EARLY DETECTION OF SQL INJECTION ATTACKS
|
|
|
- Shavonne Mason
- 10 years ago
- Views:
Transcription
1 EARLY DETECTION OF SQL INJECTION ATTACKS Hossain Shahriar 1, Sarah North 2, and Wei-Chuen Chen 3 Department of Computer Engineering, Kennesaw State University, Georgia, USA 1 [email protected] 2 [email protected] 3 [email protected] ABSTRACT SQL Injection (SQLI) is a common vulnerability found in web applications. The starting point of SQLI attack is the client-side (browser). If attack inputs can be detected early at the browse side, then it could be thwarted early by not forwarding the malicious inputs to the server-side for further processing. This paper presents a client-side approach to detect SQLI attacks 1. The client-side accepts shadow SQL queries from the server-side and checks any deviation between shadow queries with dynamic queries generated with user supplied inputs. We measure the deviation of shadow query and dynamic query based on conditional entropy metrics and propose four metrics in this direction. We evaluate the approach with three PHP applications containing SQLI vulnerabilities. The evaluation results indicate that our approach can detect well-known SQLI attacks early at the client-side and impose negligible overhead. KEYWORDS SQL Injection, Web security, Conditional entropy, Information theory 1. INTRODUCTION SQL Injection (SQLI) vulnerability is a well -known security concern for web applications that alters the implemented query structures with supplied malicious inputs. The execution of altered queries may lead to security breaches such as unauthorized access to application resources, escalation of privileges, and modification of sensitive data [33]. A number of recent surveys [1, 12] indicate that SQLI is among top three worst vulnerabilities discovered in today s web-based applications after their deployment. Moreover, a large portion of data security breaches have been caused by SQLI attacks in real world resulting in financial losses to business organizations [8]. So, detecting SQLI attacks early can reduce the potential losses. The starting point of SQLI attack is the client-side (browser). If attack inputs can be detected early at the browse side, then it could be thwarted early by not forwarding the malicious inputs to the server-side for further processing. This could bring two benefits: adding an extra protection layer on top of server-side solutions (e.g., secure coding [9, 31], code generation [33], dynamic analysis [4, 29]) and working as a complementary approach to other known existing black-box level solutions (e.g., security scanner tools [14, 15, 19, 28, 32]). However, there are challenges to develop a client-side SQLI attack detection approach. For example, the relevant form fields that require checking at the client-side must be informed by the server-side and the information should not contain sensitive data such as original query, table name and column name. The deviation of dynamic query structure at the client-side needs to be computed and checked based on the information supplied from the server-side. So, suitable measurements are required at the client- 1 An earlier version of this work has been published in [34]. DOI : /ijnsa
2 side. Finally, the approach should be light-weight which means heavy computation should not be performed at the client-side. This paper attempts to address these issues. We propose a client-side SQLI attack detection framework based on conditional entropy metrics. We address the first issue by developing an approach to extract query structures from the server-side code and convert them to shadow queries. A shadow query is identical to an original query, except column names, table names, and input variables are replaced with arbitrary symbolic values. The second issue is addressed by measuring the deviation of information content between shadow queries with symbolic values and actual input values. We leverage the concept of information theory [25, 26] to measure the information content of queries. In particular, our contribution remains in the development of four types of conditional entropy metrics. If there is a deviation of the information content between a shadow query and a dynamic query (formed by replacing symbolic values with actual inputs from form fields), then an SQLI attack is detected at the client-side and a request is blocked. Otherwise, inputs supplied to a form are considered as benign and a request is allowed to the server-side. We evaluate our approach with three PHP web applications containing known SQLI vulnerabilities. The evaluation results indicate that the approach can detect most common attack inputs at the client-side. Moreover, the approach has negligible overhead in terms of computation and code instrumentation. The proposed approach has several advantages. First, it does not rely on the specific type of attack inputs and new attack inputs can be detected. Second, input filtering mechanisms implemented at the client and server-sides may not detect all malicious inputs, so it can be a complementary approach to other existing solutions [14]. Further, the approach imposes negligible overhead at the browser. The paper is organized as follows. Section 2 shows an example of SQLI attack at the client-side followed by a brief introduction of our approach for detecting it. We also discuss the related work. In Section 3, the proposed client-side SQLI attack detection framework is discussed in details followed by conditional entropy metrics and their application in SQLI attack detection process. Section 4 describes the experimental results found during our evaluation. Section 5concludes the paper and discusses future work. 2. BACKGROUND AND RELATED WORK In this section, we first provide an example of SQL Injection attack occurrence followed by a brief overview how our approach can detect the attack. Then, we discuss some related work on SQL Injection from the literature Example of SQL Injection attack and detection by our approach First, we explain how an SQLI attack can occur in PHP code. We show a login form in Figure 1(a). The form has two input fields (Login, Password) whose values are supplied by a user. When a user clicks on Login button, a request for accessing the website is sent to the server side with the supplied values. Figure 1(b) shows the HTML code of the HTML form. Here, the Login and Password input fields are accessed at the server-side through $flogin and $fpassword variables, respectively. Also, the login.php script is executed at the server-side which generates a dynamic SQL query for authentication based on the supplied values. 54
3 (a) Login form (b) HTML of login form <form name = form1 action="login.php" method="post"> <input type= text name= flogin > <input type= text name= fpassword > <input type= submit name= Login > </form> Figure 1. (a) A login form. (b) HTML code of login form. Figure 2 shows the PHP code snippet. Lines 1 and 2 extract the flogin and fpassword fields of a request into $login and $pwd variables, respectively. Note that the inputs are not filtered and directly concatenated with other strings for generating a dynamic SQL query at Line 3. Thus, the code is vulnerable to SQLI attack. Line 4 executes the query and Line 5 performs the authentication based on the presence of at least one row in the result set. If the provided credential information is matched in the tlogin table, the current session ID is set with the obtained id field from the table. 1. $login = $_POST[ flogin ]; 2. $pwd= $_POST[ fpassword ]; 3. $qry = "select id, level from tlogin where uid =.$login. and password =.$pwd. ; 4. $result = mysql_query($qry); 5. while($row = mysql_fetch_array($result)) { // authentication 6. $_SESSION[ ID ] = $row['id'];.. 7. } Figure 2. PHP code for authentication. If a user provides benign values for the input fields as admin and secret respectively, the dynamic query at Line 3 becomes as follows: select id, level from tlogin where uid='admin and password = 'secret. However, if a user supply malicious inputsas shown in Figure 1(a), the query becomes: select id, level from tlogin where uid= or 1=1 -- and password =. The resultant query is now a tautology. Here, the query part after the comment symbol -- is ignored. The remaining condition uid= or 1=1 is evaluated as true. Therefore, the supplied malicious input has altered the intended query structure. We now show how our approach can detect the attack from the client-side. We modify the HTML form as shown in Figure 3 (a) by adding three hidden fields. They represent server-side provided information on shadow query ( squery), the form fields that need to be checked ( chkfield), and the values that need to be substituted with the form field values (substitute) in a shadow query. In addition, a JavaScript code is supplied from the server-side to perform the checking of SQLI attack at the client-side. The method chksqli is shown briefly in Figure 3(b). Here, the script code extracts the shadow query at Line 2. Line 3 computes the conditional entropy of the shadow query ( entropysqry). Line 4 substitutes shadow query s symbolic values (specified at document.form1.substitue as comma separated field values) with form fields (specified at document.form1.chkfield as comma separated values). The conditional entropy (entropyaqry) of the actual query is obtained at Line 5. Line 6 compares the value of entropyaqry and entropysqry. If there is a match, the inputs are considered as benign and the form is submitted to the remote website (Lines 6-7). If there is a mismatch, a warning 55
4 message is generated on SQLI attack related inputs and the form is not submitted to the remote website (Lines 8-9). (a) Revised HTML form <form name = form1 action="login.php" method="post"> <input type= text name= flogin > <input type= text name= fpassword > <input type= hidden name= squery value= select c1, c2 from t1 where c3 =v1 l1c4 = v2 > <input type= hidden name= chkfield value = flogin, fpassword > <input type= hidden name= substitue value = v1, v2 > <input type= submit name= Login onclick= chksqli () > </form> (b) JavaScript code for checking SQLI attack 0. <script type="text/javascript"> 1. function chksqli(){ 2. var sqry = document.form1.squery; 3. var entropysqry = condentropy(sqry); 4. var aqry = subs (sqry, document.form1.chkfield, document.form1.substitue); 5. var entropyaqry = condentropy(aqry); 6. if (entropysqry == entropyaqry) 7. document.form1.submit(); 8. else 9. alert ( SQL injection attack inputs are present in supplied values ); 10. } 11. </script> Figure 3. (a) Modified HTML form (b) JavaScript code for checking SQLI attack at client-side. We will discuss more about the framework, server-side shadow query generation process, client-side conditional entropy computation technique in Section Related work Many works have addressed the detection of SQLI attacks from the server-side. The work of Kim et al. [30] is a recent work in this direction. They remove input variables from queries and identify the fixed values present in queries. At runtime, they remove attribute values from generated queries and perform XOR operation with the earlier saved fixed values. An attack results in a non-zero value during the XOR operation between. In contrast, our approach detects the attack at the client-side and relies on conditional entropy based comparison to identify malicious attack inputs. SQLI attacks have been detected by comparing the parse tree of an intended query and altered query [2] and randomizing SQL keywords [3]. A number of approaches rely on taint-based static analysis [4, 29] which are often dependent on string analysis algorithms and suffer from runtime overhead and false positive warning at the server-side. In contrast to all these approaches, we put the burden of detecting SQLI attacks at the client-side with a priori information sent by the server-side. Other popular approach includes applying prepared statement which is language dependent and not generic [9] as well as profiling the parse trees generated by benign inputs [10]. Lin et al. [11] propose application level security gateway to prevent SQLI attacks. They identify possible entry points of SQLI attacks to be protected by employing meta-programs that can filter 56
5 out meta-characters to avoid SQLI attacks. Kemaliset al. [13] express SQL queries with Extended Backus Naur Form (EBNF). They embed an architecture in program code to mon itor SQLI attacks by matching runtime generated queries with EBNF specifications. In one of our earlier works [24], we compute the entropy of SQL queries to detect SQLI attacks at the server side. This paper is different from our previous work as we now send information from the server side to the client side to detect malicious SQLI attack inputs based on four types of conditional entropies. In contrast, our previous work just relies on the single entropy measure of a given query to detect SQLI attacks at the server side without sending any information at the client side. The previous work may suffer from the attack detection effectiveness for input cases where the entropy level of expected queries and malicious queries might be similar. We alleviate this issue in this paper by proposing four different metrics to compare the deviation between expected and actual query to detect a wide range of malicious inputs. Several works have addressed SQLI attacks from the perspective of effective test case generation at the server-side ([5, 7, 17]). Interested readers may see the details of further works in the survey of [21] based on testing, static analysis, dynamic analysis, and program transformation. In contrast to all these efforts, our proposed approach detects the attack at the client-side and provides the advantage of stopping the attacks early and avoiding consuming server-side resources during attack detection. Our work is also motivated by a number of works based on information theory [26] as a measurement technique to address a variety of security problems such as worm containment [23], characterizing audit log data [16], and performance comparison of IDS [20]. Several works apply information theory to tackle non-security related issues such as measuring the complexity of software [18] and allocating resources of data storage systems [22]. In contrast to these work, we propose a set of conditional entropy metrics to detect SQLI attacks at the client-side. The idea of conditional entropy comes from the motivation that each of the query type dominates the participation of dynamic variables whose values are supplied from a user. So, instead of measuring the entropy of the whole query we can measure the entropy only part of a query in its symbolic representation form. 3. SQLI ATTACK DETECTION APPROACH Figure 4 shows the proposed framework for detecting SQLI attacks at the client-side with priori information provided by the server-side. We briefly discuss the six steps (shown in Figure 4) to provide the workflow of the framework. First, server-side script code is pre-processed to identify HMTL forms that contain input fields. Then the SQL queries present in the script code is extracted and we find the relevant set of input fields in forms that contribute values during dynamic query generation process. We perform static backward slicing on PHP code to find the relevant variables and their reachability to form fields [27, 35]. The SQL query present at the server-side script is simplified to generate shadow query. This is done by replacing table, column, logical operator, and variable values with symbolic values. This step prevents revealing sensitive information at the client-side. The HTML forms are modified by adding hidden fields with information on the following: (i) the shadow query, (ii) fields relevant to dynamic queries and whose values are needed to be replaced with appropriate symbols in the shadow query, and (iii) the relevant symbols from shadow query that need to be replaced with user provided inputs. The step also includes the computation of conditional entropy of a shadow query and an actual query based on the query types and comparing the values for any deviation to detect SQLI attacks. 57
6 In the second step, the modified server-side script code is deployed in a web server. Then, from a browser, a user requests a web page to the server (third step) and it returns the modified pages containing revised HTML forms (fourth step). The user provides inputs in the form and resubmits to the server (step 5). The client-side checking takes place in the JavaScript code during step 6. The checking is done by computing the conditional entropy of the shadow query and the actual query by substituting symbols with user provided input values. If any deviation is found, the inputs are flagged as malicious and a user is warned of attempting SQLI attacks. The request is not forwarded to the server-side. Otherwise, the inputs are considered as benign and the request is forwarded to the server-side. Server-side script 1. Form modification and shadow query generator 2. Deployment of server-side script code 3. Request to server 4. Response page with modified form Web browser 5. Subsequent request to server after filling form with inputs 6. Entropy-based SQLI attack checker No Benign input Deviation found? Yes Malicious input Figure 4. Client-side SQLI attack detection framework. We now discuss briefly, the shadow query generation and form modification process at the server-side in Subsection 3.1. Then, we discuss the necessity of conditional entropy measures and our proposed metrics to measure query deviation in Subsection 3.2. We also show an example of SQLI attack detection based on conditional entropy metric in Subsection Shadow query generation and form modification We first extract the queries by examining the relevant APIs that are related to SQL query execution. In PHP, the mysql_query()function call arguments are tracked and if they include other PHP variables, we trace back in the source to see the definition of other variables before concatenating them to form the original query. The query extraction process is approximate (manual intervention may be required for complex code structure). This step becomes challenging 58
7 when a query is formed using conditional or loop statement. In this case, our assumption is that the loop runs once. For conditional statement, we identify queries based on the control flow paths. The SQL queries extracted at the server-side script are then used to track the relevant HTML form fields which provide values to relevant PHP variables. We perform a backward static slicing approach [27, 35] to identify whether a form field value becomes part of a query. If it participates, we record and combine all field names followed by placing them in a hidden field of the HTML form. The extracted queries are simplified to generate shadow queries. A shadow query has the identical structure of an original query, except the column, table, and variable names are replaced with symbolic values. We replace table, column, and variable values with symbolic values based on the following replacement pattern: (i) table names are replaced with t 1, t 2, and so on; (ii) column names are replaced with c 1, c 2, and so on; (iii) logical operators are replaced with l 1, l 2, and so on; (iv) values are replaced with v 1, v 2, and so on. Note the when substituting query variables that are connected to form fields, we record and store them in a hidden field of the form. The shadow query is sent from the server-side to facilitate the client-side detection. Once the shadow query is formed and the HTML form is analyzed, we then generate the necessary JavaScript code to compute conditional entropy with the embedded information and detect the deviation between shadow query structure and actual query (formed at the client with supplied input values). In the next section, we provide details of the measurement metrics that are used to identify the deviation Conditional entropy calculation Conditional entropy is a measurement technique that we brought from information theory [26]. In other words, we are measuring the information content of SQL queries as part of determining the deviation between shadow query and an original query with malicious inputs. Given that we have a set of random variables, and we know the outcome of one variable in advance, the randomness of the remaining variables can be computed with the conditional entropy metric. For a given SQL query, if we have the priori information about the query type ( e.g., select, insert, delete), we can measure the information content about certain parts of the query. This allows us to reduce the computation time to determine entropy level. Table 1 shows the common four types of SQL queries that are dynamically generated at the server-side. We show examples of shadow queries and the selected parts of the queries that we consider for measuring the information content. The last column shows the query part under computation. For example, in the first row, we show a general form of select type shadow query (column, table, field, and value are given symbolic names). The where condition ( f 1 =v 1 ) is the dynamic part and it is considered for measuring the information content given that we know that the type of query is select. Similarly, for insert type query, we find the values inserted are vulnerable to SQLI attacks. So, we choose the value part of the query to measure the information content. In the same manner, for update type query, we choose set and where condition. Finally, for delete type query, we only consider where condition. 59
8 Table 1. Sample query and selected part for conditional entropy computation. Type Example query Selected part Query part for entropy computation Select Select c1, c2 from t1where c1=v1 Where c1=v1 condition Insert Insert into t1 (c1, c2) values (v1, Value (v1, v2) v2) Update Update t1 set c1=v1 where (c1=v2) Set, where set c1=v1 where (c1=v2) condition Delete Delete from t1 where c1=v1 Where condition c1=v1 We now formally present the formula for computing the conditional entropy given that we know the query types. Let us assume that q be a query present in a program, T={t 1, t 2,, t M ) be the set of tables being used in the query, C={c 1, c 2,, c L ) is the set of all columns that can be selected, inserted, deleted, or updated in q, V ={v 1, v 2,, v P ) is the set of values that are used in where conditions or setting values, L={l 1, l 2,, l P ) is the logical operators present in the where condition of q, and O={o 1, o 2, o 3, o 4 } is the set of operation types that can be performed by q. Here, o 1, o 2, o 3, o 4 represent select, insert, update, and delete operations, respectively. We now define four different probability and conditional probability functions as follows: P(o) is the probability that a query q performs specific operation o (select, insert, update, delete), where oεo. P(c) is the probability that column c appears in the query q, where cεc. P(v) is the probability that a value v appears in a query condition or input value, where vεv. P(t) is the probability that a query q contains a table t, where tεt. P(l) is the probability that a query q contains a logical operation (AND, OR, NOT), where lεl. P(c o) is the conditional probability of the presence of column c given that we know the operation type o for query q. P(v o) is the conditional probability of value v being used in a query s where condition or set values given that we know the operation type of q. P(t o) is the conditional probability of table t being accessed or modified in a query given that we know the operation type of q. P(l o) is the conditional probability of performing logical operation (in where condition) in q, given that we know the operation type of q. We now define four conditional entropies of a query q as follows. Given that we know the operation type of a query, the conditional entropy of column (denoted as H c ) can be computed as follows (Equation (i)): H c (c o) = - log P(c o) (i) H c allows us to detect SQLI attacks where altered query selects additional columns (e.g., UNION select (1, 1)). Given that we know the operation type of a query, the conditional entropy of values (denoted as H v ) can be computed as follows (Equation (ii)): H v (v o) = - log P(v o) (ii) H v allows us to detect attacks where altered query may set new values to fields not intended by the original query (e.g., tautology has 1=1 in attack signatures where 1 is assumed as a value). Given that we know the operation type of a query, the conditional entropy of table (denoted as H t ) can be computed as follows (Equation (iii)): H t (t o) = - log P(t o) (iii) H t allows us to detect attacks where altered query may perform additional operations on table not intended by the original query (e.g., piggybacked queries selecting arbitrary tables). 60
9 Given that we know the operation type of a query, the conditional entropy of logical operation (denoted as H l )can be computed as follows (Equation (iv)): H l (l o) = - log P(l o) (iv) H l allows us to detect attacks where altered query may perform additional logical operations on table not intended by the original query (e.g., tautology). The unit of the conditional entropy is bit. The minimum value for conditional entropy in a query q can be zero. This might happen if a query accesses just one table, column, or includes one logical condition. There is no upper bound for the conditional entropy value Example of SQLI attack detection with conditional entropy We show an example application of our proposed conditional entropy metric (H l ) and how it can be used to detect malicious inputs causing SQLI attacks. We reuse the shadow query in Figure 3(a): select c 1, c 2 from t1 where c 3 =v 1 l 1 c 4 = v 2. Being a select query, we only consider the where conditions (c 3 =v 1 l 1 c 4 =v 2 ). We find that L = {l 1 }, o= {select}, P (o) = P (l 1 select) = P (l 1, select) = 1. The conditional entropy for logical operator (denoted as H l-shadow ) in the shadow query becomes H l-shadow (l o) = -P(l 1,select)*log(P(l 1 select)) = -1*log(1) = 0. Let us assume that an attacker provides a tautology input ( or 1=1 -- ) in the login field and no input in the password field. Then, where c 3 =v 1 l 1 c 4 = v 2 becomes c 3 = or 1=1 -- l 1 c 4 =v 2. By substituting inputs with symbolic values we obtain c 3 = l 2 c 5 =v 1 -- l 1 c 4 =v 2 (or is replaced with l 2 ). The revised logical operator space and conditional probabilities are as follows: L = {l 1, l 2 }, P(l 1 select) = P(l 2 select) = 1/2. P(l 1,select) = P(l 2,select) = 1/2. The conditional entropy for logical operator (denoted as H l-actual ) becomes H l-actual (l o) = -P(l 1,select)*log(P(l 1 select))-p(l 2,select)*log(P(l 2 select)) = 1 This indicates that the conditional entropy of logical operator increases due to tautology attack. Similarly, we can show the usefulness of the proposed four conditional entropies to detect other types of SQLI attacks. Table 2 shows a mapping between the attack types and the proposed conditional entropy metrics that can be used to detect them at the client side. Table 2. A mapping between SQLI attack types and conditional entropy metrics. Attack type H c H v H t H l Tautology Union Piggybacked query 4. EVALUATION We evaluate the proposed conditional entropy-based client-side SQLI attack detection approach using three open source PHP applications available from sourceforge.net. The chosen programs have been ranked among the top five most downloaded applications during our evaluation. The programs include PHP-Address book (address and contact manger), Serendipity (blog management), and PHP-fusions (content management system). Table 3 shows some characteristics of these applications that include the number of files we analyze (column 2) and the corresponding lines of code (column 3), the number of forms modified (column 4), and the 61
10 number of different query types (column 5-8) related to the form fields. The last two columns show the minimum and maximum number of input fields that we notice in these forms. We generate the shadow queries and modify forms in PHP applications (all compatible with PHP version 5.3 or above). We deploy the applications in an Apache web server ( version 2.2) with MySQL server as the backend database after creating necessary tables with data set. We then visit the web applications so that we can reach the modified pages and access the HTML forms. We supply malicious inputs in form fields. We observe whether the checking at the client-side extension generates a warning and a request is stopped in presence of attack inputs. We apply three types of attack inputs: tautology, union, and piggybacked queries. Table 4 shows the results obtained during our evaluation with both attack and benign inputs. The second and third columns show the number of attack inputs applied in form field and the corresponding number of warnings generated. The approach successfully detects all the attacks when. Thus, the false negative rate in our evaluation is zero. The fourth and fifth columns show the number of benign input (generated randomly and applied to different form fields) and the number of warning that we notice in our evaluation. The approach does not generate any false positive warning. Table 3.Characteristics of the applications. Program # of files LOC # of form Select Update Insert Delete Min Max PHP-Address 14 3, book Serendipity 3 5, PHP-fusions 20 6, Table 4.Evaluation results. Program # of attack inputs applied # of attacks detected # of benign inputs applied # of false warning PHP-Address book Serendipity PHP fusions Figure 5 shows a snapshot of the time delay overhead due to the computation of four types of conditional entropies for the three applications (we consider the average time taken for entropies for both shadow and actual queries). The x axis shows the four types of conditional entropies and the y axis shows the computation time delays in milliseconds. The computation of H c and H t takes the highest and lowest amount of time for all applications. This is due to the involvement of relatively higher number of columns and lower number of table in queries among these applications. We notice that PHP-Address Book application takes more time to compute the conditional entropies than the other two applications. We find that the shadow queries of PHP-Address Book is more complex than the other two applications (includes more columns, tables and logical operators). These contribute to the consumption of the processing time during the attack detection process. Serendipity takes the lowest amount of time during the conditional entropy (except H l which is the highest among three applications) computation steps. The Serendipity application has relatively simple form of queries and hence consume less time during the evaluation. Overall, the 62
11 computation time overhead is found to be negligible. We also observe that the amount of HTML code and JavaScript code added due to our approach is also negligible. Figure 5. Delay comparison among applications for conditional entropy computation 5. CONCLUSION SQLI attack is a concern among web application users and a primary source of widespread security breaches. This paper has developed conditional entropy metric-based SQLI attack detection framework based on the priori information supplied from the server-side. Our approach relies on the generation of shadow queries as well as encoding information in HTML forms to enable the necessary checking at the client-side. We measure the deviation between an expected query and an altered query with four conditional entropy metrics that are capable of detecting different types of known and unknown attacks. The approach not only allows detection of malicious inputs causing SQLI at the client-side early, but also relieves the server-side for additional checking and acts as a complementary solution to other existing approaches. We evaluate the proposed approach with three PHP applications containing known SQLI vulnerabilities. The results indicate that the approach can successfully stop malicious inputs at the client-side without any significant overhead. Our future plan includes developing more metrics to consider the deviation of complex form of SQL queries that can be altered under attack inputs and SQLI attacks on stored procedures. Future work also includes evaluating our approach with more open source web applications. Moreover, we are planning to apply the concepts from information theory to mitigate other web-based attacks such as cross-site scripting. ACKNOWLEDGEMENTS This work was funded in part by Faculty Summer Research Award, College of Science and Mathematics, Kennesaw State University, USA. The authors would like to thank reviewers for their thoughtful comments to improve this article. 63
12 REFERENCES [1] The Open Web Application Security Project (OWASP), [2] G. Buehrer, B. W. Weide, P. A. G. Sivilotti, Using parse tree validation to prevent SQL injection attacks, Proceedings of the 5th International Workshop on Software Engineering and Middleware (SEM '05), Lisbon, Portugal, 2005, pp [3]. Boyd and A. Keromytis, SQLrand: Preventing SQL injection attacks, Proc. of the 2nd Applied Cryptography and Network Security Conference, June 2004, pp [4] Z. Su and G. Wasserman, The Essence of Command Injection Attacks in Web Applications, Proc. of the Symposium on Principles of Programming Languages (POPL), January 2006, South Carolina, USA, pp [5] Y. Kosuga, K. Kono, M. Hanaoka, M. Hishiyama, Y. Takahama, Sania: Syntactic and Semantic Analysis for Automated Testing against SQL Injection, Proc. of the 23rdAnnual Computer Security Applications Conference (ACSAC), Miami, Dec 2007, pp [6] Open Source Vulnerability Database, [7] Y. Shin, L. Williams, and T. Xie, SQLUnitGen: SQL Injection Testing Using Static and Dynamic Analysis, Proc. of theinternational Symposium on Software Reliability Engineering (ISSRE), Raleigh, NC, 2006, ISBN [8] S. Curtis, Barclays: 97 percent of data breaches still due to SQL injection, January 2012, [9] S. Thomas and L. Williams, Using Automated Fix Generation to Secure SQL Statements, Proc. of the 3rdInternational Workshop on Software Engineering for Secure Systems (SESS 07), Minneapolis, 2007, pp [10] S. Bandhakavi, P. Bisth, P. Madhusudan, and V. Venkatakrishnan, CANDID: Preventing SQL Injection Attacks using Dynamic Candidate Evaluations, Proc. of the 14th ACM Conf. on Computer and Communications Security, Alexandria, Virginia, Oct 2007, pp [11] J. Lin and J. Chen, The Automatic Defense Mechanism for Malicious Injection Attack, Proc. of the 7th International Conference on Computer and Information Technology, Fukushima, Japan, October 2007, pp [12] Web Application Security Consortium, [13] K. Kemalis and T. Tzouramanis, SQL-IDS: A Specification-based Approach for SQL-Injection Detection, Proc. of 23rd ACM Symposium on Applied Computing (SAC 08), March 2008, Fortaleza, Brazil, pp [14] SQL-inject-me, [15] W3af, Open Source Web Application Security Scanner, [16] W. Lee and D. Xiang, Information-Theoretic Measures for Anomaly Detection, Proceedings of the IEEE Symposium on Security and Privacy, Oakland, California, May 2001, pp [17] H. Shahriar and M. Zulkernine, MUSIC: Mutation-based SQL Injection Vulnerability Checking, Proceedings of the 8th IEEE International Conference on Quality Software (QSIC), London, UK, August 2008, pp [18] E. Allen and T. Khoshgoftaar, Measuring Coupling and Cohesion: An Information Theory Approach, Proceedings of the 6th International Software Metrics Symposium, November 1999, Boca Raton, FL, pp [19] Sqlmap, [20] G. Gu, P. Fogla, D. Dagon, W. Lee, and B. Skoric, Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems, Proc. of the 11th European Symposium Research Computer Security, Hamburg, Germany, Sept2006, pp [21] H. Shahriar and M. Zulkernine, Mitigation of Program Security Vulnerabilities: Approaches and Challenges, ACM Computing Surveys (CSUR), Vol. 44, No. 3, Article 11, May [22] Y. Geng, An information-theoretic model for resource-constrained systems, Proc. of IEEE International Conference on Systems Man and Cybernetics (SMC), October 2010, Istanbul, Turkey, pp
13 [23] S. Khayam, H. Radha, and D. Loguinov, Worm Detection at Network Endpoints Using Information- Theoretic Traffic Perturbations, Proc. of the IEEE International Conference on Communications (ICC), Beijing, China, May 2008, pp [24] H. Shahriar and M. Zulkernine, Information Theoretic Detection of SQLI Attacks, Proc. of 14th IEEE Internationa High Assurance Systems Engineering Symposium (HASE), Omaha, Nebraska, USA, October 2012, pp [25] T. Cover and J. Thomas, Elements of Information Theory, John Wiley and Sons, [26] C. Shannon, A Mathematical Theory of Communication, Bell Systems Technical Journal, [27] F. Tip, A Survey of Program Slicing Techniques, Technical Report, Centre for Mathematics and Computer Science, Amsterdam, The Netherlands, [28] A. Singh and S. Roy, A Network Based Vulnerability Scanner for Detecting SQLI Attacks in Web Applications, Proc. of the 1st International Conference on Recent Advances in Information Technology (RAIT), March 2012, Dhanbad, India, pp [29] G. Agosta, A. Barenghi, A. Parata, G. Pelosi, Automated Security Analysis of Dynamic Web Applications through Symbolic Code Execution, Proc. of the 9th International Conference on Information Technology: New Generations (ITNG), April 2012, Las Vegas, NV, pp [30] J. Kim, Injection Attack Detection Using the Removal of SQL Query Attribute Values, Proc. of the International Conference on Information Science and Applications (ICISA), Jeju Island, Korea, May 2011, pp [31] N. Antunes and M. Vieira, Defending Against Web Application Vulnerabilities, IEEE Computer, Volume 45, Issue 2, February 2012, pp [32] Sqlifuzzer, Command Line SQL Injection Web Scanner, [33] M. Johns, C. Beyerlein, R. Giesecke, J. Posegga, Secure Code Generation for Web Applications, Proc. of the 2nd International Symposium on Engineering Secure Software and Systems (ESSoS '10), Pisa, Italy, LNCS 5965, pp , Springer. [34] H. Shahriar, S. North, and W. Wei, Client-Side Detection of SQL Injection Attacks, Proc. of 3rd International Workshop on Information Systems Security Engineering (WISSE), X. Franch and P. Soffer (Eds.): CAiSE 2013 Workshops, LNBIP 148, pp , Barcelona, Spain, June Springer, Heidelberg (2013). [35] M. Weiser, Program Slicing, IEEE Transactions ON Software Engineering, Vol. SE-10, No. 4, July 1984, pp Authors Dr. Hossain Shahriar is currently an Assistant Professor of Computer Science at Kennesaw State University, Georgia, USA. His research interests include web application and network security. Dr. Shahriar has published many research articles in Journals and conferences including Journal of Systems and Software and Future Generation Computer Systems. He served as reviewer of international journals and conferences related to software and web application security. Currently, Dr. Shahriar is a member of the ACM and IEEE. More information about his research and background can be found at Dr. Sarah M. North is an Assistant Professor of Computer Science Department at Kennesaw State University. Dr. North has been successfully involved in the research in the areas of information security education, human-computer interaction and cognitive science. Dr. North has published several book chapters; and a number of referred scholarly articles in national and international venues. She also served as principal/co-principal investigator on a number of research grants sponsored by the Boeing Company, National Science Foundation, and National Security Agency. Dr. North is a member of the ACM and IEEE. More information about her research/ publications and background can be found at Wei-Chuen Chen is currently an undergraduate student at Kennesaw State University. His interests include security in computing and data analysis. During the summer of 2013, he held an intern position at Oversight Systems where the company product provides continuous transaction analysis for big data. Currently, he is a member of ACM and an officer of KSU ACM student chapter. 65
Security of Web Applications and Browsers: Challenges and Solutions
Security of Web Applications and Browsers: Challenges and Solutions A Tutorial Proposal for ACM SAC 2015 By Dr. Hossain Shahriar Department of Computer Science Kennesaw State University Kennesaw, GA 30144,
Detection and Prevention of SQL Injection Attacks
Detection and Prevention of SQL Injection Attacks 1 Sailor Pratik, 2 Prof. Jaydeep Gheewala 1 Computer Department 1 Sarvajanik College of Engineering and Technology, Surat, Gujarat, India 1 [email protected],
SQL INJECTION MONITORING SECURITY VULNERABILITIES IN WEB APPLICATIONS
SQL INJECTION MONITORING SECURITY VULNERABILITIES IN WEB APPLICATIONS Manas Kumar 1, S. Senthil kumar 2 and D. Sarvanan 3 1 M.C.A. (Final Year) Abstract Sql injection: a recently discovered application
A Novel Approach to detect SQL injection in web applications
A Novel Approach to detect SQL injection in web applications Kuldeep Kumar 1, Dr. Debasish Jena 2 and Ravi Kumar 3 1&2 IIIT Bhubaneswar, Bhubaneswar-751003 3 InstaSafe Technologies Pvt. Ltd, Bangalore-560076
Bayesian Classification for SQL Injection Detection
Bayesian Classification for SQL Injection Detection Brandon Skari College of Engineering and Applied Science University of Wyoming Laramie, Wyoming 82070 [email protected] April 6, 2011 Overview
How To Prevent An Sql Injection Attack
CHAPTER 1 PROJECT OVERVIEW 1.1 Introduction Database security is the degree to which all data is fully protected from tampering or unauthorized acts. Security vulnerability, security threat and security
An Effective Approach for Detecting and Preventing Sqlinjection Attacks
An Effective Approach for Detecting and Preventing Sqlinjection Attacks M. Roslinmary 1, S. Sivasakthi 2, A. Shenbaga Bharatha Priya 3 1, 2, 3 PG scholar, Department of IT, Dr. Sivanthi Aditanar College
Enhanced Model of SQL Injection Detecting and Prevention
Enhanced Model of SQL Injection Detecting and Prevention Srinivas Baggam, Assistant Professor, Department of Computer Science and Engineering, MVGR College of Engineering, Vizianagaram, India. [email protected]
INTRUSION PROTECTION AGAINST SQL INJECTION ATTACKS USING REVERSE PROXY
INTRUSION PROTECTION AGAINST SQL INJECTION ATTACKS USING REVERSE PROXY Asst.Prof. S.N.Wandre Computer Engg. Dept. SIT,Lonavala University of Pune, [email protected] Gitanjali Dabhade Monika Ghodake Gayatri
Web Forensic Evidence of SQL Injection Analysis
International Journal of Science and Engineering Vol.5 No.1(2015):157-162 157 Web Forensic Evidence of SQL Injection Analysis 針 對 SQL Injection 攻 擊 鑑 識 之 分 析 Chinyang Henry Tseng 1 National Taipei University
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
AUTOMATE CRAWLER TOWARDS VULNERABILITY SCAN REPORT GENERATOR
AUTOMATE CRAWLER TOWARDS VULNERABILITY SCAN REPORT GENERATOR Pragya Singh Baghel United College of Engineering & Research, Gautama Buddha Technical University, Allahabad, Utter Pradesh, India ABSTRACT
A Tokenization and Encryption based Multi-Layer Architecture to Detect and Prevent SQL Injection Attack
A Tokenization and Encryption based Multi-Layer Architecture to Detect and Prevent SQL Injection Attack Mr. Vishal Andodariya PG Student C. U. Shah College Of Engg. And Tech., Wadhwan city, India [email protected]
An analysis on Blocking of SQL Injection Attacks by Comparing Static and Dynamic Queries
An analysis on Blocking of SQL Injection Attacks by Comparing Static and Dynamic Queries Jaskanwal Minhas Dept. of Computer Science and Engineering, Sant Baba Bhag Singh Institute of Engineering and Technology,
Toward A Taxonomy of Techniques to Detect Cross-site Scripting and SQL Injection Vulnerabilities
NCSU CSC TR 2008-4 1 Toward A Taxonomy of Techniques to Detect Cross-site Scripting and SQL Injection Vulnerabilities Yonghee SHIN, Laurie WILLIAMS, Members, IEEE Abstract Since 2002, over half of reported
EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.
CENTER FOR ADVANCED SECURITY TRAINING 619 Advanced SQLi Attacks and Countermeasures Make The Difference About Center of Advanced Security Training () The rapidly evolving information security landscape
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications Slides by Connor Schnaith Cross-Site Request Forgery One-click attack, session riding Recorded since 2001 Fourth out of top 25 most
Detection of SQL Injection and XSS Vulnerability in Web Application
International Journal of Engineering and Applied Sciences (IJEAS) ISSN: 2394-3661, Volume-2, Issue-3, March 2015 Detection of SQL Injection and XSS Vulnerability in Web Application Priti Singh, Kirthika
Analysis of SQL injection prevention using a proxy server
Computer Science Honours 2005 Project Proposal Analysis of SQL injection prevention using a proxy server By David Rowe Supervisor: Barry Irwin Department of Computer
A Novel Frame Work to Detect Malicious Attacks in Web Applications
Technology, Volume-2, Issue-1, January-March, 2014, pp. 23-28, IASTER 2014, www.iaster.com, Online:2347-5099, Print:2348-0009 A Novel Frame Work to Detect Malicious Attacks in Web Applications N. Jayakanthan
Cracking the Perimeter via Web Application Hacking. Zach Grace, CISSP, CEH [email protected] January 17, 2014 2014 Mega Conference
Cracking the Perimeter via Web Application Hacking Zach Grace, CISSP, CEH [email protected] January 17, 2014 2014 Mega Conference About 403 Labs 403 Labs is a full-service information security and compliance
IJMIE Volume 2, Issue 9 ISSN: 2249-0558
Survey on Web Application Vulnerabilities Prevention Tools Student, Nilesh Khochare* Student,Satish Chalurkar* Professor, Dr.B.B.Meshram* Abstract There are many commercial software security assurance
SQL Injection Protection by Variable Normalization of SQL Statement
Page 1 of 9 SQL Injection Protection by Variable Normalization of SQL Statement by: Sam M.S. NG, 0 http://www.securitydocs.com/library/3388 "Make everything as simple as possible, but not simpler." --
How I hacked PacketStorm (1988-2000)
Outline Recap Secure Programming Lecture 8++: SQL Injection David Aspinall, Informatics @ Edinburgh 13th February 2014 Overview Some past attacks Reminder: basics Classification Injection route and motive
External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION
External Vulnerability Assessment -Technical Summary- Prepared for: ABC ORGANIZATI On March 9, 2008 Prepared by: AOS Security Solutions 1 of 13 Table of Contents Executive Summary... 3 Discovered Security
Information Security for Modern Enterprises
Information Security for Modern Enterprises Kamal Jyoti 1. Abstract Many enterprises are using Enterprise Content Management (ECM) systems, in order to manage sensitive information related to the organization.
1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications
1. Introduction 2. Web Application 3. Components 4. Common Vulnerabilities 5. Improving security in Web applications 2 What does World Wide Web security mean? Webmasters=> confidence that their site won
Client vs. Server Implementations of Mitigating XSS Security Threats on Web Applications
Journal of Basic and Applied Engineering Research pp. 50-54 Krishi Sanskriti Publications http://www.krishisanskriti.org/jbaer.html Client vs. Server Implementations of Mitigating XSS Security Threats
Detection of SQL Injection Attacks by Combining Static Analysis and Runtime Validation
Detection of SQL Injection Attacks by Combining Static Analysis and Runtime Validation Witt Yi Win, and Hnin Hnin Htun Abstract SQL injection attack is a particularly dangerous threat that exploits application
A Multi agent Scanner to Detect Stored XSS Vulnerabilities
A Multi agent Scanner to Detect Stored XSS Vulnerabilities E. Galán, A. Alcaide, A. Orfila, J. Blasco University Carlos III of Madrid, UC3M Leganés, Spain {edgalan,aalcaide,adiaz,jbalis}@inf.uc3m.es Abstract
SQL Injection January 23, 2013
Web-based Attack: SQL Injection SQL Injection January 23, 2013 Authored By: Stephanie Reetz, SOC Analyst Contents Introduction Introduction...1 Web applications are everywhere on the Internet. Almost Overview...2
Idea: Using System Level Testing for Revealing SQL Injection-Related Error Message Information Leaks
Idea: Using System Level Testing for Revealing SQL Injection-Related Error Message Information Leaks Ben Smith, Laurie Williams, and Andrew Austin North Carolina State University, Computer Science Department
Testing Web Applications for SQL Injection Sam Shober [email protected]
Testing Web Applications for SQL Injection Sam Shober [email protected] Abstract: This paper discusses the SQL injection vulnerability, its impact on web applications, methods for pre-deployment and
Application security testing: Protecting your application and data
E-Book Application security testing: Protecting your application and data Application security testing is critical in ensuring your data and application is safe from security attack. This ebook offers
The Devils Behind Web Application Vulnerabilities
The Devils Behind Web Application Vulnerabilities Defending against Web Application Vulnerabilities IEEE Computer, February 2012 Nuno Antunes, Marco Vieira {nmsa, mvieira}@dei.uc.pt Postgrad Colloquium
A Simple and Fast Technique for Detection and Prevention of SQL Injection Attacks (SQLIAs)
, pp.53-66 http://dx.doi.org/10.14257/ijsia.2013.7.5.05 A Simple and Fast Technique for Detection and Prevention of SQL Injection Attacks (SQLIAs) Z. Lashkaripour 1, * and A. Ghaemi Bafghi 1 1 Data and
Cross Site Scripting Prevention
Project Report CS 649 : Network Security Cross Site Scripting Prevention Under Guidance of Prof. Bernard Menezes Submitted By Neelamadhav (09305045) Raju Chinthala (09305056) Kiran Akipogu (09305074) Vijaya
Cyber Security Challenge Australia 2014
Cyber Security Challenge Australia 2014 www.cyberchallenge.com.au CySCA2014 Web Penetration Testing Writeup Background: Pentest the web server that is hosted in the environment at www.fortcerts.cysca Web
Protecting Database Centric Web Services against SQL/XPath Injection Attacks
Protecting Database Centric Web Services against SQL/XPath Injection Attacks Nuno Laranjeiro, Marco Vieira, and Henrique Madeira CISUC, Department of Informatics Engineering University of Coimbra, Portugal
Client Side Filter Enhancement using Web Proxy
Client Side Filter Enhancement using Web Proxy Santosh Kumar Singh 1, Rahul Shrivastava 2 1 M Tech Scholar, Computer Technology (CSE) RCET, Bhilai (CG) India, 2 Assistant Professor, CSE Department, RCET
Penetration Test Report
Penetration Test Report Acme Test Company ACMEIT System 26 th November 2010 Executive Summary Info-Assure Ltd was engaged by Acme Test Company to perform an IT Health Check (ITHC) on the ACMEIT System
CSUSB Web Application Security Standard CSUSB, Information Security & Emerging Technologies Office
CSUSB, Information Security & Emerging Technologies Office Last Revised: 03/17/2015 Draft REVISION CONTROL Document Title: Author: File Reference: CSUSB Web Application Security Standard Javier Torner
HTTPParameter Pollution. ChrysostomosDaniel
HTTPParameter Pollution ChrysostomosDaniel Introduction Nowadays, many components from web applications are commonly run on the user s computer (such as Javascript), and not just on the application s provider
Web Application Security
Web Application Security John Zaharopoulos ITS - Security 10/9/2012 1 Web App Security Trends Web 2.0 Dynamic Webpages Growth of Ajax / Client side Javascript Hardening of OSes Secure by default Auto-patching
CHAPTER 5 INTELLIGENT TECHNIQUES TO PREVENT SQL INJECTION ATTACKS
66 CHAPTER 5 INTELLIGENT TECHNIQUES TO PREVENT SQL INJECTION ATTACKS 5.1 INTRODUCTION In this research work, two new techniques have been proposed for addressing the problem of SQL injection attacks, one
SQLAS: TOOL TO DETECT AND PREVENT ATTACKS IN PHP WEB APPLICATIONS
SQLAS: TOOL TO DETECT AND PREVENT ATTACKS IN PHP WEB APPLICATIONS Vandana Dwivedi 1, Himanshu Yadav 2 and Anurag Jain 3 1 Department of Computer Science & Engineering, RITS,Bhopal (India) 2 Department
Double guard: Detecting Interruptions in N- Tier Web Applications
Vol. 3, Issue. 4, Jul - Aug. 2013 pp-2014-2018 ISSN: 2249-6645 Double guard: Detecting Interruptions in N- Tier Web Applications P. Krishna Reddy 1, T. Manjula 2, D. Srujan Chandra Reddy 3, T. Dayakar
HOD of Dept. of CSE & IT. Asst. Prof., Dept. Of CSE AIET, Lko, India. AIET, Lko, India
Volume 5, Issue 12, December 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Investigation
Webapps Vulnerability Report
Tuesday, May 1, 2012 Webapps Vulnerability Report Introduction This report provides detailed information of every vulnerability that was found and successfully exploited by CORE Impact Professional during
Web Vulnerability Scanner by Using HTTP Method
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 9, September 2015,
Project 2: Web Security Pitfalls
EECS 388 September 19, 2014 Intro to Computer Security Project 2: Web Security Pitfalls Project 2: Web Security Pitfalls This project is due on Thursday, October 9 at 6 p.m. and counts for 8% of your course
Intrusion Protection against SQL Injection Attacks Using a Reverse Proxy
Intrusion Protection against SQL Injection Attacks Using a Reverse Proxy S. Fouzul Hidhaya 1, 2 and Angelina Geetha 1, 3 1 Department of Computer science and Engineering, B.S. Abdur Rahman University,
Banking Security using Honeypot
Banking Security using Honeypot Sandeep Chaware D.J.Sanghvi College of Engineering, Mumbai [email protected] Abstract New threats are constantly emerging to the security of organization s information
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
Obfuscation-based Analysis of SQL Injection Attacks
Obfuscation-based Analysis of SQL Injection Attacks Raju Halder Dipartimento di Informatica Università Ca Foscari di Venezia, Italy [email protected] Agostino Cortesi Dipartimento di Informatica Università
Advanced Web Technology 10) XSS, CSRF and SQL Injection 2
Berner Fachhochschule, Technik und Informatik Advanced Web Technology 10) XSS, CSRF and SQL Injection Dr. E. Benoist Fall Semester 2010/2011 Table of Contents Cross Site Request Forgery - CSRF Presentation
State of The Art: Automated Black Box Web Application Vulnerability Testing. Jason Bau, Elie Bursztein, Divij Gupta, John Mitchell
Stanford Computer Security Lab State of The Art: Automated Black Box Web Application Vulnerability Testing, Elie Bursztein, Divij Gupta, John Mitchell Background Web Application Vulnerability Protection
Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP
Threat Modeling Categorizing the nature and severity of system vulnerabilities John B. Dickson, CISSP What is Threat Modeling? Structured approach to identifying, quantifying, and addressing threats. Threat
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not
DETECTION AND PREVENTION OF TAUTOLOGY AND UNION QUERY BASED SQL INJECTION ATTACKS
DETECTION AND PREVENTION OF TAUTOLOGY AND UNION QUERY BASED SQL INJECTION ATTACKS Jyoti Agrawal 1, Mukesh Gupta 2 1,2 Dept. of Computer Science, SKIT, (India) ABSTRACT Web applications are pervasive and
Token Sequencing Approach to Prevent SQL Injection Attacks
IOSR Journal of Computer Engineering (IOSRJCE) ISSN : 2278-0661 Volume 1, Issue 1 (May-June 2012), PP 31-37 Token Sequencing Approach to Prevent SQL Injection Attacks ManveenKaur 1,Arun Prakash Agrawal
Recommended Practice Case Study: Cross-Site Scripting. February 2007
Recommended Practice Case Study: Cross-Site Scripting February 2007 iii ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland Security to provide guidance for control system cyber
Security Model for Multi-Tier Web Application by Using Double Guard
Security Model for Multi-Tier Web Application by Using Double Guard SnehalKhedkar 1, Mangal Vetal 2, Surekha Kotkar 3, R. S. Tambe 4 1,2,3 B.E. Computer, 4 M.E.Computer, P.R.E.C. Loni Abstract- The use
Rational AppScan & Ounce Products
IBM Software Group Rational AppScan & Ounce Products Presenters Tony Sisson and Frank Sassano 2007 IBM Corporation IBM Software Group The Alarming Truth CheckFree warns 5 million customers after hack http://infosecurity.us/?p=5168
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
VIDEO intypedia007en LESSON 7: WEB APPLICATION SECURITY - INTRODUCTION TO SQL INJECTION TECHNIQUES. AUTHOR: Chema Alonso
VIDEO intypedia007en LESSON 7: WEB APPLICATION SECURITY - INTRODUCTION TO SQL INJECTION TECHNIQUES AUTHOR: Chema Alonso Informática 64. Microsoft MVP Enterprise Security Hello and welcome to Intypedia.
How To Fix A Web Application Security Vulnerability
Proposal of Improving Web Application Security in Context of Latest Hacking Trends RADEK VALA, ROMAN JASEK Department of Informatics and Artificial Intelligence Tomas Bata University in Zlin, Faculty of
SQL Injection Vulnerabilities in Desktop Applications
Vulnerabilities in Desktop Applications Derek Ditch (lead) Dylan McDonald Justin Miller Missouri University of Science & Technology Computer Science Department April 29, 2008 Vulnerabilities in Desktop
External Network & Web Application Assessment. For The XXX Group LLC October 2012
External Network & Web Application Assessment For The XXX Group LLC October 2012 This report is solely for the use of client personal. No part of it may be circulated, quoted, or reproduced for distribution
QualysGuard WAS. Getting Started Guide Version 3.3. March 21, 2014
QualysGuard WAS Getting Started Guide Version 3.3 March 21, 2014 Copyright 2011-2014 by Qualys, Inc. All Rights Reserved. Qualys, the Qualys logo and QualysGuard are registered trademarks of Qualys, Inc.
Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com
SAINT Integrated Network Vulnerability Scanning and Penetration Testing www.saintcorporation.com Introduction While network vulnerability scanning is an important tool in proactive network security, penetration
SQL Injection Attack Lab Using Collabtive
Laboratory for Computer Security Education 1 SQL Injection Attack Lab Using Collabtive (Web Application: Collabtive) Copyright c 2006-2011 Wenliang Du, Syracuse University. The development of this document
Sania: Syntactic and Semantic Analysis for Automated Testing against SQL Injection
Sania: Syntactic and Semantic Analysis for Automated Testing against SQL Injection Yuji Kosuga, Kenji Kono, Miyuki Hanaoka Department of Information and Computer Science Keio University 3-14-1 Hiyoshi
SB 1386 / AB 1298 California State Senate Bill 1386 / Assembly Bill 1298
California State Senate Bill 1386 / Assembly Bill 1298 InterSect Alliance International Pty Ltd Page 1 of 8 Intersect Alliance International Pty Ltd. All rights reserved worldwide. Intersect Alliance Pty
Common Security Vulnerabilities in Online Payment Systems
Common Security Vulnerabilities in Online Payment Systems Author- Hitesh Malviya(Information Security analyst) Qualifications: C!EH, EC!SA, MCITP, CCNA, MCP Current Position: CEO at HCF Infosec Limited
Learning SQL for Database Intrusion Detection using Context-sensitive Modelling
Learning SQL for Database Intrusion Detection using Context-sensitive Modelling Martin Apel, Christian Bockermann, Michael Meier The joke that should not be... The joke that should not be... $name = $_POST[
Web Intrusion Detection with ModSecurity. Ivan Ristic <[email protected]>
Web Intrusion Detection with ModSecurity Ivan Ristic Aim of This Talk Discuss the state of Web Intrusion Detection Introduce ModSecurity Introduce an open source web application
XSS-GUARD : Precise Dynamic Prevention of Cross Site Scripting (XSS) Attacks
XSS-GUARD : Precise Dynamic Prevention of Cross Site Scripting (XSS) Attacks Prithvi Bisht (http://cs.uic.edu/~pbisht) Joint work with : V.N. Venkatakrishnan Systems and Internet Security Laboratory Department
Detection and mitigation of Web Services Attacks using Markov Model
Detection and mitigation of Web Services Attacks using Markov Model Vivek Relan [email protected] Bhushan Sonawane [email protected] Department of Computer Science and Engineering, University of Maryland,
Web Application Vulnerabilities and Avoiding Application Exposure
Web Application Vulnerabilities and Avoiding Application Exposure The introduction of BIG-IP Application Security Manager (ASM) version 9.4.2 marks a major step forward. BIG-IP ASM now offers more features
Adobe Systems Incorporated
Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
How To Test Your Web Site On Wapt On A Pc Or Mac Or Mac (Or Mac) On A Mac Or Ipad Or Ipa (Or Ipa) On Pc Or Ipam (Or Pc Or Pc) On An Ip
Load testing with WAPT: Quick Start Guide This document describes step by step how to create a simple typical test for a web application, execute it and interpret the results. A brief insight is provided
Security Test s i t ng Eileen Donlon CMSC 737 Spring 2008
Security Testing Eileen Donlon CMSC 737 Spring 2008 Testing for Security Functional tests Testing that role based security functions correctly Vulnerability scanning and penetration tests Testing whether
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
Ensuring Security in Cloud with Multi-Level IDS and Log Management System
Ensuring Security in Cloud with Multi-Level IDS and Log Management System 1 Prema Jain, 2 Ashwin Kumar PG Scholar, Mangalore Institute of Technology & Engineering, Moodbidri, Karnataka1, Assistant Professor,
A B S T R A C T. Index Terms: DoubleGuard; database server; intruder; web server I INTRODUCTION
Intervention Detection System Using DoubleGuard Technique Web Application. Prof.P.M.Bhujbal, Prof.S.V.Gumaste, Mr.N.S.Jadhav, Mr.S.N.Dhage Department Of Computer Engineering Jaihind College Of Engineering,
A Survey on Threats and Vulnerabilities of Web Services
A Survey on Threats and Vulnerabilities of Web Services A Thesis submitted in partial fulfillment of the requirements for the degree of Master of Computer Science and Engineering of Jadavpur University
Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
CS 558 Internet Systems and Technologies
CS 558 Internet Systems and Technologies Dimitris Deyannis [email protected] 881 Heat seeking Honeypots: Design and Experience Abstract Compromised Web servers are used to perform many malicious activities.
SQL INJECTION ATTACKS By Zelinski Radu, Technical University of Moldova
SQL INJECTION ATTACKS By Zelinski Radu, Technical University of Moldova Where someone is building a Web application, often he need to use databases to store information, or to manage user accounts. And
Contemporary Web Application Attacks. Ivan Pang Senior Consultant Edvance Limited
Contemporary Web Application Attacks Ivan Pang Senior Consultant Edvance Limited Agenda How Web Application Attack impact to your business? What are the common attacks? What is Web Application Firewall
International Journal of Engineering Technology, Management and Applied Sciences. www.ijetmas.com November 2014, Volume 2 Issue 6, ISSN 2349-4476
ERP SYSYTEM Nitika Jain 1 Niriksha 2 1 Student, RKGITW 2 Student, RKGITW Uttar Pradesh Tech. University Uttar Pradesh Tech. University Ghaziabad, U.P., India Ghaziabad, U.P., India ABSTRACT Student ERP
SQL Injection 2.0: Bigger, Badder, Faster and More Dangerous Than Ever. Dana Tamir, Product Marketing Manager, Imperva
SQL Injection 2.0: Bigger, Badder, Faster and More Dangerous Than Ever Dana Tamir, Product Marketing Manager, Imperva Consider this: In the first half of 2008, SQL injection was the number one attack vector
