<?xml version="1.0" encoding="utf-8"?>
<journal>
<title>Biannual Journal Monadi for Cyberspace Security (AFTA)</title>
<title_fa>امنیت فضای تولید و تبادل اطلاعات (منادی)</title_fa>
<short_title>منادی</short_title>
<subject>Engineering &amp; Technology</subject>
<web_url>http://monadi.isc.org.ir</web_url>
<journal_hbi_system_id>1</journal_hbi_system_id>
<journal_hbi_system_user>admin</journal_hbi_system_user>
<journal_id_issn>2476-3047</journal_id_issn>
<journal_id_issn_online>2476-3047</journal_id_issn_online>
<journal_id_pii>8</journal_id_pii>
<journal_id_doi>7</journal_id_doi>
<journal_id_iranmedex></journal_id_iranmedex>
<journal_id_magiran></journal_id_magiran>
<journal_id_sid>14</journal_id_sid>
<journal_id_nlai>8888</journal_id_nlai>
<journal_id_science>13</journal_id_science>
<language>fa</language>
<pubdate>
	<type>jalali</type>
	<year>1404</year>
	<month>12</month>
	<day>1</day>
</pubdate>
<pubdate>
	<type>gregorian</type>
	<year>2026</year>
	<month>3</month>
	<day>1</day>
</pubdate>
<volume>14</volume>
<number>2</number>
<publish_type>online</publish_type>
<publish_edition>1</publish_edition>
<article_type>fulltext</article_type>
<articleset>
	<article>


	<language>fa</language>
	<article_id_doi></article_id_doi>
	<title_fa>طراحی و پیاده‌سازی ابزار شناساگر فناوری‌های تحت وب</title_fa>
	<title>Design and Implementation of a Web Technology Identification Tool</title>
	<subject_fa>رمز و امنیت اطلاعات</subject_fa>
	<subject>Cryptology and Information Security</subject>
	<content_type_fa>پژوهشی</content_type_fa>
	<content_type> Research Article</content_type>
	<abstract_fa>&lt;div style=&quot;text-align: justify;&quot;&gt;با رشد چشم&#8204;گیر فناوری&#8204;های تحت وب، شناخت دقیق فناوری&#8204;های به&#8204;کاررفته در وب&#8204;سایت&#8204;ها به یکی از محورهای کلیدی در تحلیل&#8204;های امنیتی، توسعه و ارزیابی دارایی&#8204;های دیجیتال تبدیل شده است. این مقاله با تمرکز بر تحلیل از منظر کاربر، یک معماری چندلایه&#8204;ای برای شناسایی فناوری&#8204;های وب ارائه می&#8204;دهد که مبتنی بر اطلاعات قابل مشاهده در سمت مرورگر است. ساختار پیشنهادی در سه مرحله&#8204;ی اصلی شامل آماده&#8204;سازی و ارسال درخواست HTTP، تحلیل ساختاریافته&#8204;ی پاسخ دریافتی از سرور و تطبیق اطلاعات با پایگاه دانش طراحی شده است. در بخش تحلیل، داده&#8204;ها از لایه&#8204;هایی همچون سرآیندها، کوکی&#8204;ها، کد HTML، منابع بارگذاری&#8204;شده و متغیرهای JavaScript در زمان اجرا استخراج می&#8204;شوند. سپس با بهره&#8204;گیری از پایگاه دانشی قابل گسترش، فرآیند استنتاج فناوری&#8204;ها انجام می&#8204;شود. رویکرد پیشنهادی با قابلیت یکپارچه&#8204;سازی با ابزارهای تحلیلی دیگر طراحی شده و می&#8204;تواند در کاربردهایی نظیر تست نفوذ، تحلیل سطح حمله و پایش امنیتی مؤثر واقع شود.&lt;/div&gt;</abstract_fa>
	<abstract>&lt;ol&gt;
	&lt;li style=&quot;margin-bottom: 11px; margin-left: 8px; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:&amp;quot;Calibri&amp;quot;,sans-serif&quot;&gt;Introduction: The Evolution of Web Complexity&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:&amp;quot;Calibri&amp;quot;,sans-serif&quot;&gt;In the contemporary Information Technology (IT) era, the nature of the &amp;quot;website&amp;quot; has undergone a fundamental transformation. Modern web entities are no longer static repositories of hypertext; they have evolved into high-performance, multilayered application platforms. These platforms integrate a diverse stack of technologies, including server-side frameworks (Node.js, Django, Spring), client-side libraries (React, Vue, Angular), Content Management Systems (CMS), and sophisticated cloud-native infrastructures.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:&amp;quot;Calibri&amp;quot;,sans-serif&quot;&gt;From a cybersecurity and market analysis perspective, the ability to accurately identify this underlying stack is paramount. For security professionals, technology identification is the precursor to Attack Surface Management (ASM). Knowing the specific version of a CMS or a server-side module allows for the identification of known vulnerabilities (CVEs). Conversely, for attackers, this &amp;quot;reconnaissance&amp;quot; phase is the first step in the kill chain.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:&amp;quot;Calibri&amp;quot;,sans-serif&quot;&gt;Current industry-standard tools, such as Wappalyzer or WhatWeb, often fall short when encountering modern web architectures. Their reliance on static regex-based matching of HTML source code makes them ineffective against Single Page Applications (SPAs) or sites protected by anti-bot and anti-identification mechanisms (e.g., Cloudflare, Akamai). This research addresses these gaps by proposing a hybrid architecture that integrates static and dynamic analysis across five distinct data layers.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;

&lt;ol start=&quot;2&quot;&gt;
	&lt;li style=&quot;margin-bottom: 11px; margin-left: 8px; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:&amp;quot;Calibri&amp;quot;,sans-serif&quot;&gt;Problem Definition: The &amp;quot;Black Box&amp;quot; of Web Analysis&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:&amp;quot;Calibri&amp;quot;,sans-serif&quot;&gt;The primary challenge in web technology identification is the asymmetry of information. An analyst operates from the client-side, possessing zero-knowledge of the server&amp;rsquo;s internal state, original source code, or backend configurations. Identification, therefore, becomes a non-deterministic fingerprinting process based on indirect signals.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:&amp;quot;Calibri&amp;quot;,sans-serif&quot;&gt;The research identifies three core challenges:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:&amp;quot;Calibri&amp;quot;,sans-serif&quot;&gt;1. Indicator Ambiguity: Many frameworks share similar file structures or naming conventions, leading to false positives.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:&amp;quot;Calibri&amp;quot;,sans-serif&quot;&gt;2. Code Obfuscation: Modern build tools minify and obfuscate JavaScript, stripping away human-readable variable names that would otherwise serve as clear indicators.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:&amp;quot;Calibri&amp;quot;,sans-serif&quot;&gt;3. Dynamic Rendering: Content generated client-side via JavaScript (DOM manipulation) is invisible to static crawlers that do not execute a JavaScript engine.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:&amp;quot;Calibri&amp;quot;,sans-serif&quot;&gt;To resolve these, a hybrid, multilayered approach is required to aggregate weak indicators from multiple sources into a strong, high-confidence identification.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;

&lt;ol start=&quot;3&quot;&gt;
	&lt;li style=&quot;margin-bottom: 11px; margin-left: 8px; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:&amp;quot;Calibri&amp;quot;,sans-serif&quot;&gt;The Proposed Three-Stage Architecture&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:&amp;quot;Calibri&amp;quot;,sans-serif&quot;&gt;The proposed architecture follows a logical pipeline: Preparation, Structured Analysis, and Knowledge Base Inference.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:&amp;quot;Calibri&amp;quot;,sans-serif&quot;&gt;3-1- Stage I: Preparation and Client Simulation&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:&amp;quot;Calibri&amp;quot;,sans-serif&quot;&gt;The process begins with the parsing of the Uniform Resource Locator (URL). This is not a simple string split; it involves resolving the domain via DNS (Domain Name System). By analyzing DNS records (A, AAAA, CNAME, TXT), the system can immediately identify Content Delivery Networks (CDNs) or Web Application Firewalls (WAFs) like Cloudflare or Incapsula.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:&amp;quot;Calibri&amp;quot;,sans-serif&quot;&gt;The connection phase involves the TCP Handshake and, crucially, the TLS (Transport Layer Security) Negotiation. The research emphasizes the analysis of digital certificates. Attributes such as the Certificate Authority (CA) and the cipher suites offered by the server provide early clues about the hosting environment (e.g., Let&amp;rsquo;s Encrypt vs. Enterprise-grade CAs).&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:&amp;quot;Calibri&amp;quot;,sans-serif&quot;&gt;To bypass anti-identification mechanisms, the architecture employs Headless Browsers (e.g., Chromium-based). This is a critical distinction from traditional tools. When a server presents a &amp;quot;JavaScript Challenge,&amp;quot; the headless browser executes the script, satisfies the challenge, manages the resulting session cookies, and retrieves the fully rendered DOM for the next stage.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:&amp;quot;Calibri&amp;quot;,sans-serif&quot;&gt;3-2- Stage II: The Five Layers of Structured Analysis&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:&amp;quot;Calibri&amp;quot;,sans-serif&quot;&gt;The heart of the research lies in the parallel analysis of five distinct data silos:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:&amp;quot;Calibri&amp;quot;,sans-serif&quot;&gt;LAYER 1: HTTP RESPONSE HEADERS (METADATA LAYER)&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:&amp;quot;Calibri&amp;quot;,sans-serif&quot;&gt;Headers are the &amp;quot;handshake&amp;quot; of the application layer. The architecture scans for explicit headers like Server (e.g., nginx/1.18.0) and X-Powered-By (e.g., PHP/7.4). However, since these can be easily spoofed or suppressed by security-conscious admins, the system also looks for implicit headers like X-AspNet-Version or custom headers unique to specific load balancers or proxy servers.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:&amp;quot;Calibri&amp;quot;,sans-serif&quot;&gt;LAYER 2: HTTP COOKIES (SESSION LAYER)&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:&amp;quot;Calibri&amp;quot;,sans-serif&quot;&gt;Cookies are highly reliable fingerprints. The naming convention of a session cookie is often a &amp;quot;smoking gun&amp;quot; for the backend framework. For example, PHPSESSID points to PHP, JSESSIONID to Java/Spring, and csrftoken often to Django. Beyond names, the attributes (Secure, HttpOnly, SameSite) indicate the security posture and architectural decisions of the developers.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:&amp;quot;Calibri&amp;quot;,sans-serif&quot;&gt;LAYER 3: HTML CONTENT (STRUCTURAL LAYER)&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:&amp;quot;Calibri&amp;quot;,sans-serif&quot;&gt;This layer performs a systematic scan of the Document Object Model (DOM). It looks for:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:&amp;quot;Calibri&amp;quot;,sans-serif&quot;&gt;&amp;bull; CMS Signatures: WordPress typically includes specific paths in its meta name=&amp;quot;generator&amp;quot; tags.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:&amp;quot;Calibri&amp;quot;,sans-serif&quot;&gt;&amp;bull; Tag Hierarchy: Unique ID or Class naming conventions (e.g., wp-block-image for WordPress or data-reactroot for React).&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:&amp;quot;Calibri&amp;quot;,sans-serif&quot;&gt;&amp;bull; Metadata: Specific &lt;meta&gt;, &lt;link&gt;, and &lt;title&gt; tags that reveal SEO tools, analytics plugins, or CSS frameworks (like Bootstrap or Tailwind).&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:&amp;quot;Calibri&amp;quot;,sans-serif&quot;&gt;LAYER 4: LOADED RESOURCES (ASSET LAYER)&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:&amp;quot;Calibri&amp;quot;,sans-serif&quot;&gt;Websites are composed of numerous static assets. The architecture analyzes the directory structure of these assets. A /wp-content/ directory is a definitive indicator of WordPress, while a /dist/ or /_next/ folder often indicates modern build tools like Webpack or the Next.js framework. The analysis also covers versioning schemes (e.g., jquery.min.js?v=3.6.0), which are vital for vulnerability assessment.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:&amp;quot;Calibri&amp;quot;,sans-serif&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; LAYER 5: JAVASCRIPT RUNTIME (DYNAMIC LAYER)&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:&amp;quot;Calibri&amp;quot;,sans-serif&quot;&gt;This is the most innovative layer. By executing JavaScript in a controlled environment, the architecture inspects the global namespace (window or globalThis). Even if the source code is obfuscated, frameworks must instantiate global objects to function. Detecting a window.React or window.Vue object provides a 100% confidence match that is impossible to achieve through static HTML analysis alone. This layer also monitors API interactions, such as calls to specific browser APIs, to deduce the framework&amp;rsquo;s behavior.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:&amp;quot;Calibri&amp;quot;,sans-serif&quot;&gt;3-3- Stage III: Knowledge Base (KB) Matching and Weighting&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:&amp;quot;Calibri&amp;quot;,sans-serif&quot;&gt;The raw data from the five layers is fed into a Central Knowledge Base. This KB is not a simple list but a structured JSON repository of thousands of &amp;quot;Signatures.&amp;quot;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:&amp;quot;Calibri&amp;quot;,sans-serif&quot;&gt;A key feature of the proposed system is the Weighting and Confidence Mechanism. Not all indicators are equal. A Server: Apache header is a weak indicator (weight: 0.2) because it is common. However, a specific WordPress-logged-in cookie is a strong indicator (weight: 0.9). The system calculates a cumulative Confidence Score for each technology. If the score exceeds a predefined threshold, the technology is confirmed.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:&amp;quot;Calibri&amp;quot;,sans-serif&quot;&gt;Furthermore, the KB supports Dependency Logic (Implication). For instance, if the system identifies &amp;quot;WordPress,&amp;quot; it automatically implies the presence of &amp;quot;PHP&amp;quot; and &amp;quot;MySQL/MariaDB,&amp;quot; even if those technologies are hidden behind a proxy.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;

&lt;ol start=&quot;4&quot;&gt;
	&lt;li style=&quot;margin-bottom: 11px; margin-left: 8px; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:&amp;quot;Calibri&amp;quot;,sans-serif&quot;&gt;Performance Evaluation: Comparative Analysis&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:&amp;quot;Calibri&amp;quot;,sans-serif&quot;&gt;To validate the architecture, the researchers conducted a comparative study against three industry leaders: WhatWeb, BuiltWith, and Wappalyzer. The testbed consisted of 20 diverse websites (domestic and international) with varying levels of complexity.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:&amp;quot;Calibri&amp;quot;,sans-serif&quot;&gt;The criteria for evaluation were:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:&amp;quot;Calibri&amp;quot;,sans-serif&quot;&gt;1. Breadth of Identification: Detection of CMS, Backend Frameworks, JS Libraries, CDNs, DNS, and TLS.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:&amp;quot;Calibri&amp;quot;,sans-serif&quot;&gt;2. Advanced Capabilities: Ability to analyze dynamic content and bypass anti-bot challenges.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:&amp;quot;Calibri&amp;quot;,sans-serif&quot;&gt;Key Findings:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:&amp;quot;Calibri&amp;quot;,sans-serif&quot;&gt;&amp;bull; Static tools (WhatWeb/Wappalyzer) failed significantly on sites using heavy JavaScript rendering (SPAs).&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:&amp;quot;Calibri&amp;quot;,sans-serif&quot;&gt;&amp;bull; Anti-identification Bypassing: While traditional tools were blocked by Cloudflare&amp;rsquo;s &amp;quot;Wait 5 Seconds&amp;quot; challenge, the proposed architecture&amp;rsquo;s use of headless browsers allowed it to successfully retrieve and analyze the protected content.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:&amp;quot;Calibri&amp;quot;,sans-serif&quot;&gt;&amp;bull; Accuracy: By correlating headers with runtime variables, the proposed system reduced &amp;quot;Version Mismatch&amp;quot; errors by 35% compared to regex-only tools.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;

&lt;ol start=&quot;5&quot;&gt;
	&lt;li style=&quot;margin-bottom: 11px; margin-left: 8px; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:&amp;quot;Calibri&amp;quot;,sans-serif&quot;&gt;Conclusion: Towards Automated Security Auditing&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:&amp;quot;Calibri&amp;quot;,sans-serif&quot;&gt;The research concludes that a single-layer approach to web technology identification is obsolete in the era of modern web architectures. The proposed Multilayered Analysis Architecture provides a robust, resilient, and highly accurate framework for fingerprinting web entities.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:&amp;quot;Calibri&amp;quot;,sans-serif&quot;&gt;By combining the speed of static analysis (headers and HTML) with the depth of dynamic analysis (JS runtime and headless browsing), the system achieves a level of &amp;quot;X-ray vision&amp;quot; into the web stack. This has profound implications for:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:&amp;quot;Calibri&amp;quot;,sans-serif&quot;&gt;&amp;bull; Security Analysts: Enabling more accurate vulnerability mapping and attack surface reduction.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:&amp;quot;Calibri&amp;quot;,sans-serif&quot;&gt;&amp;bull; Automated Auditing: Providing a foundation for bots that can continuously monitor the technology shifts in an organization&amp;rsquo;s digital assets.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:&amp;quot;Calibri&amp;quot;,sans-serif&quot;&gt;&amp;bull; Technical Research: Facilitating large-scale studies of web technology trends with higher data integrity.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:&amp;quot;Calibri&amp;quot;,sans-serif&quot;&gt;The flexibility of the JSON-based Knowledge Base ensures that as new frameworks emerge (e.g., Qwik, SolidJS), the system can be updated without re-engineering the core analysis engine. This architecture represents a significant step forward in the field of automated web reconnaissance and security auditing.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;</abstract>
	<keyword_fa>تحلیل فناوری وب, شناسایی فناوری سمت سرور, تحلیل بسته  HTTP, شناسایی غیرفعال</keyword_fa>
	<keyword>Web Technology Analysis, Server-Side Technology Identification, HTTP Packet Analysis, Passive Identification</keyword>
	<start_page>60</start_page>
	<end_page>67</end_page>
	<web_url>http://monadi.isc.org.ir/browse.php?a_code=A-10-407-16&amp;slc_lang=fa&amp;sid=1</web_url>


<author_list>
	<author>
	<first_name>Amir</first_name>
	<middle_name></middle_name>
	<last_name>Fathalizadeh</last_name>
	<suffix></suffix>
	<first_name_fa>امیر</first_name_fa>
	<middle_name_fa></middle_name_fa>
	<last_name_fa>فتحعلی‌زاده</last_name_fa>
	<suffix_fa></suffix_fa>
	<email>fathalizadehamir1997@gmail.com</email>
	<code>10031947532846002118</code>
	<orcid>10031947532846002118</orcid>
	<coreauthor>Yes
</coreauthor>
	<affiliation>Cyberspace Research Institute, Shahid Beheshti University, Tehran, Iran</affiliation>
	<affiliation_fa>پژوهشکده فضای مجازی، دانشگاه شهید بهشتی، تهران، ایران</affiliation_fa>
	 </author>


	<author>
	<first_name>Ali</first_name>
	<middle_name></middle_name>
	<last_name>Poursohi</last_name>
	<suffix></suffix>
	<first_name_fa>علی</first_name_fa>
	<middle_name_fa></middle_name_fa>
	<last_name_fa>پورسهی</last_name_fa>
	<suffix_fa></suffix_fa>
	<email>info@vuln360.com</email>
	<code>10031947532846002119</code>
	<orcid>10031947532846002119</orcid>
	<coreauthor>No</coreauthor>
	<affiliation>Computer Department, Iranian eUniversity, Tehran, Iran</affiliation>
	<affiliation_fa>موسسه آموزش عالی ایرانیان، دانشگاه ایرانیان، تهران، ایران</affiliation_fa>
	 </author>


</author_list>


	</article>
</articleset>
</journal>
