<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Vulnerability Detection System for Protected Web Applications Using Agent Technologies⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Rostyslav L. Tkachuk</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Nataliya O. Maslova</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Olena M. Liubymenko</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Andriy I. Ivanusa</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Donetsk National Technical University</institution>
          ,
          <addr-line>str. Sambirska, 76, Drohobych, Lviv region, 82100</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Lviv State University of Life Safety</institution>
          ,
          <addr-line>35, Kleparivska St., Lviv, 79007</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2026</year>
      </pub-date>
      <abstract>
        <p>Automation of web application pentesting is a relevant direction in cybersecurity due to the increasing complexity of this process caused by modern protection mechanisms, such as WAF and IDS/IPS. This paper proposes a multi-agent system based on JADE that enables adaptive real-time testing with defense evasion. The system architecture is presented, the operation of agents is described, and experimental testing results are provided. The obtained results demonstrate the effectiveness of the multi-agent approach for automated vulnerability detection in protected web environments.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;System</kwd>
        <kwd>Protection</kwd>
        <kwd>Vulnerabilities</kwd>
        <kwd>Web Applications</kwd>
        <kwd>Agent Technologies</kwd>
        <kwd>multi-agent systems1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>The scientific novelty of the research lies in the development of a full-featured MAS system based
on JADE, supporting parallel agent interaction, dynamic generation of obfuscated payloads, and
adaptation of attack strategies based on the results of previous attempts. The solution implements
asynchronous interaction through FIPA-compliant protocols and can be deployed on physically or
geographically distributed nodes.</p>
      <p>The practical significance of the study is the possibility to apply the proposed multi-agent system
for automated and adaptive pentesting of protected web applications in real time, with the capability
to bypass WAFs and analyze defense system responses. Thanks to its modular architecture, support
for distributed deployment, and compatibility with containerization, the system is suitable for
integration into existing cybersecurity processes and can also be used as a training platform for
security professionals.</p>
      <sec id="sec-1-1">
        <title>2. Purpose and objectives of the study</title>
        <p>The aim of the study is to develop and experimentally evaluate the effectiveness of a distributed
multi-agent system capable of detecting web application vulnerabilities by bypassing active
protection mechanisms in real time.</p>
        <p>To achieve this goal, the following tasks were set:
•
•
•
•
to present the architecture of the multi-agent system;
to implement agents of various purposes based on JADE;
to develop attack scenarios and payload mutation methods;
to conduct experimental testing using XSS and SQLi attacks as examples.</p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>3. Literature Review</title>
      <p>
        The issue of web application security testing is actively explored in the context of both traditional
penetration testing approaches and modern automated solutions. According to [
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4">1–4</xref>
        ], pentesting
remains a key tool for detecting vulnerabilities in web applications, particularly XSS, SQLi, and CSRF.
Prior to the adoption of multi-agent systems, the automation of pentesting was primarily based on
vulnerability scanners (Burp Suite [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], Nessus [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], OpenVAS [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]), semi-automated scripts, and
frameworks (Metasploit), which had limited adaptability and scalability. These tools required
significant human involvement, lacked real-time interaction, and did not learn from previous attacks.
Further studies demonstrated the effectiveness of distributed computing and agent-based
approaches.
      </p>
      <p>
        Significant attention has been devoted to automating pentesting through the use of multi-agent
systems (MAS). Studies [
        <xref ref-type="bibr" rid="ref10 ref11 ref8 ref9">8–11</xref>
        ] highlight the advantages of agent-oriented platforms, including
flexibility and adaptability. The MAS-ML 2.0 model [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] and Java-based agent platforms [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] have
proven effective under complex simulation conditions, including cyber-physical systems [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ].
      </p>
      <p>
        In the context of MAS security [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ], key attack vectors and the necessity of building resilient
interaction models between agents have been examined. Works [
        <xref ref-type="bibr" rid="ref16 ref17">16, 17</xref>
        ] focus on developing secure
agent interaction architectures, including countermeasures against DoS attacks and ensuring
consensus-based control in dynamic environments.
      </p>
      <p>
        Regarding the use of agent systems in cybersecurity, study [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ] demonstrates a wide range of
MAS capabilities — from energy system monitoring to IoT threat analysis. Research [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ] describes
the extension of existing web pentesting frameworks, while emphasizing the challenges of
integrating agent systems into scanning processes.
      </p>
      <p>In the domain of web application protection, multi-agent systems are applied to intrusion analysis
and the enhancement of IDS/IPS and WAF functionality.</p>
      <p>Modern protection tools such as WAFs and IDSs perform real-time traffic monitoring, attack
detection, and response to emerging threats.</p>
      <p>
        Their efficiency is improved through the use of machine learning methods [
        <xref ref-type="bibr" rid="ref20 ref21 ref22 ref23">20–23</xref>
        ]. For instance,
models such as Naïve Bayes, k-NN, SVM, and linear regression demonstrate a detection accuracy of
92–99% for malicious HTTP requests [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ]. However, modern attacks can bypass these tools using
fuzzing, obfuscation techniques (Base64, URL encoding, polymorphism), and automated tools like
SQLMap [
        <xref ref-type="bibr" rid="ref24 ref25">24, 25</xref>
        ].
      </p>
      <p>
        Special attention should be paid to the comparative analysis of pentesting tools [
        <xref ref-type="bibr" rid="ref26 ref27 ref28">26–28</xref>
        ], such as
Burp Suite, which, although effective, are not always accessible due to licensing restrictions,
highlighting the relevance of developing free and adaptive solutions.
      </p>
      <p>The conducted analysis shows that multi-agent systems hold high potential in automating web
application security testing. They enable parallel task processing, real-time agent interaction, and
rapid adaptation to new types of attacks — which is critical in the face of increasing threat
complexity.</p>
      <p>
        In the authors' previous studies [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ], the SPADE platform was used to develop XSS scanners based
on autonomous agents. Integrating MAS into pentesting requires addressing compatibility issues
with heterogeneous environments and supporting scalability. SPADE’s limitations in this context
motivate the search for new platforms for building extensible agent systems. The conducted review
confirms that multi-agent systems are a promising direction for automating web application security
testing. Their flexibility, adaptability, and self-organization capabilities make them effective in
detecting, analyzing, and preventing modern cyber threats.
      </p>
    </sec>
    <sec id="sec-3">
      <title>4. Problem Statement</title>
      <p>Web applications are key components of modern information systems widely used in business,
government administration, finance, and other critical sectors. At the same time, the openness of
their interfaces, complex user interaction logic, and rapid technological development make them
vulnerable to various attacks, among which XSS, SQL injection, and CSRF remain the most common.</p>
      <p>Traditional security testing methods, particularly manual penetration testing, are
resourceintensive, laborious, and poorly scalable. Given the growing number of web applications and their
dynamic changes, there is a need for automated solutions capable of quickly adapting to new types
of vulnerabilities and changes in protective mechanisms, including the operation of WAFs, IDS/IPS,
and others. Despite the availability of vulnerability scanning tools such as Burp Suite, their use is
often limited by licensing policies, the need for manual configuration, and lack of support for full
distributed request processing. This limits testing effectiveness in large-scale or distributed
environments.</p>
      <p>In this context, solutions that combine the following remain insufficiently researched and
practically unimplemented:
•</p>
      <p>distributed data processing;
use of multi-agent technologies for automating penetration testing;
adaptation to modern protection systems in real time.</p>
      <p>Thus, the current challenge is the development of a distributed multi-agent system capable of
autonomously and coherently detecting web application vulnerabilities under the constraints
imposed by modern protection mechanisms.</p>
    </sec>
    <sec id="sec-4">
      <title>5. Materials and Methods</title>
      <p>For the implementation of the experimental multi-agent system, the JADE platform (Java Agent
Development Framework) was used, which complies with the FIPA specification and supports
distributed interaction between agents. Within the scope of the study, the system is understood as
an implemented set of agents built according to an agreed architecture that constitutes the proposed
solution. The development environment included Java 11, Apache Maven for dependency
management, and NetBeans IDE for designing the agent architecture. To emulate a protected web
application targeted by the pentest, web applications deployed on an Apache server with the WAF
module ModSecurity enabled were used, allowing the simulation of a modern protection system with
signature-based analysis.</p>
      <sec id="sec-4-1">
        <title>5.1. System Architecture</title>
        <p>The system architecture involves the implementation of four agents with different purposes, which
interact via ACL messages typical for JADE.</p>
        <p>Recon-Agent performs initial analysis of the target web application, including examining HTTP
headers, the presence of client-side JavaScript, and server behavior. It also detects the presence of
request filtering and characterizes the WAF operation.</p>
        <p>Mutation-Agent is responsible for generating malicious payloads using obfuscation methods. The
study implements three mutation approaches: character encoding (Base64, URL encoding), syntactic
transformations (altering the structure of requests), and polymorphism (dynamic XSS/SQLi payloads
that evade signature detection).</p>
        <p>Attack-Agent sends requests to the target system and records responses, including HTTP status
codes (403, 406, 500) and processing times. It also detects changes in WAF behavior after each attack
series.</p>
        <p>Learning-Agent analyzes attack results, performs machine learning generalization of effective
patterns, and adapts mutation and retry strategies. Based on data received from the Attack-Agent, it
modifies payload mutation parameters and sends them back to the Mutation-Agent, thus forming a
closed learning loop.</p>
        <p>Each agent runs in a separate JADE container, which can be deployed locally or remotely on a
separate physical or virtual node in another network. This enabled the implementation of a
distributed architecture where agents coordinate yet remain autonomous, which is especially
important for bypassing geolocation or IP-based filters.</p>
        <p>Communication between agents is conducted via ACL messages, allowing asynchronous
interaction without centralized control (Figure 1).</p>
        <p>The diagram illustrates the sequential data exchange between agents of the multi-agent system
operating in automated pentesting mode.</p>
        <p>All agents in the figure are connected by directed arrows, reflecting the sequence and cycle of
processing. The process begins with the Recon-Agent, which interacts with the target web
application, collecting data on HTTP headers, client-side scripts, and server behavior:</p>
        <sec id="sec-4-1-1">
          <title>1. Input: Collects data from target.</title>
          <p>2. Process: Collects HTTP headers, JavaScript code and server responses.</p>
          <p>Output: Passes collected data to Mutation-Agent.</p>
          <p>The information is passed to the Mutation-Agent, which generates adaptive payloads based on it,
taking into account possible protection at the WAF level:</p>
        </sec>
        <sec id="sec-4-1-2">
          <title>1. Input: Receives input data from Recon-Agent. 2. Process: Generates mutated payloads; Creates obfuscated or polymorphic payloads using encoding techniques (Base64, split-XSS, etc.). 3.</title>
          <p>Output: Passes formed requests to Attack-Agent.</p>
          <p>The simulated requests are sent to the Attack-Agent, which performs the attacks and records the
target system’s response, including status codes and processing time:</p>
        </sec>
        <sec id="sec-4-1-3">
          <title>1. Input: Receives payloads from Mutation-Agent. 2. Process: Sends attack requests to target and logs responses; Sends requests to web application, records response codes, response time. 3.</title>
          <p>Output: Forwards collected responses to Learning-Agent.</p>
          <p>The results are analyzed by the Learning-Agent, which identifies effective evasion strategies and
adjusts the actions of the Mutation-Agent accordingly:</p>
        </sec>
        <sec id="sec-4-1-4">
          <title>1. Input: Receives data on attack results from Attack-Agent</title>
          <p>2. Process: Analyzes effectiveness and adjusts mutation strategy; Analyzes the success of
attacks, adapts mutations for subsequent cycles.</p>
        </sec>
        <sec id="sec-4-1-5">
          <title>3. Result: Passes recommendations back, closes the adaptation cycle.</title>
          <p>Thus, the system forms a closed processing loop where each agent operates autonomously yet in
coordination, ensuring adaptability, learning, and flexible response to defense reactions in real time.</p>
          <p>The agents were deployed on different physical or virtual machines, simulating real distributed
conditions and allowing the evaluation of WAF evasion effectiveness from various geographic zones.</p>
          <p>Heuristic and machine learning approaches were used to generate modified requests that are not
recognized by the WAF as malicious but are still capable of triggering harmful behavior in the web
application. For instance, replacing SQL operators with their encoded or alternative representations
allows bypassing static filtering rules.</p>
        </sec>
        <sec id="sec-4-1-6">
          <title>As part of the study, three types of attack scenarios were created:</title>
          <p>XSS with character encoding (standard injected JavaScript with modified characters);
Polymorphic SQL injection (using keyword and parameter substitution to avoid detection);
Split XSS (split payload), where the malicious script is divided into several parts that execute
sequentially.</p>
          <p>The selection of these specific attack types (XSS, split-XSS, polymorphic SQLi) is justified by their
prevalence in modern web applications and their sensitivity to behavioral and signature-based WAF
mechanisms.</p>
          <p>In each test cycle, 100 requests were executed, and the results were recorded and classified based
on the success of WAF evasion.</p>
        </sec>
        <sec id="sec-4-1-7">
          <title>The evaluation methods included:</title>
          <p>analysis of HTTP response codes (2xx, 4xx, 5xx),
comparison of response times for modified requests,
statistical aggregation of successful attacks,
visualization of payload mutation effectiveness.</p>
          <p>The data is stored in log files, which allows the Learning-Agent to assess the effectiveness of each
mutation and adjust the strategy in subsequent stages.</p>
          <p>An example of a log file saved after a series of attacks and the use of the Learning-Agent to
evaluate mutation effectiveness and adapt strategies is shown in Figure 2.</p>
          <p>What the Learning-Agent analyzes:
•
•
•
•
•
•
•
•
•
mutation_type — the type of mutation that was applied;
was_blocked + http_status — the result of the request: successful or blocked;
waf_signature_triggered — the specific signature that was triggered (if any);
response_time_ms — an indirect indicator of additional request processing or filtering;
payload — allows evaluation of which specific constructions are more “invisible” to the WAF.</p>
          <p>Based on these logs, the Learning-Agent compiles statistics on successful/unsuccessful mutations,
excludes ineffective patterns from future attacks, adjusts the behavior of the Mutation-Agent to
generate more obfuscated or altered requests, and can assign weights to each mutation type
depending on its effectiveness (as part of a heuristic or reinforcement learning strategy).</p>
          <p>The results were compared to expected blocking rates characteristic of typical signature-based
WAF configurations. The research was conducted in a controlled lab environment, allowing precise
tracking of the impact each mutation method had on bypassing the protection.</p>
        </sec>
      </sec>
      <sec id="sec-4-2">
        <title>5.2. Implementation of distribution</title>
        <p>The concept of distribution is implemented through the use of autonomous agents that perform their
functions independently while exchanging results and coordinating actions to achieve a common
goal. Agents can be deployed on different physical or virtual machines, as well as in containers, and,
if possible, across diverse geographical locations to reduce the risk of blocking based on IP addresses
or geographic restrictions.</p>
        <p>For example, a Recon-Agent may operate from multiple IP addresses to avoid detection of
requests as malicious originating from a single source. Similarly, Mutation-Agent and Attack-Agent
can run concurrently on separate nodes, enabling parallel testing of various attack vectors. This
distribution allows for multifunctional attacks from multiple sources, minimizing the likelihood of
the entire system being blocked.</p>
        <p>Several Recon-Agents can simultaneously collect information from different sections of one or
multiple websites, analyzing pages, metadata, HTTP headers, request parameters, and server
responses from various points. This approach provides a more comprehensive understanding of
WAF configurations. The collected data is centrally stored and utilized by other agents.</p>
        <p>A Mutation-Agent distributed across multiple nodes generates payload variants for different
WAF configurations in parallel. One agent may focus on bypassing one type of protection, while
another targets a different one. The generated payloads are then passed to Attack-Agents for
simultaneous testing.</p>
        <p>The distribution of Attack-Agents sending requests from different geographical locations
accelerates testing and increases the likelihood of successful attacks by circumventing diverse
blocking strategies. The Learning-Agent operates both centrally and in a distributed manner,
gathering data on attack effectiveness, analyzing patterns, and optimizing strategies to minimize
detection risk. Data from various locations are aggregated and used to enhance subsequent attacks.</p>
        <p>The implementation of distribution in the system is based on autonomous agents that perform
their functions independently but exchange results through secure communication channels using
TLS protocols to ensure data integrity and confidentiality. Each agent undergoes authentication via
JADE Security mechanisms, minimizing the risk of unauthorized access or message forgery.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>6. Results and Discussion</title>
      <p>In the test scenarios simulating XSS and SQLi attacks, the agents dynamically modified payloads,
analyzed server responses, and learned from the results. Examples of test requests for XSS or SQLi
scanning with WAF bypass are shown in Table 1.</p>
      <p>Each request had a different attack nature, objective, and The first request aimed to test for XSS
vulnerability by injecting a simple script &lt;script&gt;alert(1)&lt;/script&gt;. If successful, a JavaScript alert
was expected to trigger. The presence of the alert indicated the absence of server-side script filtering.</p>
      <p>The second request — an SQL injection with the payload id=1' OR '1'='1 — targeted bypassing the
SQL parameter filtering logic.</p>
      <p>The expected outcome was either incorrect data output or complete request rejection in case of
blocking. If the server returned results, this indicated the presence of the injection vulnerability.</p>
      <p>The third request used an XSS attack via an image tag: &lt;img src=x onerror=alert(123)&gt;.</p>
      <p>The goal was to check whether the script executes upon handling an error in the attribute. If the
browser ran the script, it meant protective mechanisms did not block such constructs.</p>
      <p>In the fourth test, an obfuscated XSS attack was employed in the form of a URL-encoded SVG tag
containing a script with alert (document. cookie). This request was intended to test the WAF’s ability
to recognize and decode URL-encoded inputs. Successful bypass indicated insufficient depth of the
filtering check.</p>
      <p>The fifth test checked for SQL injection through a JSON request. The "username" field contained
a payload capable of initiating the deletion of the users table: "admin'; DROP TABLE users; --".</p>
      <p>If the request executed without errors, this indicated a serious vulnerability in JSON parameter
processing.</p>
      <p>The sixth request involved an LFI attack, where the "file" parameter was used to display a system
file (/etc/passwd).</p>
      <p>If successful, the expected result was either the file content displayed or a specific access error. If
the file was output, the system had a critical local file inclusion vulnerability.</p>
      <p>The seventh request tested an XSS attack with data exfiltration, where JavaScript was supposed
to send the user's cookies to an external server.</p>
      <p>If the browser executed the script and triggered the external request, it meant the WAF did not
block connections to third-party addresses via XSS.</p>
      <p>Overall, these requests allowed evaluation of the agent system’s bypass techniques, testing of
defensive mechanisms’ responses, and drawing conclusions about existing vulnerabilities in the web
application.</p>
      <p>Within the set goal, the system was tested for its ability to bypass WAF using various payload
mutation techniques.</p>
      <p>Three types of attacks were tested: character-encoded XSS, polymorphic SQLi, and split-XSS. The
results are presented in the table below (Table 2).</p>
      <sec id="sec-5-1">
        <title>The type of protection most frequently bypassed</title>
      </sec>
      <sec id="sec-5-2">
        <title>System response to payload mutations</title>
      </sec>
      <sec id="sec-5-3">
        <title>Value</title>
        <p>100
 60
 60%</p>
        <p>Split XSS
Polymorphic</p>
        <p>SQLi
Signaturebased WAF</p>
      </sec>
      <sec id="sec-5-4">
        <title>Reduction of</title>
        <p>blocks</p>
        <p>Specifically, split-bypass methods for XSS demonstrated high effectiveness in bypassing
behavioral filters, whereas SQL injections were often blocked by heuristic WAF algorithms,
indicating the need for deeper optimization.</p>
        <p>Analysis of agent performance showed that the Recon-Agent successfully identified the WAF
type in 87% of cases, providing relevant input data for subsequent attacks.</p>
        <p>The Mutation-Agent generated over 150 payload variants, among which split-XSS achieved the
highest success rate (up to 80%).</p>
        <p>The Attack-Agent recorded server response codes and request processing times, allowing
tracking of the system's reaction to each mutation; the average response time ranged between 230
and 310 ms.</p>
        <p>The Learning-Agent proved to be a key component of adaptation: after several attack cycles, it
improved the accuracy of selecting effective payloads from 55% to 71%, demonstrating the system’s
ability for self-learning and strategy optimization.</p>
      </sec>
      <sec id="sec-5-5">
        <title>The effectiveness of agents is demonstrated in the table 3. The results presented in Table 3 confirm the feasibility of distributing functions among agents, as well as the effectiveness of their interaction in implementing automated and adaptive penetration testing of protected web applications.</title>
        <p>Each agent plays a distinct role in the overall attack process — from information gathering to
payload generation, delivery, and analysis — enabling the system to maintain a full attack cycle with
feedback and learning elements.</p>
        <p>To further evaluate the performance of the system in a dynamic and scalable environment, an
additional experiment was conducted to assess how the number of agents affects the overall
effectiveness of WAF bypass attempts.</p>
        <p>The goal was to examine whether increasing the number of cooperating agents leads to a
measurable improvement in penetration testing outcomes.
The findings are visualized in the graph below and analyzed in detail (Figure 3).</p>
        <p>30</p>
        <p>The scalability experiment of the multi-agent system demonstrated a clear positive correlation
between the number of active agents and the number of successful bypasses of protection
mechanisms, particularly the Web Application Firewall (WAF). The graph illustrates the results of
10 testing series, where the number of concurrently operating agents ranged from 1 to 10.</p>
        <p>The results indicate that increasing the number of agents improves the system’s capability to
discover alternative attack vectors. With a single agent, the number of successful bypasses was
minimal (4 cases). As new agents were added, the overall effectiveness steadily improved, reaching
up to 28 successful bypasses at the 10-agent level. This can be explained by the parallel operation of
agents, each performing a specialized role (e.g., reconnaissance, mutation, attack execution, and
response analysis), which allowed the system to react more quickly to WAF rejections or blocks.</p>
        <p>However, beginning at approximately 7–8 agents, a saturation effect becomes evident: the growth
rate of successful attacks slows down. This suggests that the current system configuration
approaches its upper efficiency limit. Such an effect may be caused by overlapping agent operations
or system-level constraints (e.g., server request handling capacity or WAF throughput limitations).</p>
        <p>Overall, the results confirm that scaling a multi-agent system increases its performance in
automated penetration testing tasks, especially in the early stages of agent count expansion. This
supports the feasibility of employing distributed MAS architectures in real-world cybersecurity
environments.</p>
        <p>The experimental data show that the system demonstrates stable performance in security testing
tasks: the average success rate of attacks is approximately 60%. The highest effectiveness was
observed for XSS attacks using split techniques, which proved successful in bypassing both
signature-based and behavior-based WAF filters. This indicates the agents' ability to adapt and apply
unconventional payload strategies. At the same time, polymorphic SQL injections were blocked more
frequently, highlighting the need for further optimization of mutation techniques, particularly
through the use of time-based or blind SQLi methods.</p>
        <p>The system architecture, implemented on the JADE platform, combines automated scanning,
adaptive payload generation, parallel agent interaction, and real-time learning. The four main types
of agents — Recon-Agent, Mutation-Agent, Attack-Agent, and Learning-Agent — operate
autonomously but remain coordinated within a shared strategy. This enables the system to adapt to
changes in the defensive environment, reducing the risk of detection and providing flexibility in
attack tactics.</p>
        <p>Deploying agents across distributed nodes, including geographically separated locations, allows
the system to simulate realistic attack scenarios and avoid blocking based on IP or geolocation filters.
Moreover, the presence of a feedback loop between agents (especially between Attack-Agent and
Learning-Agent) ensures the progressive refinement of attack strategies based on the outcomes of
previous iterations.</p>
        <p>Thus, the proposed approach demonstrates the advantages of dynamic payload mutation,
distributed architecture, and agent self-learning capabilities. Future research will focus on
integrating machine learning algorithms to predict WAF behavior and generate more sophisticated,
context-aware attacks, thereby significantly enhancing the system’s effectiveness in real-time
environments.</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>7. Comparative analysis</title>
      <p>To justify the feasibility of the proposed multi-agent system, a comparative analysis was conducted
against existing automated pentesting tools, including Burp Suite, SQLMap, and approaches based
on the SPADE platform.</p>
      <p>Burp Suite is a widely used commercial framework for web application security analysis, enabling
manual and semi-automated testing, including request interception, modification, and resubmission.
However, it lacks full support for distributed execution, real-time adaptive behavior toward security
systems, and requires significant user involvement. Furthermore, many of its advanced features are
only available in the paid version, limiting its scalability for broad deployment.</p>
      <p>SQLMap is a highly specialized tool designed to detect and exploit SQL injection vulnerabilities.
It supports a wide range of obfuscation methods, automatic injection parameter detection, and partial
WAF evasion through various techniques. Nevertheless, SQLMap is focused exclusively on a single
class of attacks (SQLi) and does not provide inter-module interaction or support for multi-strategy
behavior.</p>
      <p>SPADE (Smart Python Agent Development Environment) is a platform for developing agents in
Python that enables the creation of autonomous action scenarios. However, SPADE demonstrates
limited flexibility when scaled or deployed in heterogeneous environments, and it lacks full agent
mobility. Moreover, it does not offer comprehensive support for FIPA protocols, which complicates
the development of adaptive and dynamically interacting systems.</p>
      <p>The proposed system, based on JADE, stands out by combining several key functional advantages:
support for distributed interaction between agents, the ability to operate autonomously across
different nodes, adaptation to defense system responses, dynamic payload generation, and learning
from attack results. This makes the system not only a scanning tool but also an intelligent mechanism
for discovering evasion strategies in actively protected environments (WAF, IDS/IPS).</p>
      <p>Table 4 presents a summarized comparison of the functionality of the mentioned approaches.</p>
      <p>The comparison results indicate that the proposed JADE-based multi-agent system offers a
number of advantages that ensure its effectiveness as a tool for adaptive and scalable penetration
testing under modern cybersecurity challenges. Its distributed nature, learning capabilities, support
for multiple attack classes, and open architecture provide a solid foundation for further integration
of the system into real-world corporate environments.</p>
      <sec id="sec-6-1">
        <title>The key advantages of the system were found to be:</title>
        <p>•
•
•
•</p>
        <p>Parallel execution – agents operated independently, allowing simultaneous information
gathering, attack generation, and learning;
Adaptability – agents adjusted their strategies in response to WAF reactions, demonstrating
features of machine learning;
Distributed deployment – placing agents on different nodes helped reduce the risk of
IPbased blocking and increased the amount of collected data;
Coordinated interaction – the system's architecture ensured efficient data exchange between
agents with minimal latency, enabled by the use of FIPA-compliant protocols provided by
the JADE platform.</p>
      </sec>
    </sec>
    <sec id="sec-7">
      <title>8. Integration aspects and system development plans</title>
      <p>The proposed solution is based on a modular architecture that enables gradual scaling of the number
of agents, with the possibility of centralized monitoring of their status. Although JADE is built in
Java, the interaction interfaces between agents are implemented as REST endpoints and ACL
messages, which opens the possibility for integration with Python scripts or external pentesting tools
such as SQLMap, wfuzz, or Zap.</p>
      <p>To facilitate the system’s deployment in practical security environments, a simplified launch
mode is provided through Docker containers with preconfigured JADE containers and configuration
profiles, minimizing user workload and reducing deployment time. Future plans include the
development of a web interface for managing agents and visualizing results.</p>
      <p>Regarding attack types, the system currently focuses on XSS and SQLi, as they are common and
representative vectors that are sensitive to filtering. However, the system’s architecture is designed
to support the extension of payload types. Future versions are planned to include support for SSRF
attacks and heuristic testing for business logic flaws. For this purpose, the Mutation-Agent will be
extended with templates for atypical requests, while the Learning-Agent will incorporate a response
classification subsystem based not only on HTTP status codes but also on content analysis.</p>
      <p>Another important aspect is that real-time adaptation to WAF rule changes indeed requires
computational resources. To reduce the number of false positives or negatives, a prioritization
mechanism has been implemented that ranks payloads based on their historical effectiveness.
Additionally, attack attempts are buffered and analyzed based on server response time, with noisy
or non-informative payloads filtered out. This helps reduce the frequency of low-value requests.</p>
      <p>As a promising direction, the use of incremental learning in the Learning-Agent is being
considered to dynamically refine effective patterns without requiring full model retraining.
Furthermore, integration with popular CI/CD or DevSecOps platforms will enable the automation of
pentesting as part of the continuous integration pipeline.</p>
    </sec>
    <sec id="sec-8">
      <title>9. Conclusions</title>
      <p>As a result of the conducted research, a distributed multi-agent system for automated web
application security testing was implemented. The proposed solution is based on the JADE platform
and integrates the functionality of several types of agents (Recon, Mutation, Attack, Learning), which
interact autonomously in real time. A closed learning loop between the agents was established,
where the effectiveness of attacks is used to dynamically update the payload mutation strategy,
enabling the system to adapt to the behavior of WAF/IDS in real time. This approach provides
parallel request processing, adaptation to protective mechanisms, and learning capability based on
obtained results.</p>
      <p>The system demonstrated stable performance in penetration testing tasks: the average attack
success rate was approximately 60%, with the best results achieved for split-XSS. Polymorphic SQL
injections proved less effective due to countermeasures from heuristic WAF filters. The distributed
operation of agents reduced the risk of IP blocking and increased the system’s overall resilience to
detection.</p>
      <p>Comparative analysis confirmed the advantages of the proposed system over traditional tools
(Burp Suite, SQLMap) and agent-based platforms built on SPADE. Key differentiators include
dynamic adaptation to defenses, distributed architecture, openness, and support for multiple attack
classes.</p>
      <p>Unlike previously described platforms, the proposed system demonstrates the ability to scale and
process requests in a distributed environment with support for various attack types, including XSS
(notably split-XSS) and polymorphic SQLi, with prospects for extension to SSRF and logic
vulnerabilities.</p>
      <p>Heuristic analysis and request obfuscation tools integrated into the system proved effective in
realistic tests—the average success rate of attacks reached 60%, and up to 80% for split-XSS.</p>
      <p>At the same time, results indicate the need for further improvement in supporting time-based
SQLi, blind-XSS, and optimizing performance when processing large volumes of requests. The
proposed system features a modular architecture and open interfaces, ensuring efficient integration
with diverse external tools and platforms. Use of REST endpoints and Docker containerization
support simplify deployment and scaling in practical environments.</p>
      <p>Future work envisions integrating machine learning algorithms to predict WAF responses and
generate more complex payloads. The developed system can be utilized both for research purposes
and as a foundation for practical cybersecurity solutions.</p>
    </sec>
    <sec id="sec-9">
      <title>Acknowledgements</title>
      <p>We express our gratitude to all members of the group who diligently and persistently conducted this
research. Special thanks are extended to Professor Y.Dorogyy and PhD candidate V. Kravchuk for
their significant contributions to prior studies. We also convey our appreciation to the teams of the
Departments of Information Security Management and Applied Mathematics and Computer Science,
as well as to the postgraduate and master’s students whose ideas greatly contributed to the
modernization of the research and its integration into the educational process, and we hope the
research will be further developed in their future scientific work.</p>
    </sec>
    <sec id="sec-10">
      <title>Declaration on Generative AI</title>
      <p>During the preparation of this work, the authors used generative AI tools by using the activity
taxonomy in ceur-ws.org/genai-tax.html to improve grammar, spelling, and enhance the visual
quality of Figure 1. After using these tools and services, the authors thoroughly reviewed and edited
all AI-assisted content, ensured its accuracy, and presented it in their own words. The authors are
fully responsible for the final content of the publication."</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Valentina</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vishwashri</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Rajadurai</surname>
          </string-name>
          , “
          <article-title>Finding Vulnerability in Web Application by using Pentesting,”</article-title>
          <string-name>
            <surname>Int. J. Multidiscip. Res.</surname>
          </string-name>
          ,
          <year>2024</year>
          . doi:
          <volume>10</volume>
          .36948/ijfmr.
          <year>2024</year>
          .
          <year>v06i04</year>
          .
          <fpage>24517</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>M.</given-names>
            <surname>Olivares-Naya</surname>
          </string-name>
          , J. C. de Gracia,
          <article-title>and A. S'anchez-Maci'an, “Adding web pentesting functionality to PTHelper,” ArXiv</article-title>
          , vol.
          <source>abs/2410.12422</source>
          ,
          <year>2024</year>
          . URL:https://api.semanticscholar.org/CorpusID:273375081
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>L.</given-names>
            <surname>De Lima</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Horstmann</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Neto</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Grégio</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Silva</surname>
          </string-name>
          , and L. Peres, “
          <source>On the Challenges of Automated Testing of Web Vulnerabilities,” in 2020 IEEE 29th Int. Conf. Enabling Technol. Infrastruct. Collaborative Enterprises (WETICE)</source>
          ,
          <year>2020</year>
          , pp.
          <fpage>203</fpage>
          -
          <lpage>206</lpage>
          . doi:
          <volume>10</volume>
          .1109/WETICE49692.
          <year>2020</year>
          .
          <volume>00047</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Wijaya</surname>
          </string-name>
          , “
          <article-title>Web-Based Dashboard for Monitoring Penetration Testing Activities Based on OWASP Standards,”</article-title>
          <string-name>
            <given-names>J. Ilm. Tek. Elektro</given-names>
            <surname>Komput</surname>
          </string-name>
          . Inform.,
          <year>2020</year>
          . doi:
          <volume>10</volume>
          .26555/jiteki.v16i1.
          <fpage>17019</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <article-title>[5] "Burp Suite," PortSwigger</article-title>
          , URL: https://surl.gd/kteluz.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>B</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          , NRK,
          <string-name>
            <surname>S.</surname>
          </string-name>
          , J,
          <string-name>
            <surname>T.</surname>
          </string-name>
          , &amp; S,
          <string-name>
            <surname>S.</surname>
          </string-name>
          (
          <year>2024</year>
          ).
          <article-title>A Comparative Analysis of Vulnerability Management Tools: Evaluating Nessus, Acunetix, and Nikto for Risk Based Security Solutions</article-title>
          . arXiv. URL: https://doi.org/10.48550/arXiv.2411.19123
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>K.</given-names>
            <surname>Vimala</surname>
          </string-name>
          and
          <string-name>
            <given-names>S.</given-names>
            <surname>Fugkeaw</surname>
          </string-name>
          , “
          <article-title>VAPE-BRIDGE: Bridging OpenVAS Results for Automating Metasploit Framework</article-title>
          ,” in
          <source>2022 14th Int. Conf. Knowl. Smart Technol</source>
          .
          <source>(KST)</source>
          ,
          <year>2022</year>
          , pp.
          <fpage>69</fpage>
          -
          <lpage>74</lpage>
          . doi:
          <volume>10</volume>
          .1109/KST53302.
          <year>2022</year>
          .
          <volume>9729085</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>K.</given-names>
            <surname>Kravari</surname>
          </string-name>
          and
          <string-name>
            <given-names>N.</given-names>
            <surname>Bassiliades</surname>
          </string-name>
          ,
          <article-title>"A survey of agent platforms,"</article-title>
          <source>J. Artif. Soc. Soc. Simul.</source>
          , vol.
          <volume>18</volume>
          ,
          <year>2015</year>
          . doi:
          <volume>10</volume>
          .18564/jasss.2661
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>N.</given-names>
            <surname>Gilbert</surname>
          </string-name>
          and
          <string-name>
            <given-names>S.</given-names>
            <surname>Bankes</surname>
          </string-name>
          ,
          <article-title>"Platforms and methods for agentbased modeling,"</article-title>
          <source>Proc. Natl. Acad. Sci. U. S. A.</source>
          , vol.
          <volume>99</volume>
          , pp.
          <fpage>7197</fpage>
          -
          <lpage>7198</lpage>
          , May
          <year>2002</year>
          . doi:
          <volume>10</volume>
          .1073/PNAS.072079499.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>S.</given-names>
            <surname>Railsback</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Lytinen</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Jackson</surname>
          </string-name>
          ,
          <article-title>"Agent-based simulation platforms: Review and development recommendations,"</article-title>
          <source>Simulation</source>
          , vol.
          <volume>82</volume>
          , pp.
          <fpage>609</fpage>
          -
          <lpage>623</lpage>
          , Sep.
          <year>2006</year>
          . doi:
          <volume>10</volume>
          .1177/0037549706073695.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>C.-V.</given-names>
            <surname>Pal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Leon</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Paprzycki</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Ganzha</surname>
          </string-name>
          ,
          <article-title>"A review of platforms for the development of agent systems,"</article-title>
          <source>Inf.</source>
          , vol.
          <volume>14</volume>
          , p.
          <fpage>348</fpage>
          ,
          <string-name>
            <surname>Jul</surname>
          </string-name>
          .
          <year>2020</year>
          . DOI:
          <volume>10</volume>
          .3390/info14060348
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>E.</given-names>
            <surname>Gonçalves</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Cortés</surname>
          </string-name>
          , G. Campos,
          <string-name>
            <given-names>Y. S.</given-names>
            <surname>Lopes</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Freire</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Silva</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Oliveira</surname>
          </string-name>
          , and
          <string-name>
            <surname>M. A. De Oliveira</surname>
          </string-name>
          ,
          <article-title>"MAS-ML 2.0: Supporting the modelling of multi-agent systems with different agent architectures,"</article-title>
          <source>Journal of Systems and Software</source>
          , vol.
          <volume>108</volume>
          , pp.
          <fpage>77</fpage>
          -
          <lpage>109</lpage>
          , Oct.
          <year>2015</year>
          . doi:
          <volume>10</volume>
          .1016/j.jss.
          <year>2015</year>
          .
          <volume>06</volume>
          .008.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>P.</given-names>
            <surname>Vrba</surname>
          </string-name>
          ,
          <article-title>"JAVA-based agent platform evaluation,"</article-title>
          <source>Sep</source>
          .
          <year>2003</year>
          , pp.
          <fpage>47</fpage>
          -
          <lpage>58</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>540</fpage>
          - 45185-
          <issue>3</issue>
          _
          <fpage>5</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>M.</given-names>
            <surname>Ahmed</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Kazar</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Harous</surname>
          </string-name>
          ,
          <article-title>"Cyber-physical system model based on multi-agent system,"</article-title>
          <source>IET Cyber-Physical Systems: Theory &amp; Applications</source>
          , Jun.
          <year>2024</year>
          . doi:
          <volume>10</volume>
          .1049/cps2.
          <fpage>12096</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>R.</given-names>
            <surname>Cavalcante</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Bittencourt</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Silva</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Silva</surname>
          </string-name>
          , E. Costa, and
          <string-name>
            <given-names>R.</given-names>
            <surname>Santos</surname>
          </string-name>
          ,
          <article-title>"A survey of security in multi-agent systems,"</article-title>
          <source>Expert Systems with Applications</source>
          , vol.
          <volume>39</volume>
          , p
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>K.</given-names>
            <surname>Pan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Lyu</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Q.</given-names>
            <surname>Pan</surname>
          </string-name>
          ,
          <article-title>"Adaptive formation for multiagent systems subject to denial-ofservice attacks,"</article-title>
          <source>IEEE Transactions on Circuits and Systems I: Regular Papers</source>
          , vol.
          <volume>69</volume>
          , pp.
          <fpage>3391</fpage>
          -
          <lpage>3401</lpage>
          , Aug.
          <year>2022</year>
          . doi:
          <volume>10</volume>
          .1109/TCSI.
          <year>2022</year>
          .
          <volume>3168163</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>X.</given-names>
            <surname>Yang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Yang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Dong</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.-H.</given-names>
            <surname>Jin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Yang</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Y.</given-names>
            <surname>Lin</surname>
          </string-name>
          ,
          <article-title>"Consensus tracking control for uncertain non-strict feedback multi-agent system under cyber-attack via resilient neuroadaptive approach,"</article-title>
          <source>International Journal of Robust and Nonlinear Control</source>
          , vol.
          <volume>32</volume>
          , pp.
          <fpage>4251</fpage>
          -
          <lpage>4280</lpage>
          , Feb.
          <year>2022</year>
          . doi:
          <volume>10</volume>
          .1002/rnc.6035.
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>A.</given-names>
            <surname>Dorri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Kanhere</surname>
          </string-name>
          , and
          <string-name>
            <given-names>R.</given-names>
            <surname>Jurdak</surname>
          </string-name>
          ,
          <article-title>"Multi-agent systems: A survey,"</article-title>
          <source>IEEE Access</source>
          , vol.
          <volume>6</volume>
          , pp.
          <fpage>28573</fpage>
          -
          <lpage>28593</lpage>
          , Apr.
          <year>2018</year>
          . doi:
          <volume>10</volume>
          .1109/ACCESS.
          <year>2018</year>
          .2831228
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <surname>L. De Lima</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Horstmann</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Neto</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Grégio</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          <string-name>
            <surname>Silva</surname>
          </string-name>
          , and L. Peres, “
          <source>On the Challenges of Automated Testing of Web Vulnerabilities,” in 2020 IEEE 29th Int. Conf. Enabling Technol. Infrastruct. Collaborative Enterprises (WETICE),</source>
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>B.</given-names>
            <surname>Isiker</surname>
          </string-name>
          and
          <string-name>
            <surname>I. Sogukpinar</surname>
          </string-name>
          , “
          <article-title>Machine learning based web application firewall,”</article-title>
          <source>in *Proc. 2nd Int. Informatics and Software Eng. Conf. (IISEC)*</source>
          ,
          <year>2021</year>
          . doi:
          <volume>10</volume>
          .1109/IISEC54230.
          <year>2021</year>
          .9672335
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>S.</given-names>
            <surname>Applebaum</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Gaber</surname>
          </string-name>
          , and A. AhmedAli, “
          <article-title>Signature-based and machine-learning-based web application firewalls: A short survey</article-title>
          ,
          <source>” *Procedia Comput. Sci.*</source>
          , vol.
          <volume>189</volume>
          , pp.
          <fpage>359</fpage>
          -
          <lpage>367</lpage>
          ,
          <year>2021</year>
          . doi:
          <volume>10</volume>
          .1016/j.procs.
          <year>2021</year>
          .
          <volume>05</volume>
          .105
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>P.</given-names>
            <surname>Shahrivar</surname>
          </string-name>
          , “
          <article-title>Detection of vulnerability scanning attacks using machine learning,” Master's thesis</article-title>
          ,
          <source>KTH Royal Inst. of Technology</source>
          ,
          <year>2022</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <surname>J.-Á.</surname>
            Román-Gallego,
            <given-names>M.-L.</given-names>
          </string-name>
          <string-name>
            <surname>Pérez-Delgado</surname>
            ,
            <given-names>M. Luengo</given-names>
          </string-name>
          <string-name>
            <surname>Viñuela</surname>
          </string-name>
          , and
          <string-name>
            <surname>M.-C.</surname>
          </string-name>
          Vega-Hernández, “
          <article-title>Artificial Intelligence Web Application Firewall for advanced detection of web injection attacks,” *Expert Syst</article-title>
          .*,
          <year>e13505</year>
          ,
          <year>2024</year>
          . doi:
          <volume>10</volume>
          .1111/exsy.13505
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>A.</given-names>
            <surname>Valenza</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Demetrio</surname>
          </string-name>
          , G. Costa, and G. Lagorio, “
          <article-title>WAF-A-MoLE: An adversarial tool for assessing ML-based WAFs</article-title>
          ,” *SoftwareX*, vol.
          <volume>11</volume>
          ,
          <year>2020</year>
          . doi:
          <volume>10</volume>
          .1016/j.softx.
          <year>2020</year>
          .100367
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25] HackYourMom, “
          <article-title>Dangerous injections: Methods of bypassing protection using SQLMap,”</article-title>
          URL:https://hackyourmom.com/kibervijna/nebezpechni-inyekcziyi
          <article-title>-metody-obhodu-zahystuza-dopomogoyu-sqlmap/</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>A.</given-names>
            <surname>Doupé</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Cova</surname>
          </string-name>
          , and G. Vigna, “Why Johnny
          <string-name>
            <surname>Can't Pentest</surname>
          </string-name>
          :
          <article-title>An Analysis of Black-Box Web Vulnerability Scanners</article-title>
          ,”
          <year>2010</year>
          , pp.
          <fpage>111</fpage>
          -
          <lpage>131</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>642</fpage>
          -14215-
          <issue>4</issue>
          _
          <fpage>7</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>K.</given-names>
            <surname>Vimala</surname>
          </string-name>
          and
          <string-name>
            <given-names>S.</given-names>
            <surname>Fugkeaw</surname>
          </string-name>
          , “
          <article-title>VAPE-BRIDGE: Bridging OpenVAS Results for Automating Metasploit Framework</article-title>
          ,” in
          <source>2022 14th Int. Conf. Knowl. Smart Technol</source>
          .
          <source>(KST)</source>
          ,
          <year>2022</year>
          , pp.
          <fpage>69</fpage>
          -
          <lpage>74</lpage>
          . doi:
          <volume>10</volume>
          .1109/KST53302.
          <year>2022</year>
          .
          <volume>9729085</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>M.</given-names>
            <surname>Albahar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Alansari</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Jurcut</surname>
          </string-name>
          , “
          <article-title>An Empirical Comparison of Pen-Testing Tools for Detecting Web App Vulnerabilities</article-title>
          ,” Electronics,
          <year>2022</year>
          . doi:
          <volume>10</volume>
          .3390/ electronics11192991.
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>V.</given-names>
            <surname>Kravchuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Maslova</surname>
          </string-name>
          ,
          <string-name>
            <surname>and I. Dorohyi</surname>
          </string-name>
          ,
          <article-title>"Automated xss vulnerability detection in web applications based on a multi-agent approach,"</article-title>
          <source>Scientific Papers of Donetsk</source>
          National Technical University. Series: “Computer Engineering and Automation," vol.
          <volume>3</volume>
          , no.
          <volume>4</volume>
          (
          <issue>36</issue>
          ), pp.,
          <year>2025</year>
          . - 19-30. https://doi.org/10.31474/
          <fpage>2786</fpage>
          -9024/v3i4(36).
          <fpage>324435</fpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>