org Cicero Gadelha]

Related Projects

 * OWASP Top Ten Project

Classifications

 * valign="top" style="padding-left:25px;width:200px;" |

News and Events

 * First meeting, Chapter Fortaleza


 * }

=FAQs=

How can I participate in your project?
The project is at the very beginning and there are many possibilities, please get in contact with:


 * [mailto:cicerogadelha@gmail.com Cicero Gadelha]

If I am not a programmer can I participate in your project?
Absolutely yes.

= Acknowledgements =

Team

 * Felipe Albuquerque

The OWASP Knowledge Graph is selecting members for the team.

If you would like to contribute please contact:


 * [mailto:cicerogadelha@gmail.com Cicero Gadelha]

= Road Map and Getting Involved =

Roadmap

 * 1) Define the graph structure to store data in a efficient way.
 * 2) Represent in graphs the top 10 vulnerabilities.
 * 3) Create a tool to use the knowledge graph to detect vulnerabilities and explore theirs caracteristics.
 * 4) Conduct an evaluation of results.
 * 5) Expand the knwoledge graph storing more vulnerabilities.

Subsequent Releases will add

Getting Involved
=Minimum Viable Product=

Creation of a model that provides:
 * 1) Creation of Graphs using triples.
 * 2) Representation of vulnerabilities.
 * 3) Study, detect and explore vulnerabilities.