Web Application Attacks Detection: A Survey and Classification
|
|
|
- Jennifer Cannon
- 10 years ago
- Views:
Transcription
1 Web Application Attacks Detection: A Survey and Classification Nadya ElBachir El Moussaid, Ahmed Toumanari ESSI, National School of Applied Sciences, Ibno Zohr University, Agadir, Morocco ABSTRACT The number of attacks is increasing day by day, especially the web attacks due to the shift of the majority of companies towards web applications. Therefore, the security of their sensitive data against attackers becomes a crucial matter for all organization and companies. Thus the necessity to use intrusion detection systems are required in order to increases the protection and prevent attackers from exploiting these data in illegal way. In this paper we begin by giving a survey of web application attacks and vulnerabilities, also approaches to improve the web application security using intrusion detection systems and scanners based on machine learning and artificial intelligence. When it comes to vulnerability, it is also an attack which exploits this vulnerability; therefore our paper presents web intrusion detection system based on detection of web vulnerabilities. Experimental results have been acquired from HTTP simulations in our network and from responses of HTTP requests sent to a bunch of websites and applications to test the efficiency of our intrusion detection system. This efficiency can be noticed from a High detection rate which is greater than 90%. Keywords Web Application Security, Web Application Vulnerabilities, Intrusion Detection System (IDS), Classification, Machine learning, Weka. 1. INTRODUCTION As a result of the increasing use of the web applications by companies, these companies insist to secure their sensitive data (such as password, bank card numbers, etc...) by using Firewalls and DeMilitarized Zone (DMZ) as first line of defense, even so it still not enough to provide a decent level of security, however does not guarantee a high level of security. For that reason, comes the second line of defense by using Intrusion Detection Systems (IDS) and Web Application Vulnerability Scanners to ensure sensitive data security from attempted attack and exploitation of data in an illegal manner. Intrusion detection systems can be classified into two major categories: Signature-based intrusion detection systems, Anomaly-based intrusion detection systems. However, they suffer from many drawbacks which make traditional intrusion detection systems inadequate to detect new attacks or applicable in web application. Thus, recently, many researches adopt data mining, machine learning and artificial intelligence techniques and algorithms to profit from it advantages in order to improve the intrusion detection systems performance which is measured by the rate of detection and the false alarm rate [1-6]. A Web application is not limited to a single Web server managing a set of static HTML pages. The architecture become more complex than before, therefore a web application is not only a single web server but a set of many servers and machines namely web server, application server and data base server. The major security threats are threats that exploit the vulnerability of web applications inasmuch to the complexity of web applications and technologies also to the also the wide use of web application in almost all areas, as well as to the lack of security experiences and talents of the developers. Web application vulnerabilities are listed as follow, and will be described in detail in next section: Injection Cross Site Scripting (XSS) Broken Authentication and Session Management Insecure Direct Object References Cross Site Request Forgery (CSRF) Security Misconfiguration Insecure Cryptographic Storage Failure to Restrict URL Access Insufficient Transport Layer Protection Invalidated Redirects and Forwards The SQL injection and cross-site scripting (XSS) are the two most famous vulnerabilities in Web application. Various scanners have been created to detect and identify web application vulnerabilities such as open source scanners namely W3af, Skipfish and Wapiti, etc, commercial scanners namely Acunetix, WebInspect, AppScan, etc... [7]. To identify vulnerabilities of a website, web application vulnerabilities scanners submit queries containing non-compliant data corresponding to potential attacks. The responses are then analyzed to identify the execution pages. If an execution page is identified, the corresponding page is considered vulnerable. There are two main classes of approaches adopted by web application vulnerability scanners such as: Recognition error message requests that the server returns Studying similarity of pages returned. The main aim of this paper is to give a survey of web application vulnerabilities and how to secure it from attacks that exploits these vulnerabilities. The rest of paper is organized as follow: Section II describes the top ten web application vulnerabilities. 1
2 Section III presents detection of web application vulnerabilities. Section IV discusses the use of machine learning algorithms to detect web application vulnerabilities. In Section V proposed algorithm and then a conclusion in Section VI. 2. WEB APPLICATION VULNERABILITIES 2.1 Injection Injection or SQL injection (SQLI) is a type of attacks that use application s vulnerabilities that interacts with a database, by injecting an unauthorized SQL query by an attacker in order to compromise its security. SQLI is one of the most famous and popular web applications vulnerability where the attackers exploits input vulnerability and attempts to send incorrect or unsanitized command or SQL query to the application. This hostile command cans fraud the interpreter to display unauthorized data to attacker [8, 21]. A successful SQL injection allows the attacker to perform his / her intent namely: Read sensitive and unauthorized data from the database. Modify database data using Insert, Update and Delete query. Execute administration operations on the database. There are several sub-classes of SQL injection namely: Classic SQLI Blind or Inference SQL injection Database management system-specific SQLI Compounded SQLI 2.2 Cross-Site Scripting (XSS) Attacks Cross-Site Scripting (also called XSS or CSS) are also one of the famous web applications vulnerabilities like SQLI. XSS is a type of web application vulnerabilities which the attacker injects a script in trusted web pages. These pages are returned to clients, may therefore include malicious executable code that will execute in the browser of the client. This attack therefore attempts indirectly the user of a web site through the exploitation of the vulnerabilities of this web site [8]. XSS is an attack against web application that display dynamically it content to users without checking or encoding the information entered by these users. In addition, most browsers have the ability to interpret the scripts in web pages written in different languages, such as JavaScript, VBScript, Java, ActiveX or Flash. The following HTML tags allow incorporating executable scripts in a web page: <SCRIPT>, <OBJECT>, <APPLET>, and <EMBED>. Attackers can use XSS to send harmful script considered trustful script by a user's browser. This harmful script can: Access to any cookies. Access to session tokens. Access to sensitive information retained by your browser. Rewrite the content of the HTML page. We can classify XSS vulnerabilities into two classes: server and client XSS. And there are generally tree types of XSS vulnerabilities: Stored XSS: Stored XSS is also called Persistent or Type-I XSS. This kind of XSS vulnerability occurs when the attacker stores the injected malicious scripts permanently in the target server such as: A database, A message forum, Visitor log, Comment field, etc. Therefore the victim recuperate the malicious script when demands the stored information from the target server. Reflected XSS: The reflected XSS is also called Non-Persistent XSS or Type-II XSS. This XSS vulnerability is occur when the attacker creates an injected malicious scripts where reflect the input user. i.e. the reflected XSS occurs when a victim user clicks on malicious link without ensuring that the link is trusted, or submit a non-trustful form, or even do any non-safe action which leads to executing a malicious script, thus as response the web application reflects the user input. DOM based XSS: Document Object Model (DOM) based XSS is also called type-0 XSS. The DOM based XSS was published first time by Amit Klein in 2005 [9], the first two types of XSS vulnerability mentioned above exploit server-side code, whereas the DOM based XSS vulnerability have an impact on the script code being executed in the client's browser. The most famous ways that trigger the XSS attack are: By clicking on an URL in By clicking on an URL in a website 2.3 Broken Authentication and Session Management Broken Authentication and Session Management attacks exploits all vulnerabilities concerning the authentication and session managing which are very important features of any web application. Various action can broke the authentication even a solid one, if the account management of the web application doesn't take in consideration the re-authentication in every actions although in the case of a valid session ID like: Changing the account password, Updating the account information, Lack of security passwords such as weak encrypted passwords or even not stored properly, Also not well protected session may emerge to exploit this vulnerability by the attacker. 2.4 Insecure Direct Object References An Insecure Direct Object References occurs when web application can afford a direct access to object and resources such as a file, directory or database key as a URL. This access is provided without any check and control or protection for example by changing and manipulating references in the URL. 2
3 2.5 Cross Site Request Forgery (CSRF) The CSRF attack is similar to XSS but with some difference. The CSRF is an attack which forces the victim user to execute a malicious action in the web application in which he is authenticated such as submitting a forged HTTP requests through image tags, XSS or with other techniques. 2.6 Security Misconfiguration The security misconfiguration attack exploits configuration weakness in a web application. It occurs when the system administrator and the developers ignore the lack and problems of security of the configuration of the web application. Web application security misconfiguration can be embodied in unnecessary features used by the attacker to gain unauthorized access to sensitive information even with elevated privileges if the victim user is an administrator; these features are the attacker access: Default accounts of a web applications provided during installation, Unused pages, Unpatched flows Unprotected files and directories. 2.7 Insecure Cryptographic Storage Insecure Cryptographic Storage occur when the web application store sensitive information such as login and password or credit card number and personal information needs without encrypted stored data or using weak encryption key and algorithms, Without forgetting the weak key storage and management. 2.8 Failure to Restrict URL Access The failure to restrict URL access occurs when the web application does not manage the access authorization of a user in safe and proper manner. These vulnerabilities in the web application can display unauthorized files or even afford privileges functions to unauthorized user. Therefore this kind of vulnerability can lead to session management problems cited above. Access control and verification must be executed to ensure the authorization of the user before any request to a sensitive function or sensitive information. 2.9 Insufficient Transport Layer Protection The Insufficient Transport Layer Protection vulnerability is due to the fact that Web applications do not protect or poorly protected the network traffic. SSL/TSL has been used by web application only during the authentication phase. data and session IDs are in clear-text in application network flows. Expired certificates or misconfigured can also be the cause of this type of vulnerability. Improper configuration of SSL can facilitate such attacks "phishing" type "man in the middle", etc An attacker can: Intercept sensitive data such as the login and password, Inject malicious scripting Redirect data flows between the original extremity Delete the contents of packets 2.10 Invalidated Redirects and Forwards Web applications frequently use redirects and references to redirect users to other pages. Sometimes the target page specified in a non-validated parameter allows an attacker to choose the redirection page. An attacker can therefore try to make sure that a victim clicks on a link on a trusted site, but containing a redirection setting pointing to a malicious site, a copy of the trusted site. The victim will probably click on the malicious link, as pointing to a valid website link. Such redirects can allow for example to install malicious software to capture sensitive user information or bypass access controls. 3. WEB APPLICATION VULNERABILITIES DETECTION Different methods and techniques can be implemented by developers and administrators in charge of IT security to deal with various threats against web applications such as firewalls, DMZ, IDS etc. Intrusion detection aims to identify actions and attempts that try to bypass the security policy to compromise the confidentiality, integrity or availability of a resource, and raises alerts in case of detection. To evaluate the efficiency of the IDS, following metrics are used: Where: Detection rate = (TP) / (TP + TN) (1) False alarm rate = (FP) / (FP + TN) (2) TP: True Positive FP: False Positive TN: True Negative Intrusion detection systems are used to detect intrusions against Web applications are classified into two principal categories mentioned above. 3.1 Signature-based Intrusion Detection Systems The IDS of this category is based on learning techniques on known attacks so as to define their signatures [10-13]. 3.2 Anomaly-based Intrusion Detection Systems For this category of IDS, IDS is distinguished into three approaches that have different levels of analysis: a Black box, Gray box and White box approach. Each one is based on the type of information available to construct the reference model of application [13-19]. Black Box: The approach of "Black Box" type uses no internal information program. The model reference behavior to be defined in these approaches can be obtained from the specification of the application or deducted by learning based on the execution of the application [12-14, 16]. Gray Box: Like the "Black Box" approach, the Gray Box approach is based on sequences of system calls. However, it extracts additional information from the process, memory, etc [14, 16-17] White Box: In White Box approaches, the information in the code source of the program is used to build a pattern or a model of intrusion detection at the application level. This approach can be used to detect both attacks against the control flow of the application and attacks against the data [18-19]. In the following, some examples of ways to ensure the security of web applications from some vulnerability. 3
4 4. MACHINE LEARNING AND WEB APPLICATION: DISCUSSION Machine learning is the one of artificial intelligence study which is concerned with the development, analysis and implementation of automated methods that allow systems to evolve through a process of learning, in order to fulfill the difficult tasks in reasonable time. This section discuss how machine learning techniques aims to improve the performance of web application in detecting and preventing attackers from taking advantages of web applications vulnerabilities which are mentioned above. Various techniques have been proposed are based on machine learning, artificial intelligence and data mining methods. Below some proposed researches: Authors of [20] adopt user input sanitization and data mining methods. They classify several input sanitization techniques into different types, and then they apply data mining methods to predict SQL injection and cross site scripting vulnerabilities in web applications. They implement several classification algorithms such as C4.5/J48, Naïve Bayes (NB), and MultiLayer Perceptron (MLP) in WEKA tool. In this paper [22], A. Dessiatnikoff and colleagues present an approach based on the responses of the web pages returned by the web server (execution or rejection page), these pages are analyzed using machine learning algorithms. Their approach begins by identifying injection point (i.e. vulnerable pages where the malicious code can be injected) by applying three sets of requests namely: Rr: Set of requests generated randomly to generate rejection pages. Rii: Set of SQL injection requests unsuitable for the given injection point to generate rejection pages. Rvi: Set of SQL injection requests that generate execution pages or even the rejection pages in case of non-presence of SQLI vulnerabilities. Afterward, the next phase is classification phase by classifying response pages in clusters using the distance technique expounded below: diff(a i, b j ) = d(a, b) = diff a 1,b 1 (n+m ) n i + m j i = 0 or j = m diff a i+1, b j +1 a i = b j, i < n, j < m (3) 1 + min (diff a i+1, b j, diff a i, b j +1 a i b j, i < n, j < m In addition, a threshold is used to determine clusters of similar responses in combination with the hierarchical clustering technique. However this approach has limits in identifying XSS vulnerabilities in web application. Many researches about web scanners are done such as mentioned above based on identifying injection points which are used by attackers to exploit it in order to get full access to sensitive data. However, web scanners couldn t recognize all injection point in web application. Furthermore scanners can be used to identify these injection points by attackers themselves. Therefore the use of intrusion detection system is necessary which allows you to analyze web traffic in the case of exploiting an injection point not identified by a web scanner or even identified one, also (4) protect web application against scanning. For that purpose, the proposed intrusion detection system is based on analyzing HTTP requests using machine learning algorithms. Table 1. Training and Test Dataset Datastes Training Test Dmoz Xssed Total PROPOSED ALGORITHM The proposed approach adopts the black box concept, where it will analyze HTTP requests and responses, therefore the proposed IDS is able to detect web attacks without knowing the internal information such as the log files or the code analysis. 5.1Features selection Source and Destination: these two features are used to identify the sender and the receiver address which are used to detect DoS. Type of Protocol: type of protocol is also necessary to detect some attacks. Length of URL: length of the URL is one of the features that will be used to detect any attempts to insert or inject any code or script into a URL such as SQL injection or XSS. Date: this property concerns the date and time of transfer. Number of Login: this feature is useful to identify password guess attack. Request Methods: request methods are GET, POST, HEAD, PUT and DELETE. SQL Injection: this feature indicates whether the HTTP request contains an injection of a SQL query in the URL or even in the HTTP header such as cookies, User_Agent etc. Script Tags: such as SQL injection, this feature indicates whether the HTTP request contains a Script tags even in hexadecimal code, where attackers often uses the hexadecimal code %3C%73%63%72%69%70%74%3E instead of <script>. Status code: the status code indicates that the browser is unable to provide the requested page. Content length: content length feature provide the Body length of the response. Features selection allows the extraction of useful properties which provide a high level of detection, the following table shows the features has been used to detect web vulnerabilities: 5.2 Experiments The experiments focus on detecting the SQL injection and XSS attacks in view of the fact that they are the most used against web applications; however that doesn t mean neglecting other attacks. Nevertheless, the same reasoning is used to detect other types of attacks. To study the reliability of the proposed approach, the training and testing data set are built from Dmoz [23] database which 4
5 Attacks SQL Injection TABLE I. Proposed Approach Results ( Detection Rate) Snort Dessiatnikoff approach 98% 60% 95,73% XSS attack 95,75% 57% 82% Other attacks 90% 31,50% 80% contain several web pages and applications, some of these pages are vulnerable, also from XSS database (xssed) [24]. The classification algorithm has been used is the improved k-means algorithm [1] and support vector machine (SVM), the reason of using it is the simplicity, detection efficiency of new attacks and optimization. TABLE II. Name Source and destination Type of protocol Length of URL Date Number of login Request methods Sql injection Script tag Status code Content length Selected Features Type Symbolic Symbolic Boolean Boolean Symbolic Our approach consists of using the improved k-means to classify the HTTP requests and webpages, than the SVM algorithm is applied to delete outliers. The tools used for detecting web vulnerabilities and classify the web pages and application into vulnerable and non-vulnerable is the open source tool: WEKA [25], also classify the HTTP request into attack or non-attack. The cross validation is N = 10 which mean that WEKA divides data into 10 dataset where 9 dataset are used in the training phase and 1 dataset in the testing phase. Dmoz and Xssed databases contain more than of web applications and web sites. The next table provides a global view on the results of our experiments: It s noticeable from the table above that our approach is more reliable than other approaches in detection rate. The proposed approach detects 98% of SQL Injection and 95% of XSS Attacks which are the most famous web application attacks. 6. CONCLUSION This paper presents an overview about the different top ten web application vulnerabilities especially the SQL injection and XSS vulnerabilities. Many techniques have been proposed to secure web application and browsers from attackers but even so this techniques still poor and insufficient. Thus, the use of machine learning methods and techniques make intrusion detection systems more intelligent and autonomous in detecting new attacks since the static techniques may be able to be bypassed by attackers. Future work will be on the intrusion detection systems in the cloud environment, because cloud computing is the trend, and is a major paradigm shift of computer systems. 7. REFERENCES [1] N. El Moussaid, A. Toumanari, M. Elazhari, Intrusion detection based on clustering algorithm, International Journal of Electronics and Computer Science Engineering, Vol.2, p , [2] M. Moorthy, S. Sathiyabama, A study of intrusion detection using data mining, IEEE-International Conference On Advances In Engineering, Sciense And Management (ICAE-2012). [3] Y. Qing, W. Xiaoping, H. Gaofeng, An intrusion detection system based on data mining, 2nd International Conference on Future Computer and Communication, Vol.1, p , [4] S. Naiping, Z.Genyuan, A study on intrusin detection based on data mining, International Conference of Information Science and Management Engineering [5] M. Ektefa, S. Memar, F. Sidi, L. Suriani Affendy, Intrusion detection using data mining Techniques, International Conference on Information Retrieval & Knowledge Management, (CAMP), p , [6] C. Miao, W. Chen, A study of intrusion detection system based on data- mining, IEEE International Conference on Information Theory and Information Security (ICITIS), p , [7] pplication%20security%20scanner%20list [8] R.Johari, p.sharma, A survey on web application vulnerabilities (SQLIA,XSS) exploitation and security engine for SQL injection, International Conference on Communication Systems and Network Technologies, [9] A. Klein, DOM based cross site scripting or XSS of the third kind, (WASC writeup), July [10] J. McHugh, Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln laboratory, ACM Transactions on Information and System Security, Vol. 3, No. 4, November [11] P.Proctor, Practical intrusion detection handbook. Upper Saddle River, NJ, USA, [12] G.Vigna, W.Robertson, V.Kher, and R. A. Kemmerer, A stateful intrusion detection system for world-wide web servers, 19th Annual Computer Security Applications Conference, Proceedings. (ACSAC 2003), p , Las Vegas, NV, December
6 [13] M.Almgren, Ulf Lindqvist. Application-integrated data collection for security monitoring. Proceedings of the fourth International Symposium on Recent Advances in Intrusion Detection (RAID 2001), Vol. 2212, p , Davis, California, Oct. 10,12, 2001 [14] S.-A. Hofmeyr, S.Forrest, A.Somayaji, Intrusion detection using sequences of system calls, Journal of Computer Security, V:6, p: , August 18, [15] C. Ko, G. Fink and K.N Levitt, Automated detection of vulnerabilities in privileged programs by execution monitoring, Proceedings of the 10th Annual Computer Security Applications Conference (ACSAC 94), p: , [16] D.Gao, M.-K. Reiter, D.Song, Gray-box extraction of execution graphs for anomaly detection. In Proceedings of the 11th ACM conference on Computer and communications security, p , [17] C.Kruegel, D.Mutz, F.Valeur, G.Vigna, On the detection of anomalous system call arguments, In 8th European Symposium on Research in Computer Security (ESORICS 2003), Vol. 2808, p: , October [18] M. Cova, D. Balzarotti, V. Felmetsger, and G. Vigna. Swaddler: An approach for the anomaly-based detection of state violations in web applications, RAID'07 Proceedings of the 10th international conference on Recent advances in intrusion detection, p , [19] R. Ludinard, E. Totel, F. Tronel, V. Nicomette, M. Kaaniche, E. Alata, R. Akrout, Y. Bachy, Detecting attacks against data in web applications, 7th International Conference on Risk and Security of Internet and Systems (CRiSIS), p:1-8, [20] L. K. Shar, H. B. Kuan Tan, Mining input aanitization patterns for predicting SQL injection and cross site scripting vulnerabilities, 34th International Conference on Software Engineering (ICSE), p: , [21] W. G.J. Halfond, J. Viegas, and A. Orso, A classification of SQL injection attacks and countermeasures, In Proceedings of the international Symposium on secure Software Engineering (ISSSE), [22] A. Dessiatnikoff R. Akrout E. Alata M. Kaˆ aniche V. Nicomette, A clustering approach for web vulnerabilities detection, 17th IEEE Pacific Rim International Symposium on Dependable Computing, p: , [23] [24] [25] IJCA TM : 6
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY www.alliancetechpartners.com WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY More than 70% of all websites have vulnerabilities
A clustering Approach for Web Vulnerabilities Detection
A clustering Approach for Web Vulnerabilities Detection Mohamed Kaâniche Rim Akrout, Eric Alata, Yann Bachy, Anthony Dessiatnikoff, Vincent Nicome?e Design and Assessment of application Level Intrusion
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
Sitefinity Security and Best Practices
Sitefinity Security and Best Practices Table of Contents Overview The Ten Most Critical Web Application Security Risks Injection Cross-Site-Scripting (XSS) Broken Authentication and Session Management
Web Application Penetration Testing
Web Application Penetration Testing 2010 2010 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Will Bechtel [email protected]
(WAPT) Web Application Penetration Testing
(WAPT) Web Application Penetration Testing Module 0: Introduction 1. Introduction to the course. 2. How to get most out of the course 3. Resources you will need for the course 4. What is WAPT? Module 1:
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
Essential IT Security Testing
Essential IT Security Testing Application Security Testing for System Testers By Andrew Muller Director of Ionize Who is this guy? IT Security consultant to the stars Member of OWASP Member of IT-012-04
How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering
How to break in Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering Time Agenda Agenda Item 9:30 10:00 Introduction 10:00 10:45 Web Application Penetration
Intrusion detection for web applications
Intrusion detection for web applications Intrusion detection for web applications Łukasz Pilorz Application Security Team, Allegro.pl Reasons for using IDS solutions known weaknesses and vulnerabilities
Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008
Detecting Web Application Vulnerabilities Using Open Source Means OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008 Kostas Papapanagiotou Committee Member OWASP Greek Chapter [email protected]
Cross-Site Scripting
Cross-Site Scripting (XSS) Computer and Network Security Seminar Fabrice Bodmer ([email protected]) UNIFR - Winter Semester 2006-2007 XSS: Table of contents What is Cross-Site Scripting (XSS)? Some
Guidelines for Web applications protection with dedicated Web Application Firewall
Guidelines for Web applications protection with dedicated Web Application Firewall Prepared by: dr inŝ. Mariusz Stawowski, CISSP Bartosz Kryński, Imperva Certified Security Engineer INTRODUCTION Security
Magento Security and Vulnerabilities. Roman Stepanov
Magento Security and Vulnerabilities Roman Stepanov http://ice.eltrino.com/ Table of contents Introduction Open Web Application Security Project OWASP TOP 10 List Common issues in Magento A1 Injection
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
OWASP Top Ten Tools and Tactics
OWASP Top Ten Tools and Tactics Russ McRee Copyright 2012 HolisticInfoSec.org SANSFIRE 2012 10 JULY Welcome Manager, Security Analytics for Microsoft Online Services Security & Compliance Writer (toolsmith),
HTTPParameter Pollution. ChrysostomosDaniel
HTTPParameter Pollution ChrysostomosDaniel Introduction Nowadays, many components from web applications are commonly run on the user s computer (such as Javascript), and not just on the application s provider
ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young
ArcGIS Server Security Threats & Best Practices 2014 David Cordes Michael Young Agenda Introduction Threats Best practice - ArcGIS Server settings - Infrastructure settings - Processes Summary Introduction
WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL. Ensuring Compliance for PCI DSS 6.5 and 6.6
WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL Ensuring Compliance for PCI DSS 6.5 and 6.6 CONTENTS 04 04 06 08 11 12 13 Overview Payment Card Industry Data Security Standard PCI Compliance for Web Applications
WHITE PAPER. FortiWeb Web Application Firewall Ensuring Compliance for PCI DSS 6.5 and 6.6
WHITE PAPER FortiWeb Web Application Firewall Ensuring Compliance for PCI DSS 6.5 and 6.6 Ensuring compliance for PCI DSS 6.5 and 6.6 Page 2 Overview Web applications and the elements surrounding them
Check list for web developers
Check list for web developers Requirement Yes No Remarks 1. Input Validation 1.1) Have you done input validation for all the user inputs using white listing and/or sanitization? 1.2) Does the input validation
External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION
External Vulnerability Assessment -Technical Summary- Prepared for: ABC ORGANIZATI On March 9, 2008 Prepared by: AOS Security Solutions 1 of 13 Table of Contents Executive Summary... 3 Discovered Security
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
Using Free Tools To Test Web Application Security
Using Free Tools To Test Web Application Security Speaker Biography Matt Neely, CISSP, CTGA, GCIH, and GCWN Manager of the Profiling Team at SecureState Areas of expertise: wireless, penetration testing,
Overview of the Penetration Test Implementation and Service. Peter Kanters
Penetration Test Service @ ABN AMRO Overview of the Penetration Test Implementation and Service. Peter Kanters ABN AMRO / ISO April 2010 Contents 1. Introduction. 2. The history of Penetration Testing
IJMIE Volume 2, Issue 9 ISSN: 2249-0558
Survey on Web Application Vulnerabilities Prevention Tools Student, Nilesh Khochare* Student,Satish Chalurkar* Professor, Dr.B.B.Meshram* Abstract There are many commercial software security assurance
Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group
Securing Your Web Application against security vulnerabilities Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group Agenda Security Landscape Vulnerability Analysis Automated Vulnerability
Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011
Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011 Agenda Evolving Threats Operating System Application User Generated Content JPL s Application Security Program Securing
Rational AppScan & Ounce Products
IBM Software Group Rational AppScan & Ounce Products Presenters Tony Sisson and Frank Sassano 2007 IBM Corporation IBM Software Group The Alarming Truth CheckFree warns 5 million customers after hack http://infosecurity.us/?p=5168
Web Forensic Evidence of SQL Injection Analysis
International Journal of Science and Engineering Vol.5 No.1(2015):157-162 157 Web Forensic Evidence of SQL Injection Analysis 針 對 SQL Injection 攻 擊 鑑 識 之 分 析 Chinyang Henry Tseng 1 National Taipei University
Web Application Security Assessment and Vulnerability Mitigation Tests
White paper BMC Remedy Action Request System 7.6.04 Web Application Security Assessment and Vulnerability Mitigation Tests January 2011 www.bmc.com Contacting BMC Software You can access the BMC Software
Web applications. Web security: web basics. HTTP requests. URLs. GET request. Myrto Arapinis School of Informatics University of Edinburgh
Web applications Web security: web basics Myrto Arapinis School of Informatics University of Edinburgh HTTP March 19, 2015 Client Server Database (HTML, JavaScript) (PHP) (SQL) 1 / 24 2 / 24 URLs HTTP
Mingyu Web Application Firewall (DAS- WAF) - - - All transparent deployment for Web application gateway
Mingyu Web Application Firewall (DAS- WAF) - - - All transparent deployment for Web application gateway All transparent deployment Full HTTPS site defense Prevention of OWASP top 10 Website Acceleration
Last update: February 23, 2004
Last update: February 23, 2004 Web Security Glossary The Web Security Glossary is an alphabetical index of terms and terminology relating to web application security. The purpose of the Glossary is to
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet March 8, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development
OWASP TOP 10 ILIA ALSHANETSKY @ILIAA HTTPS://JOIND.IN/15741
OWASP TOP 10 ILIA ALSHANETSKY @ILIAA HTTPS://JOIND.IN/15741 ME, MYSELF & I PHP Core Developer Author of Guide to PHP Security Security Aficionado THE CONUNDRUM USABILITY SECURITY YOU CAN HAVE ONE ;-) OPEN
CSE598i - Web 2.0 Security OWASP Top 10: The Ten Most Critical Web Application Security Vulnerabilities
CSE598i - Web 2.0 Security OWASP Top 10: The Ten Most Critical Web Application Security Vulnerabilities Thomas Moyer Spring 2010 1 Web Applications What has changed with web applications? Traditional applications
Adobe Systems Incorporated
Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...
Columbia University Web Security Standards and Practices. Objective and Scope
Columbia University Web Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Security Standards and Practices document establishes a baseline of security related requirements
HOD of Dept. of CSE & IT. Asst. Prof., Dept. Of CSE AIET, Lko, India. AIET, Lko, India
Volume 5, Issue 12, December 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Investigation
A NEW APPROACH OF WEB ATTACKS CLASSIFICATION FOR TESTING SECURITY TOOLS AT THE APPLICATION LEVEL
A NEW APPROACH OF WEB ATTACKS CLASSIFICATION FOR TESTING SECURITY TOOLS AT THE APPLICATION LEVEL 1 KARIM ABOUELMEHDI, 2 AHMED BENTAJER, 3 LOUBNA DALI, 4 NACER SEFIANI 1,4 The Mohammadia Engineering School
EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.
CENTER FOR ADVANCED SECURITY TRAINING 619 Advanced SQLi Attacks and Countermeasures Make The Difference About Center of Advanced Security Training () The rapidly evolving information security landscape
PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker
PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker www.quotium.com 1/14 Summary Abstract 3 PCI DSS Statistics 4 PCI DSS Application Security 5 How Seeker Helps You Achieve PCI DSS
Web application security
Web application security Sebastian Lopienski CERN Computer Security Team openlab and summer lectures 2010 (non-web question) Is this OK? int set_non_root_uid(int uid) { // making sure that uid is not 0
METHODS TO TEST WEB APPLICATION SCANNERS
METHODS TO TEST WEB APPLICATION SCANNERS Fernando Román Muñoz, Luis Javier García Villalba Group of Analysis, Security and Systems (GASS) Department of Software Engineering and Artificial Intelligence
Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure
Vulnerabilities, Weakness and Countermeasures Massimo Cotelli CISSP Secure : Goal of This Talk Security awareness purpose Know the Web Application vulnerabilities Understand the impacts and consequences
Cracking the Perimeter via Web Application Hacking. Zach Grace, CISSP, CEH [email protected] January 17, 2014 2014 Mega Conference
Cracking the Perimeter via Web Application Hacking Zach Grace, CISSP, CEH [email protected] January 17, 2014 2014 Mega Conference About 403 Labs 403 Labs is a full-service information security and compliance
Web Application Security
E-SPIN PROFESSIONAL BOOK Vulnerability Management Web Application Security ALL THE PRACTICAL KNOW HOW AND HOW TO RELATED TO THE SUBJECT MATTERS. COMBATING THE WEB VULNERABILITY THREAT Editor s Summary
Application Security Testing. Generic Test Strategy
Application Security Testing Generic Test Strategy Page 2 of 8 Contents 1 Introduction 3 1.1 Purpose: 3 1.2 Application Security Testing: 3 2 Audience 3 3 Test Strategy guidelines 3 3.1 Authentication
VIDEO intypedia007en LESSON 7: WEB APPLICATION SECURITY - INTRODUCTION TO SQL INJECTION TECHNIQUES. AUTHOR: Chema Alonso
VIDEO intypedia007en LESSON 7: WEB APPLICATION SECURITY - INTRODUCTION TO SQL INJECTION TECHNIQUES AUTHOR: Chema Alonso Informática 64. Microsoft MVP Enterprise Security Hello and welcome to Intypedia.
Testing the OWASP Top 10 Security Issues
Testing the OWASP Top 10 Security Issues Andy Tinkham & Zach Bergman, Magenic Technologies Contact Us 1600 Utica Avenue South, Suite 800 St. Louis Park, MN 55416 1 (877)-277-1044 [email protected] Who Are
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications Slides by Connor Schnaith Cross-Site Request Forgery One-click attack, session riding Recorded since 2001 Fourth out of top 25 most
Web Application Hacking (Penetration Testing) 5-day Hands-On Course
Web Application Hacking (Penetration Testing) 5-day Hands-On Course Web Application Hacking (Penetration Testing) 5-day Hands-On Course Course Description Our web sites are under attack on a daily basis
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
Nuclear Regulatory Commission Computer Security Office Computer Security Standard
Nuclear Regulatory Commission Computer Security Office Computer Security Standard Office Instruction: Office Instruction Title: CSO-STD-1108 Web Application Standard Revision Number: 1.0 Effective Date:
Web Vulnerability Scanner by Using HTTP Method
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 9, September 2015,
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework [email protected] keralacyberforce.in Introduction Cross Site Scripting or XSS vulnerabilities have been reported and exploited since 1990s.
OWASP AND APPLICATION SECURITY
SECURING THE 3DEXPERIENCE PLATFORM OWASP AND APPLICATION SECURITY Milan Bruchter/Shutterstock.com WHITE PAPER EXECUTIVE SUMMARY As part of Dassault Systèmes efforts to counter threats of hacking, particularly
OWASP and OWASP Top 10 (2007 Update) OWASP. The OWASP Foundation. Dave Wichers. The OWASP Foundation. OWASP Conferences Chair dave.wichers@owasp.
and Top 10 (2007 Update) Dave Wichers The Foundation Conferences Chair [email protected] COO, Aspect Security [email protected] Copyright 2007 - The Foundation This work is available
05.0 Application Development
Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development
Web Application Guidelines
Web Application Guidelines Web applications have become one of the most important topics in the security field. This is for several reasons: It can be simple for anyone to create working code without security
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
Software Assurance Tools: Web Application Security Scanner Functional Specification Version 1.0
Special Publication 500-269 Software Assurance Tools: Web Application Security Scanner Functional Specification Version 1.0 Paul E. Black Elizabeth Fong Vadim Okun Romain Gaucher Software Diagnostics and
WEB APPLICATION FIREWALLS: DO WE NEED THEM?
DISTRIBUTING EMERGING TECHNOLOGIES, REGION-WIDE WEB APPLICATION FIREWALLS: DO WE NEED THEM? SHAIKH SURMED Sr. Solutions Engineer [email protected] www.fvc.com HAVE YOU BEEN HACKED????? WHAT IS THE PROBLEM?
1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications
1. Introduction 2. Web Application 3. Components 4. Common Vulnerabilities 5. Improving security in Web applications 2 What does World Wide Web security mean? Webmasters=> confidence that their site won
Client Side Filter Enhancement using Web Proxy
Client Side Filter Enhancement using Web Proxy Santosh Kumar Singh 1, Rahul Shrivastava 2 1 M Tech Scholar, Computer Technology (CSE) RCET, Bhilai (CG) India, 2 Assistant Professor, CSE Department, RCET
Application Layer Encryption: Protecting against Application Logic and Session Theft Attacks. Whitepaper
Application Layer Encryption: Protecting against Application Logic and Session Theft Attacks Whitepaper The security industry has extensively focused on protecting against malicious injection attacks like
Secure Web Development Teaching Modules 1. Threat Assessment
Secure Web Development Teaching Modules 1 Threat Assessment Contents 1 Concepts... 1 1.1 Software Assurance Maturity Model... 1 1.2 Security practices for construction... 3 1.3 Web application security
State of The Art: Automated Black Box Web Application Vulnerability Testing. Jason Bau, Elie Bursztein, Divij Gupta, John Mitchell
Stanford Computer Security Lab State of The Art: Automated Black Box Web Application Vulnerability Testing, Elie Bursztein, Divij Gupta, John Mitchell Background Web Application Vulnerability Protection
Introduction:... 1 Security in SDLC:... 2 Penetration Testing Methodology: Case Study... 3
Table of Contents Introduction:... 1 Security in SDLC:... 2 Penetration Testing Methodology: Case Study... 3 Information Gathering... 3 Vulnerability Testing... 7 OWASP TOP 10 Vulnerabilities:... 8 Injection
Architectural Design Patterns. Design and Use Cases for OWASP. Wei Zhang & Marco Morana OWASP Cincinnati, U.S.A. http://www.owasp.
Architectural Design Patterns for SSO (Single Sign On) Design and Use Cases for Financial i Web Applications Wei Zhang & Marco Morana OWASP Cincinnati, U.S.A. OWASP Copyright The OWASP Foundation Permission
Web Security School Final Exam
Web Security School Final Exam By Michael Cobb 1.) Which of the following services is not required to run a Windows server solely configured to run IIS and publish a Web site on the Internet? a. IIS Admin
Barracuda Web Site Firewall Ensures PCI DSS Compliance
Barracuda Web Site Firewall Ensures PCI DSS Compliance E-commerce sales are estimated to reach $259.1 billion in 2007, up from the $219.9 billion earned in 2006, according to The State of Retailing Online
Contemporary Web Application Attacks. Ivan Pang Senior Consultant Edvance Limited
Contemporary Web Application Attacks Ivan Pang Senior Consultant Edvance Limited Agenda How Web Application Attack impact to your business? What are the common attacks? What is Web Application Firewall
Cloud Security:Threats & Mitgations
Cloud Security:Threats & Mitgations Vineet Mago Naresh Khalasi Vayana 1 What are we gonna talk about? What we need to know to get started Its your responsibility Threats and Remediations: Hacker v/s Developer
Preprocessing Web Logs for Web Intrusion Detection
Preprocessing Web Logs for Web Intrusion Detection Priyanka V. Patil. M.E. Scholar Department of computer Engineering R.C.Patil Institute of Technology, Shirpur, India Dharmaraj Patil. Department of Computer
Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com
SAINT Integrated Network Vulnerability Scanning and Penetration Testing www.saintcorporation.com Introduction While network vulnerability scanning is an important tool in proactive network security, penetration
Client vs. Server Implementations of Mitigating XSS Security Threats on Web Applications
Journal of Basic and Applied Engineering Research pp. 50-54 Krishi Sanskriti Publications http://www.krishisanskriti.org/jbaer.html Client vs. Server Implementations of Mitigating XSS Security Threats
INTRUSION PROTECTION AGAINST SQL INJECTION ATTACKS USING REVERSE PROXY
INTRUSION PROTECTION AGAINST SQL INJECTION ATTACKS USING REVERSE PROXY Asst.Prof. S.N.Wandre Computer Engg. Dept. SIT,Lonavala University of Pune, [email protected] Gitanjali Dabhade Monika Ghodake Gayatri
Lecture 11 Web Application Security (part 1)
Lecture 11 Web Application Security (part 1) Computer and Network Security 4th of January 2016 Computer Science and Engineering Department CSE Dep, ACS, UPB Lecture 11, Web Application Security (part 1)
Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified
Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI
elearning for Secure Application Development
elearning for Secure Application Development Curriculum Application Security Awareness Series 1-2 Secure Software Development Series 2-8 Secure Architectures and Threat Modeling Series 9 Application Security
Improving Web Application Security by Eliminating CWEs Weijie Chen, China INFSY 6891 Software Assurance Professor Dr. Maurice Dawson 15 December 2015
Improving Web Application Security by Eliminating CWEs Weijie Chen, China INFSY 6891 Software Assurance Professor Dr. Maurice Dawson 15 December 2015 1 P a g e ABSTRACT This study examined improving web
Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org
Promoting Application Security within Federal Government AppSec DC November 13, 2009 Dr. Sarbari Gupta, CISSP, CISA Founder/President Electrosoft [email protected] 703-437-9451 ext 12 The Foundation
How To Protect A Web Application From Attack From A Trusted Environment
Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls
A Novel Frame Work to Detect Malicious Attacks in Web Applications
Technology, Volume-2, Issue-1, January-March, 2014, pp. 23-28, IASTER 2014, www.iaster.com, Online:2347-5099, Print:2348-0009 A Novel Frame Work to Detect Malicious Attacks in Web Applications N. Jayakanthan
ETHICAL HACKING 010101010101APPLICATIO 00100101010WIRELESS110 00NETWORK1100011000 101001010101011APPLICATION0 1100011010MOBILE0001010 10101MOBILE0001
001011 1100010110 0010110001 010110001 0110001011000 011000101100 010101010101APPLICATIO 0 010WIRELESS110001 10100MOBILE00010100111010 0010NETW110001100001 10101APPLICATION00010 00100101010WIRELESS110
WEB SITE SECURITY. Jeff Aliber Verizon Digital Media Services
WEB SITE SECURITY Jeff Aliber Verizon Digital Media Services 1 SECURITY & THE CLOUD The Cloud (Web) o The Cloud is becoming the de-facto way for enterprises to leverage common infrastructure while innovating
Pentests more than just using the proper tools
Pentests more than just using the proper tools Agenda 1. Information Security @ TÜV Rheinland 2. Penetration testing Introduction Evaluation scheme Security Analyses of web applications Internal Security
Security features of ZK Framework
1 Security features of ZK Framework This document provides a brief overview of security concerns related to JavaScript powered enterprise web application in general and how ZK built-in features secures
Web Application Firewall on SonicWALL SSL VPN
Web Application Firewall on SonicWALL SSL VPN Document Scope This document describes how to configure and use the Web Application Firewall feature in SonicWALL SSL VPN 5.0. This document contains the following
Chapter 1 Web Application (In)security 1
Introduction xxiii Chapter 1 Web Application (In)security 1 The Evolution of Web Applications 2 Common Web Application Functions 4 Benefits of Web Applications 5 Web Application Security 6 "This Site Is
