A Survey On Web Application Vulnerabilities(SQLIA,XSS)Exploitation and Security Engine for SQL Injection
|
|
|
- Johnathan Walker
- 10 years ago
- Views:
Transcription
1 2012 International Conference on Communication Systems and Network Technologies A Survey On Web Application Vulnerabilities(SQLIA,XSS)Exploitation and Security Engine for SQL Injection Rahul Johari USIT, GGSIP University Sector 16-C Dwarka Delhi, India [email protected] Pankaj Sharma CERT-In, Ministry of Communications and IT Govt. of India Delhi India [email protected] Abstract Today almost all organizations have improved their performance through allowing more information exchange within their organization as well as between their distributers, suppliers, and customers using web support. Databases are central to the modern websites as they provide necessary data as well as stores critical information such as user credentials, financial and payment information, company statistics etc. These websites have been continuously targeted by highly motivated malicious users to acquire monetary gain. Structured Query Language (SQL) injection and Cross Site Scripting Attack (XSS) is perhaps one of the most common application layer attack technique used by attacker to deface the website, manipulate or delete the content through inputting unwanted command strings. Structured Query Language Injection Attacks (SQLIA) is ranked 1st in the Open Web Application Security Project (OWASP) [1] top 10 vulnerability list and has resulted in massive attacks on a number of websites in the past few years. In this paper, we present a detailed review on various types of Structured Query Language Injection attacks, Cross Site Scripting Attack, vulnerabilities, and prevention techniques. Besides presenting our findings from the survey, we also propose future expectations and possible development of countermeasures against Structured Query Language Injection attacks. Keywords- SQL Injection Attack, Static Analysis, Dynamic Analysis, Web Vulnerabilities, Unauthorized Access, Authentication Bypass, Input Validation, Database Mapping etc. I. INTRODUCTION SQL Injection Attacks (SQLIAs)-Structured Query Language (SQL) is an interpreted language used in database driven web applications which construct SQL statements that incorporate user-supplied data or text. If this is done in an unsafe manner, then the web application may be vulnerable to SQL Injection Attack i.e. If user supplied data is not properly validated then user can modify or craft a malicious SQL statements and can execute arbitrary code on the target machine or modify the contents of database. Problem formalization- Any web application can be formalized with respect to SQL Injection Attack as follows: It accepts the input from user or system. It concatenates input with hardcoded SQL statement and builds complete query structure. Query generated gets executed and concatenates result with HTML code. In the context of above formalization SQL Injection Attack is targeted on a program at the database layer which is connected to a web application. This SQL Injection Attack exploits weakness or vulnerability in the target program to properly verify the input supplied to it through a web form. The Common Weakness Enumeration (CWE) framework [2] which provides unified set of software weaknesses defined [3]SQL injection weakness as not neutralizing or incorrectly neutralizing special elements that could modify the intended SQL command. In a typical SQL injection attack the attacker posts specially crafted Structured Query Language (SQL) statements which are executed in the database server and produce malicious outcomes. II. SQL INJECTION BACKGROUND A. Why SQL Injection is a major Threat? The vulnerability trends indicate that significant portion of the vulnerabilities are in applications. Further Cross site scripting and SQL injection are prominent application vulnerabilities among those reported in applications. The SQL injection attacks pose greater risk due to the fact that they impact databases which are critical to any organization. From response perspective also, the remedial action need to be taken by the developer or programmer since the flaw need to be corrected by code level changes. This requires comparatively longer times to take corrective actions after SQL injection vulnerabilities are detected. The attack trends also indicate that SQL injection vulnerabilities are exploited during recent years, in mass scale on vulnerable web applications. Mass scale web intrusions were carried out by ASPROX botnet during 2008 and 2010 which resulted in infection of number of websites in a short span of time. ASPROX used specially formed malicious SQL queries to infiltrate vulnerable databases. In a typical attack ASPROX used Google queries to harvest vulnerable ASP pages and carried out SQL injection and subsequently inserting iframe links into databases. These iframes were used to conduct /12 $ IEEE DOI /CSNT
2 drive-by-download attacks wherein visitors of affected websites are redirected to malicious websites which are used to propagate malware on to users systems. Hence, SQL Injection could be very dangerous in many cases depending on the platform where the attack is launched and it gets success in injecting rogue users to the target system. B. Impact of SQL Injection As we already mentioned SQL injection attack is accomplished by providing data (inclusion of SQL queries) from an external source which is further used to dynamically construct a SQL query. The impact and consequences of SQL injection attacks can be classified as follows: 1) Confidentiality: Loss of confidentiality is a major problem with SQL Injection attacks since SQL databases generally hold sensitive and critical information which could be viewed by unauthorized users as a consequence of successful SQL injection attack. 2) Integrity: Successful SQL injection attack allows external source to make unauthorized modifications such as altering or even deleting information from target databases. 3) Authentication: Poorly written SQL queries do not properly validate user names and passwords, which allows unauthenticated entity or attacker to connect to the affected database or application as an authenticated user, without initial knowledge of the password or even user name. 4) Authorization: Successful exploitation of SQL injection vulnerability, allows attacker to change authorization information and gain elevated privileges if the authorization information is stored in the affected database In real world scenario, it is very hard to detect the SQL injection prior to its impact. In most number of scenarios, unauthorized activity is performed by the attacker through valid user credentials or by using inherent features of database application such as malicious modification of existing SQL Queries of web application that are accessing critical sections of the affected databases. III. CROSS SITE SCRIPTING (XSS) Cross-site Scripting (XSS) is another common web application attack technique that involves echoing attackersupplied code into a user s browser instance or client via web pages viewed by the target users. Here the attackers host or inject attack code written in different static or dynamic contents such as HTML, Java, JavaScript, ActiveX, Flash or any other browser supported technology. When an attacker gets a user s browser to execute his/her script, the script will run within the security context (or zone) of the hosting web site. With this kind of privilege, the application code has the ability to read, change and transmit any critical data accessible by the browser. Successful XSS attack allows attackers to hijack user s account via cookie, redirecting user to another website from the website visited and there by facilitating other types of attacks such as phishing or drive-by-download attacks. XSS attack poses significant risk in cases where the browser interacts closely with file system on the user s computers for loading content. XSS attacks are commonly used to hijack sessions of users visiting websites facilitating e-commerce, wherein malicious script/code runs on user s client and captures cookie information of user s browser allowing hijacking of session. There are different types of XSS attacks, primarily two types called persistent and non-persistent XSS are mentioned here. The difference between the two types lie in the way the server side and client side vulnerabilities are exploited. A. Stored or Persistent attacks- Occurs when the malicious code is submitted to a web application where it s stored permanently. Examples of an attacker s favorite targets often include web mail messages, and forum posts. When a user visits the polluted webmail message or forum, the script/code executes in the user s context. This attack scenario does not require enticing targeted user to click on any URL. B. Reflected or Non-persistent attacks Occurs when the server does not properly sanitize the output server to a visiting web browser/client. In typical attack scenario, the attacker target visitor of a specific website abc.com containing reflected XSS vulnerability and tricks targeted user to click on a maliciously crafted URL. The user intend to visit the abc.com and does so but in the process the client side script/code contained in the malicious URL supplied by the attacker executes thereby enabling the attacker to gain access to sensitive user credentials, cookies etc. C. Impact of Cross-site Scripting Attack(XSS)- The impact of Cross-site scripting attack varies depending up on the level of access and type of information gained by the attacker. The consequences of successful XSS attack range from annoyance to compromise of user s credentials. Typically XSS attacks are used as part of larger scheme of attacks such as redirection of visitors of a trusted website to malicious websites, malware propagation, e-commerce frauds etc. IV. SQL INJECTION DETECTION AND PREVENTION In order to prevent SQL Injection attacks many existing techniques, such as Content filtering, penetration testing, and
3 defensive coding, can be used to detect and prevent a subset of the SQL Injection Vulnerabilities. Over the past years, there has been plenty of research going on in the both academic institutes as well as industries to prevent injection attacks. Following are some prevention mechanism proposed by researchers which has been seen as more effective one. A. "An Authentication Scheme using Hybrid Encryption " ( Indrani Balasundaram, E.Ramaraj )-(2011) [4]Indrani Balasundram and E.Ramaraj proposed an authentication scheme in which they propose an algorithm which uses both Advance Encryption Standard (AES) and Rivest-Shamir-Adleman(RSA) to prevent SQL injection attacks. In this method a unique secret key is fixed or assigned for every client or user. On the server side server uses private key and public key combination for RSA encryption. In this method, two level of encryption is applied on login query: To encrypt user name and password symmetric key encryption is used with the help of user s secret key. To encrypt the query the scheme uses asymmetric key encryption by using public key of the server. The whole procedure completed in three phases : Registration Phase Login Phase Verification Phase The proposed scheme is very efficient, it needs ms for encryption or decryption and this can be negligible. Some disadvantages also exist with this approach: It is not made for URL based SQL injection attacks. It is Very difficult to maintain every user secret key at server side and client side. There is no security mechanism at registration phase. B. "Effective SQL Injection Attack Reconstruction Using Network Recording"(Allen Pomeroy and Qing Tan)(2011) [5]Allen Pomeroy and Qing Tan has suggested a technique for finding vulnerabilities in Web Application such as SQL injection attack by network recording. In this approach network forensic techniques and tools are used to analyze the network packets containing get and post requests of a web application. This approach uses network based Intrusion Detection System (IDS) to trigger network recording of suspected application attacks. Some disadvantages also exist with this approach: Difficult to record high volume traffic. Packet fragmentation attack could bypass this approach. C. "Insecure Query Processing in the Delay/Fault Tolerant Mobile Sensor Network (DFT-MSN) and Mobile Peer to Peer Network"(Rahul Johari and Neelima Gupta)(2011) [6]Rahul Johari and Neelima Gupta proposed set of SQL/TIQL queries that are exchanged between the pair of nodes in the DFT-MSN and MP2PN.They also portrays their execution on Oracle 9i Enterprise Edition Release Production and expose how these SQL queries are vulnerable to the SQL Injection Attack which can either be launched manually or through the various proprietary and open source SQL Injection tools. D. "Secure Query Processing In Delay Tolerant Network Using Java Cryptography Architecture"(Rahul Johari and Neelima Gupta)(2011) [7]Rahul Johari and Neelima Gupta proposed a lightweight cryptography authentication mechanism at the source node and destination nodes of Delay Tolerant Network to prevent unauthorized modification of SQL queries during bundle transfer between nodes. The proposed method uses message digest (MD5) Hashing algorithm for encryption of data stream before it is transmitted via multiple intermediate nodes so as to reach to the destination node. E. " SQL Injection Attack Detection using the Removal of SQL Query Attribute Values"(Jeom-Goo Kim )(2011) [8]Jeom-Goo Kim presents a effective approach of removal of SQL query passed by user in SQL query attributes values. This approach uses combined static and Dynamic Analysis. The proposed method will utilize a function which has the capability to detect the attribute values of static SQL query in web application. This function also detected the SQL queries generated at runtime. This approach profile the SQL query generated from normal users and compare this with SQL query generated dynamically by the attacker. Some disadvantages also exist with this approach are: Developer learning is required. Source code adjustment is needed. F. "Dynamic Candidate Evaluations Approach to prevent SQL injection"( P. Bisht, P. Madhusudan, and V. N. Venkatakrishnan )(2010) [9]Prithvi Bisht and his team members propose a tool called Candidate evaluation for Discovering Intent Dynamically (CANDID).This method record the programmer-intended SQL query structure on any input(candidate inputs) from the legitimate user and compare this with the query structure generated with the attackers input
4 Some disadvantages also exist with this approach are: Developer learning is required. It is not possible to make a complete set of legitimate inputs for a large web application. G. "Obfuscation-based Analysis of SQL Injection Attacks"(Raju Halder and Agostino Cortesi)(2010) [10]In this method an obfuscation/deobfuscation based technique is proposed to detect SQL Injection Attacks (SQLIA) in a SQL query before sending it to database. this technique has three phases: Static phase: In the static phase, the SQL Queries in the web application code are replaced by queries in obfuscated form. Dynamic Phase: In this phase user inputs are merged with the obfuscated query at run-time. After merging dynamic verifier checks the obfuscated query at atomic formula level to detect the SQL injection attack. If no SQL injection found during the verification phase reconstruction of the original query from the obfuscated query is carried out before submitting it to the database. H. "SQL injection Detection via Automatic Test Case Generation of Programs" (Michelle Ruse, Tanmoy Sarkar, Samik Basu)(2010). [11]This approach uses automatic test case generation to detect SQL Injection Vulnerabilities. The main idea behind this framework is based on creating a specific model that deals with SQL queries automatically. It also captures the dependencies between various components of the query. The used CREST(Automatic Test Generation Tool for C) testgenerator and identify the conditions in which the queries are vulnerable. Based on the results, the methodology is shown to be able to specifically identify the causal set and obtain 85% and 69% reduction respectively while experimenting on few sample examples. I. "Combinatorial Method for Preventing SQL Injection Attacks" (R. Ezumalai, G. Aghila) 2009 [12]This approach uses both static and dynamic approach to detect SQL injection. It is a signature based SQL injection detection technique. In this approach they generate hotspots for SQL queries in web application code and divide these hotspots into tokens and send it for validation where it uses Hirschberg's algorithm, which is a divide and conquer version of the Needleman-Wunsch algorithm, used to detect SQL injection attacks. Since, it is defined at the application level, requires no change in the runtime system, and imposes a low execution overhead. J. "An Approach for SQL Injection Vulnerability Detection- AMNeSIA"(M. Junjin )(2009) [13]Analysis and Monitoring for NEutralizing SQL- Injection Attacks (AMNeSIA) is a fully automated technique for detecting and preventing SQL injection attacks. It works in two phases. Static analysis: In this phase it analyze web application code and automatically generate the SQL query mode on the basis of possible legitimate queries. Runtime analysis: In this phase it scan all dynamically generated SQL queries and checks them to be with compliance to the statically generated models in the previous step. When this step detects that a query is not matched with the query model, it classifies the input as an SQL injection attack, logs the necessary information and throws an predefined exception that the application can then deal with suitably. Principle behind AMNEeSIA: Generation Hotspots: In this step the tool analyzing the web application code by simply scanning the code and identifying the hotspots which are the locations where the SQL queries are sent for execution to the databse. SQL query model: The Application class files are given as input to JSA (Java String Analyzer). It outputs a NDFA (Non-Deterministic Finite Automata) with all character level possibilities of the strings. It further analyzes the NDFA to create a SQL query model and change it into semantically meaningful SQL keywords, operators and literal values. Instrumention of the Web Application: In this phase, AMNeSIA creates a function that checks for queries at runtime. It inserts the call to the a function before accessing the database at each place. The function call is invoked with two parameters; the SQL query that is to be submitted and the Hotspot id. Runtime Validation: During runtime, the query is sent to the runtime validation before accessing the database. The validator program parses the SQL query string into a sequence of tokens. Validator program verifies for query acceptance test by traversing the sequence of tokens. Depending on test result, it allows/restrict the database access. Limitations and Assumptions of AMNeSIA model in JSP: There is a chance to get false positives and false negatives in some situations
5 When the string analysis results in a SQL query model that is overly conservative and includes spurious queries (i.e. queries that could not be generated by the application) that happen to match an attack. When a legitimate query happens to have the same SQL structure of an attack. For example, if a developer adds conditions to a query from within a loop, an attacker who inserts an additional condition of the same type would generate a query that does not violate the SQL-query model In some cases, as the analysis cannot distinguish a variable or a hard-coded SQL token, it raises false positives for a string model that is precise enough. In particular, if the hard-coded string is used in the application to construct a SQL token, the technique will generate an incomplete SQL-query model. AMNeSIA tool makes use of Java String Analyzer (JSA) library to statically analyze the source code and thereby get the query models. Thus it can t be used for web applications other than those built on JSP such as PHP or ASP K. "Automated generation of prepared statement to remove SQL injection vulnerabilities"(stephen Thomas, Laurie Williams, Tao Xie) (2008) [14]Stephen Thomas presents an algorithm in which prepared statement in SQL queries are replaced by secure prepare statements for removing SQL vulnerabilities.prepared statements have a static structure, which prevents SQL injection attacks from changing the logical structure of a prepared statement. In this approach they created a algorithm which replaces prepared statement and a corresponding tool for automated fix generation. Then conducted four case studies of open source projects to evaluate the capability of the algorithm and its automation. The results show that algorithm correctly replaced 94% of the SQL injection vulnerabilities in these projects. V. CROSS SITE SCRIPTING (XSS) DETECTION AND PREVENTION A. "Protecting Cookies from Cross Site Script AttacksUsing Dynamic Cookies Rewriting Technique". (Rattipong Putthacharoen, Pratheep Bunyatnoparat) (2011) [15] This approach aims to change the cookies in such a way that they will become useless for XSS attacks. This technique is called "Dynamic Cookie Rewriting implemented in a web proxy where it will automatically replace the cookies with the randomized value before sending the cookie to the browser. In this way browser will keep the randomized value instead of original value sent by the web server. At the web server end the return cookie from the browser again rewritten to its original form at the web proxy before being forwarded to the web server. So in case if XSS attacks steal the cookies from the browser s database, the cookies cannot be used by the attacker to impersonate the users. This technique is not tested with HTTPs connections. B. "An Execution-flow Based Method for Detecting Cross- Site Scripting Attacks"(Qianjie Zhang, Hao Chen, Jianhua Sun )(2010) [16]Qianjie Zhang, Hao Chen, Jianhua Sun presents an execution-flow analysis for JavaScript programs running in a web browser to prevent Cross-site Scripting (XSS) attacks.in this approach they use Finite-State Automata (FSA) to model the client-side behavior of Asynchronous JavaScript and XML (AJAX) applications under normal execution. In this method system is deployed in proxy mode. In this mode the proxy analyzes the execution flow of client-side JavaScript and checks them to be with compliance to the models generated by FSA. It stops potentially malicious scripts, which do not conform to the FSA before the requested web pages arrive at the browser. This method is evaluated against many real-world web applications and the result shows that it protects against a variety of malicious scripts to prevent XSS attacks and has an acceptable performance overhead. C. "Automatic Creation of SQL Injection and Cross-site Scripting (XSS) Attacks(Ardilla)" (Adam Kie zun, Philip J. Guo, Karthick Jayaraman, Michael D. Ernst)(2010) [17] Adam Kie zun has suggested a technique for finding vulnerabilities in Web Application such as SQL injection attack and Cross site scripting (XSS).They implement this technique as an automated tool called Ardilla. This method uses static code analysis to find vulnerabilities. This technique works source code of the application, creates concrete inputs that expose vulnerabilities and operates before the application is deployed. It analyses application internals to discover vulnerabilities in the code. It is based on input generation, taint propagation, and input mutation to find variants of an execution that exploit vulnerability. This tool is designed for php applications. Some disadvantages also exist with this approach are: Developer availability and learning is required. Source code adjustment is needed. If the original developer left the project it is very difficult to patch the vulnerabilities. It is tested on PHP based applications. VI. CONCLUSIONS From the survey of various articles/papers it is found that SQL Injection and Cross-site Scripting (XSS) Attacks are most powerful and easiest attack methods on the Web
6 Application. This study presents a survey of current techniques for defending against SQL injection and XSS exploits. Our review finds that existing techniques suffer from one or more of the following five weaknesses: Inherent limitations Incomplete implementations Complex frameworks Runtime overheads Intensive manual work requirements False positives and false negatives The academic field and industry has developed promising strategies such as AMNeSIA, ARDILLA etc. products which are rising and likely to become essential parts of comprehensive online data protection strategies. Yet, despite the effectiveness of these products, we believe that their use should not excuse developers from applying preventive coding techniques, as these hold true potential when implemented properly. Keeping in view the emerging web technologies and extensive usage of highly interactive content over Internet, it is imperative for the software development houses and developers to frame and follow appropriate security framework to build security during Software Development Life Cycle. ACKNOWLEDGEMENT I wish to express sincere gratitude to the administration of Department of Information Technology Govt. of India and GGSIP University for providing the academic environment to pursue research activities. In particular I would like to thank Mr. S. S. Sarma, Scientist 'E' (CERT-In) for inputs. REFERENCES [1] retrieve on 13/01/2010 [2] [3] [4]- Indrani Balasundaram, E.Ramaraj An Authentication Scheme for Preventing SQL Injection Attack Using Hybrid Encryption(PSQLIA- HBE (ISSN X Vol.53 No.3 (2011),pp ) [5]Pomeroy, A Qing Tan Sch. of Comput. & Inf. Syst., Athabasca Univ., Athabasca, AB, Canada " Effective SQL Injection Attack Reconstruction Using Network Recording" in Computer and Information Technology (CIT), 2011 IEEE 11th International onference Issue Date: Aug Sept On page(s): [6 Johari R.,Gupta N., Insecure Query Processing in Delay/Fault Tolerant Mobile Sensor Network(DFT-MSN) and Mobile Peer to Peer Network accepted by Springer (LNCS) in Communications in Computer and Information Science (CCIS) Series,Chennai (July 2011). [7] Johari R.,Gupta N., Secure Query Processing in Delay Tolerant Network Using Java Cryptography Architecture IEEE Computational Intelligence and Communication Networks (CICN) Gwalior, India, 7-9 Oct. 201 [8]Jeom-Goo Kim; Dept. of Comput. Sci., Namseoul Univ., Cheonan, South Korea " Injection Attack Detection using the Removal of SQL Query Attribute Values" in Information Science and Applications (ICISA), 2011 International Conference Issue Date: April 2011, On page(s): 1-7 [9] P. Bisht, P. Madhusudan, and V. N. Venkatakrishnan. "CANDID:Dynamic Candidate Evaluations for Automatic Prevention of SQL Injection Attacks". ACM Trans. Inf. Syst. Secur., 13(2):1 39, [10] Raju Halder and Agostino Cortesi, Obfuscation-based Analysis of SQL Injection Attacks /10/$ IEEE [11] M. Ruse, T. Sarkar and S. Basu. "Analysis & Detection of SQL Injection Vulnerabilities via Automatic Test Case Generation of Programs." 10th Annual International Symposium on Applications and the Internet pp (2010) [12] R. Ezumalai, G. Aghila, Combinatorial Approach for Preventing SQL Injection Attacks IEEE International Advance Computing Conference (IACC 2009) Patiala, India, 6-7 March 2009 [13] M. Junjin, An Approach for SQL Injection Vulnerability Detection, Proc. of the 6th Int. Conf. on Information Technology:New Generations, Las Vegas, Nevada, pp , April [14]Stephen Thomas *, Laurie Williams, Tao Xie" On automated prepared statement generation to remove SQL injection vulnerabilities "Department of Computer Science, Box 8206, North Carolina State University, Raleigh, NC 27695, USA [15] Rattipong Putthacharoen, Pratheep Bunyatnoparat " Protecting Cookies from Cross Site Script Attacks Using Dynamic Cookies Rewriting Technique" Feb. 13~16, 2011 ICACT2011. Method for Detecting Cross-Site Scripting Attacks". [16] Qianjie Zhang, Hao Chen, Jianhua Sun An Execution-flow Based Method for Detecting Cross-Site Scripting Attacks China(2010) [17] " Automatic Creation of SQL Injection and Cross-Site Scripting Attacks "ARDILLA(Adam Kie zun, Philip J. Guo, Karthick Jayaraman, Michael D. Ernst)
Advanced Detecting and Defensive Coding Techniques to prevent SQLIAs in Web Applications: A Survey
International Journal of Science and Modern Engineering (IJISME) ISSN: 2319-6386, Volume-1, Issue-6, May 2013 Advanced Detecting and Defensive Coding Techniques to prevent SQLIAs in Web Applications: A
Web Application Security
Web Application Security John Zaharopoulos ITS - Security 10/9/2012 1 Web App Security Trends Web 2.0 Dynamic Webpages Growth of Ajax / Client side Javascript Hardening of OSes Secure by default Auto-patching
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY www.alliancetechpartners.com WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY More than 70% of all websites have vulnerabilities
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
HOD of Dept. of CSE & IT. Asst. Prof., Dept. Of CSE AIET, Lko, India. AIET, Lko, India
Volume 5, Issue 12, December 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Investigation
Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008
Detecting Web Application Vulnerabilities Using Open Source Means OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008 Kostas Papapanagiotou Committee Member OWASP Greek Chapter [email protected]
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
Client Side Filter Enhancement using Web Proxy
Client Side Filter Enhancement using Web Proxy Santosh Kumar Singh 1, Rahul Shrivastava 2 1 M Tech Scholar, Computer Technology (CSE) RCET, Bhilai (CG) India, 2 Assistant Professor, CSE Department, RCET
Toward A Taxonomy of Techniques to Detect Cross-site Scripting and SQL Injection Vulnerabilities
NCSU CSC TR 2008-4 1 Toward A Taxonomy of Techniques to Detect Cross-site Scripting and SQL Injection Vulnerabilities Yonghee SHIN, Laurie WILLIAMS, Members, IEEE Abstract Since 2002, over half of reported
INTRUSION PROTECTION AGAINST SQL INJECTION ATTACKS USING REVERSE PROXY
INTRUSION PROTECTION AGAINST SQL INJECTION ATTACKS USING REVERSE PROXY Asst.Prof. S.N.Wandre Computer Engg. Dept. SIT,Lonavala University of Pune, [email protected] Gitanjali Dabhade Monika Ghodake Gayatri
Magento Security and Vulnerabilities. Roman Stepanov
Magento Security and Vulnerabilities Roman Stepanov http://ice.eltrino.com/ Table of contents Introduction Open Web Application Security Project OWASP TOP 10 List Common issues in Magento A1 Injection
Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified
Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
elearning for Secure Application Development
elearning for Secure Application Development Curriculum Application Security Awareness Series 1-2 Secure Software Development Series 2-8 Secure Architectures and Threat Modeling Series 9 Application Security
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not
Detection and Prevention of SQL Injection Attacks
Detection and Prevention of SQL Injection Attacks 1 Sailor Pratik, 2 Prof. Jaydeep Gheewala 1 Computer Department 1 Sarvajanik College of Engineering and Technology, Surat, Gujarat, India 1 [email protected],
WEB ATTACKS AND COUNTERMEASURES
WEB ATTACKS AND COUNTERMEASURES February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
HTTPParameter Pollution. ChrysostomosDaniel
HTTPParameter Pollution ChrysostomosDaniel Introduction Nowadays, many components from web applications are commonly run on the user s computer (such as Javascript), and not just on the application s provider
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications Slides by Connor Schnaith Cross-Site Request Forgery One-click attack, session riding Recorded since 2001 Fourth out of top 25 most
How To Protect A Web Application From Attack From A Trusted Environment
Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls
The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.
This sample report is published with prior consent of our client in view of the fact that the current release of this web application is three major releases ahead in its life cycle. Issues pointed out
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
Check list for web developers
Check list for web developers Requirement Yes No Remarks 1. Input Validation 1.1) Have you done input validation for all the user inputs using white listing and/or sanitization? 1.2) Does the input validation
SQL INJECTION MONITORING SECURITY VULNERABILITIES IN WEB APPLICATIONS
SQL INJECTION MONITORING SECURITY VULNERABILITIES IN WEB APPLICATIONS Manas Kumar 1, S. Senthil kumar 2 and D. Sarvanan 3 1 M.C.A. (Final Year) Abstract Sql injection: a recently discovered application
How To Prevent An Sql Injection Attack
CHAPTER 1 PROJECT OVERVIEW 1.1 Introduction Database security is the degree to which all data is fully protected from tampering or unauthorized acts. Security vulnerability, security threat and security
Recommended Practice Case Study: Cross-Site Scripting. February 2007
Recommended Practice Case Study: Cross-Site Scripting February 2007 iii ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland Security to provide guidance for control system cyber
Client vs. Server Implementations of Mitigating XSS Security Threats on Web Applications
Journal of Basic and Applied Engineering Research pp. 50-54 Krishi Sanskriti Publications http://www.krishisanskriti.org/jbaer.html Client vs. Server Implementations of Mitigating XSS Security Threats
EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.
CENTER FOR ADVANCED SECURITY TRAINING 619 Advanced SQLi Attacks and Countermeasures Make The Difference About Center of Advanced Security Training () The rapidly evolving information security landscape
Web Application Security Assessment and Vulnerability Mitigation Tests
White paper BMC Remedy Action Request System 7.6.04 Web Application Security Assessment and Vulnerability Mitigation Tests January 2011 www.bmc.com Contacting BMC Software You can access the BMC Software
05.0 Application Development
Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development
Web applications. Web security: web basics. HTTP requests. URLs. GET request. Myrto Arapinis School of Informatics University of Edinburgh
Web applications Web security: web basics Myrto Arapinis School of Informatics University of Edinburgh HTTP March 19, 2015 Client Server Database (HTML, JavaScript) (PHP) (SQL) 1 / 24 2 / 24 URLs HTTP
External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION
External Vulnerability Assessment -Technical Summary- Prepared for: ABC ORGANIZATI On March 9, 2008 Prepared by: AOS Security Solutions 1 of 13 Table of Contents Executive Summary... 3 Discovered Security
DFW INTERNATIONAL AIRPORT STANDARD OPERATING PROCEDURE (SOP)
Title: Functional Category: Information Technology Services Issuing Department: Information Technology Services Code Number: xx.xxx.xx Effective Date: xx/xx/2014 1.0 PURPOSE 1.1 To appropriately manage
Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure
Vulnerabilities, Weakness and Countermeasures Massimo Cotelli CISSP Secure : Goal of This Talk Security awareness purpose Know the Web Application vulnerabilities Understand the impacts and consequences
Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011
Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011 Agenda Evolving Threats Operating System Application User Generated Content JPL s Application Security Program Securing
A Novel Frame Work to Detect Malicious Attacks in Web Applications
Technology, Volume-2, Issue-1, January-March, 2014, pp. 23-28, IASTER 2014, www.iaster.com, Online:2347-5099, Print:2348-0009 A Novel Frame Work to Detect Malicious Attacks in Web Applications N. Jayakanthan
Sitefinity Security and Best Practices
Sitefinity Security and Best Practices Table of Contents Overview The Ten Most Critical Web Application Security Risks Injection Cross-Site-Scripting (XSS) Broken Authentication and Session Management
IBM Protocol Analysis Module
IBM Protocol Analysis Module The protection engine inside the IBM Security Intrusion Prevention System technologies. Highlights Stops threats before they impact your network and the assets on your network
OWASP Top Ten Tools and Tactics
OWASP Top Ten Tools and Tactics Russ McRee Copyright 2012 HolisticInfoSec.org SANSFIRE 2012 10 JULY Welcome Manager, Security Analytics for Microsoft Online Services Security & Compliance Writer (toolsmith),
Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com
SAINT Integrated Network Vulnerability Scanning and Penetration Testing www.saintcorporation.com Introduction While network vulnerability scanning is an important tool in proactive network security, penetration
Enhanced Model of SQL Injection Detecting and Prevention
Enhanced Model of SQL Injection Detecting and Prevention Srinivas Baggam, Assistant Professor, Department of Computer Science and Engineering, MVGR College of Engineering, Vizianagaram, India. [email protected]
Improving Web Application Security by Eliminating CWEs Weijie Chen, China INFSY 6891 Software Assurance Professor Dr. Maurice Dawson 15 December 2015
Improving Web Application Security by Eliminating CWEs Weijie Chen, China INFSY 6891 Software Assurance Professor Dr. Maurice Dawson 15 December 2015 1 P a g e ABSTRACT This study examined improving web
A Review of Web Application Security for Preventing Cyber Crimes
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 7 (2014), pp. 699-704 International Research Publications House http://www. irphouse.com A Review of Web Application
Columbia University Web Security Standards and Practices. Objective and Scope
Columbia University Web Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Security Standards and Practices document establishes a baseline of security related requirements
Web Application Attacks and Countermeasures: Case Studies from Financial Systems
Web Application Attacks and Countermeasures: Case Studies from Financial Systems Dr. Michael Liu, CISSP, Senior Application Security Consultant, HSBC Inc Overview Information Security Briefing Web Applications
Web Vulnerability Scanner by Using HTTP Method
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 9, September 2015,
External Network & Web Application Assessment. For The XXX Group LLC October 2012
External Network & Web Application Assessment For The XXX Group LLC October 2012 This report is solely for the use of client personal. No part of it may be circulated, quoted, or reproduced for distribution
BASELINE SECURITY TEST PLAN FOR EDUCATIONAL WEB AND MOBILE APPLICATIONS
BASELINE SECURITY TEST PLAN FOR EDUCATIONAL WEB AND MOBILE APPLICATIONS Published by Tony Porterfield Feb 1, 2015. Overview The intent of this test plan is to evaluate a baseline set of data security practices
WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL. Ensuring Compliance for PCI DSS 6.5 and 6.6
WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL Ensuring Compliance for PCI DSS 6.5 and 6.6 CONTENTS 04 04 06 08 11 12 13 Overview Payment Card Industry Data Security Standard PCI Compliance for Web Applications
Application Layer Encryption: Protecting against Application Logic and Session Theft Attacks. Whitepaper
Application Layer Encryption: Protecting against Application Logic and Session Theft Attacks Whitepaper The security industry has extensively focused on protecting against malicious injection attacks like
Rational AppScan & Ounce Products
IBM Software Group Rational AppScan & Ounce Products Presenters Tony Sisson and Frank Sassano 2007 IBM Corporation IBM Software Group The Alarming Truth CheckFree warns 5 million customers after hack http://infosecurity.us/?p=5168
Web Application Security
E-SPIN PROFESSIONAL BOOK Vulnerability Management Web Application Security ALL THE PRACTICAL KNOW HOW AND HOW TO RELATED TO THE SUBJECT MATTERS. COMBATING THE WEB VULNERABILITY THREAT Editor s Summary
Cross-Site Scripting
Cross-Site Scripting (XSS) Computer and Network Security Seminar Fabrice Bodmer ([email protected]) UNIFR - Winter Semester 2006-2007 XSS: Table of contents What is Cross-Site Scripting (XSS)? Some
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
OWASP AND APPLICATION SECURITY
SECURING THE 3DEXPERIENCE PLATFORM OWASP AND APPLICATION SECURITY Milan Bruchter/Shutterstock.com WHITE PAPER EXECUTIVE SUMMARY As part of Dassault Systèmes efforts to counter threats of hacking, particularly
Detection of SQL Injection Attacks by Combining Static Analysis and Runtime Validation
Detection of SQL Injection Attacks by Combining Static Analysis and Runtime Validation Witt Yi Win, and Hnin Hnin Htun Abstract SQL injection attack is a particularly dangerous threat that exploits application
Cross Site Scripting Prevention
Project Report CS 649 : Network Security Cross Site Scripting Prevention Under Guidance of Prof. Bernard Menezes Submitted By Neelamadhav (09305045) Raju Chinthala (09305056) Kiran Akipogu (09305074) Vijaya
[state of the internet] / SEO Attacks. Threat Advisory: Continuous Uptick in SEO Attacks
TLP: GREEN Issue Date: 1.12.16 Threat Advisory: Continuous Uptick in SEO Attacks Risk Factor High The Akamai Threat Research Team has identified a highly sophisticated Search Engine Optimization (SEO)
Web Application Hacking (Penetration Testing) 5-day Hands-On Course
Web Application Hacking (Penetration Testing) 5-day Hands-On Course Web Application Hacking (Penetration Testing) 5-day Hands-On Course Course Description Our web sites are under attack on a daily basis
Using Foundstone CookieDigger to Analyze Web Session Management
Using Foundstone CookieDigger to Analyze Web Session Management Foundstone Professional Services May 2005 Web Session Management Managing web sessions has become a critical component of secure coding techniques.
Understanding Web Application Security Issues
Understanding Web Application Security Issues Pankaj Sharma January 30, 2009 Indian Computer Emergency Response Team ( CERT - IN ) Department Of Information Technology 1 Agenda Introduction What are Web
Preventing Abuse of Cookies Stolen by XSS
Preventing Abuse of Cookies Stolen by XSS Hiroya Takahashi Kenji Yasunaga Masahiro Mambo Kwangjo Kim KAIST Korea Heung Youl Youm Soonchunhyang University Korea Abstract Cross Site Scripting (XSS) makes
CSE598i - Web 2.0 Security OWASP Top 10: The Ten Most Critical Web Application Security Vulnerabilities
CSE598i - Web 2.0 Security OWASP Top 10: The Ten Most Critical Web Application Security Vulnerabilities Thomas Moyer Spring 2010 1 Web Applications What has changed with web applications? Traditional applications
ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST
ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST Performed Between Testing start date and end date By SSL247 Limited SSL247 Limited 63, Lisson Street Marylebone London
CS 558 Internet Systems and Technologies
CS 558 Internet Systems and Technologies Dimitris Deyannis [email protected] 881 Heat seeking Honeypots: Design and Experience Abstract Compromised Web servers are used to perform many malicious activities.
Introduction:... 1 Security in SDLC:... 2 Penetration Testing Methodology: Case Study... 3
Table of Contents Introduction:... 1 Security in SDLC:... 2 Penetration Testing Methodology: Case Study... 3 Information Gathering... 3 Vulnerability Testing... 7 OWASP TOP 10 Vulnerabilities:... 8 Injection
Web-Application Security
Web-Application Security Kristian Beilke Arbeitsgruppe Sichere Identität Fachbereich Mathematik und Informatik Freie Universität Berlin 29. Juni 2011 Overview Web Applications SQL Injection XSS Bad Practice
WHITE PAPER. FortiWeb Web Application Firewall Ensuring Compliance for PCI DSS 6.5 and 6.6
WHITE PAPER FortiWeb Web Application Firewall Ensuring Compliance for PCI DSS 6.5 and 6.6 Ensuring compliance for PCI DSS 6.5 and 6.6 Page 2 Overview Web applications and the elements surrounding them
CYBERTRON NETWORK SOLUTIONS
CYBERTRON NETWORK SOLUTIONS CybertTron Certified Ethical Hacker (CT-CEH) CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved CyberTron Certified
Application Security Testing. Generic Test Strategy
Application Security Testing Generic Test Strategy Page 2 of 8 Contents 1 Introduction 3 1.1 Purpose: 3 1.2 Application Security Testing: 3 2 Audience 3 3 Test Strategy guidelines 3 3.1 Authentication
ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young
ArcGIS Server Security Threats & Best Practices 2014 David Cordes Michael Young Agenda Introduction Threats Best practice - ArcGIS Server settings - Infrastructure settings - Processes Summary Introduction
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
Web Vulnerability Detection and Security Mechanism
Web Vulnerability Detection and Security Mechanism Katkar Anjali S., Kulkarni Raj B. ABSTRACT Web applications consist of several different and interacting technologies. These interactions between different
PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker
PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker www.quotium.com 1/14 Summary Abstract 3 PCI DSS Statistics 4 PCI DSS Application Security 5 How Seeker Helps You Achieve PCI DSS
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework [email protected] keralacyberforce.in Introduction Cross Site Scripting or XSS vulnerabilities have been reported and exploited since 1990s.
Web Application Penetration Testing
Web Application Penetration Testing 2010 2010 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Will Bechtel [email protected]
Chapter 1 Web Application (In)security 1
Introduction xxiii Chapter 1 Web Application (In)security 1 The Evolution of Web Applications 2 Common Web Application Functions 4 Benefits of Web Applications 5 Web Application Security 6 "This Site Is
Double guard: Detecting Interruptions in N- Tier Web Applications
Vol. 3, Issue. 4, Jul - Aug. 2013 pp-2014-2018 ISSN: 2249-6645 Double guard: Detecting Interruptions in N- Tier Web Applications P. Krishna Reddy 1, T. Manjula 2, D. Srujan Chandra Reddy 3, T. Dayakar
Web application security
Web application security Sebastian Lopienski CERN Computer Security Team openlab and summer lectures 2010 (non-web question) Is this OK? int set_non_root_uid(int uid) { // making sure that uid is not 0
Application security testing: Protecting your application and data
E-Book Application security testing: Protecting your application and data Application security testing is critical in ensuring your data and application is safe from security attack. This ebook offers
A DYNAMIC TOOL FOR DETECTION OF XSS ATTACKS IN A REAL-TIME ENVIRONMENT
A DYNAMIC TOOL FOR DETECTION OF XSS ATTACKS IN A REAL-TIME ENVIRONMENT K. G. Maheswari 1 and R. Anita 2 1 Department of MCA, Institute of Road and Transport Technology, Anna University, Erode, Tamil Nadu,
(WAPT) Web Application Penetration Testing
(WAPT) Web Application Penetration Testing Module 0: Introduction 1. Introduction to the course. 2. How to get most out of the course 3. Resources you will need for the course 4. What is WAPT? Module 1:
SECURE APPLICATION DEVELOPMENT CODING POLICY OCIO-6013-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER OCIO-6013-09 Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: TABLE OF CONTENTS Section I. PURPOSE II. AUTHORITY III. SCOPE IV. DEFINITIONS
1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications
1. Introduction 2. Web Application 3. Components 4. Common Vulnerabilities 5. Improving security in Web applications 2 What does World Wide Web security mean? Webmasters=> confidence that their site won
Cross-site site Scripting Attacks on Android WebView
IJCSN International Journal of Computer Science and Network, Vol 2, Issue 2, April 2013 1 Cross-site site Scripting Attacks on Android WebView 1 Bhavani A B 1 Hyderabad, Andhra Pradesh-500050, India Abstract
ASP.NET MVC Secure Coding 4-Day hands on Course. Course Syllabus
ASP.NET MVC Secure Coding 4-Day hands on Course Course Syllabus Course description ASP.NET MVC Secure Coding 4-Day hands on Course Secure programming is the best defense against hackers. This multilayered
Penetration Test Report
Penetration Test Report Acme Test Company ACMEIT System 26 th November 2010 Executive Summary Info-Assure Ltd was engaged by Acme Test Company to perform an IT Health Check (ITHC) on the ACMEIT System
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
An Effective Approach for Detecting and Preventing Sqlinjection Attacks
An Effective Approach for Detecting and Preventing Sqlinjection Attacks M. Roslinmary 1, S. Sivasakthi 2, A. Shenbaga Bharatha Priya 3 1, 2, 3 PG scholar, Department of IT, Dr. Sivanthi Aditanar College
Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group
Securing Your Web Application against security vulnerabilities Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group Agenda Security Landscape Vulnerability Analysis Automated Vulnerability
OWASP and OWASP Top 10 (2007 Update) OWASP. The OWASP Foundation. Dave Wichers. The OWASP Foundation. OWASP Conferences Chair dave.wichers@owasp.
and Top 10 (2007 Update) Dave Wichers The Foundation Conferences Chair [email protected] COO, Aspect Security [email protected] Copyright 2007 - The Foundation This work is available
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
