METHODS FOR DETECTION AND PREVENTION OF SQL ATTACKS IN ANALYSIS OF WEB FIELD DATA
|
|
|
- Nathan Allison
- 10 years ago
- Views:
Transcription
1 Available Online at International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 4, April 2015, pg RESEARCH ARTICLE ISSN X METHODS FOR DETECTION AND PREVENTION OF SQL ATTACKS IN ANALYSIS OF WEB FIELD DATA Thiyagarajan A 1, Dr.S.Uma 2, Ambat Vipin 3, Najeem Dheen A 4 1 PG Scholar Department of Computer Science and Engineering, HIT Coimbatore 2 Head of the Department PG Department of Computer Science and Engineering, HIT Coimbatore 3 PG Scholar Department of Computer Science and Engineering, HIT Coimbatore 4 PG Scholar Department of Computer Science and Engineering, HIT Coimbatore PG DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING HINDUSTHAN INSTITUTE OF TECHNOLOGY, COIMBATORE, TAMILNADU, INDIA Abstract: A large number of vulnerability analysis approaches in web based applications detect and report on different categories of vulnerabilities. On the other hand, there is no single approach provides a generic technology independent management of web-based vulnerabilities. In view of the fact that the process of manual code reviews are extremely time-consuming, more chances for error and moreover very costly, the requirement for automated solutions has become essential. In order to overcome these security complications, it is of paramount significance to recognize the typical software defects. Similar to the majority of security vulnerabilities, SQL Injection Attacks (SQLIAs) have become known as one of the most severe attacks to the security of database-driven applications. At the same time developers place new checks in place, in the meantime attackers continue to discover new ways to circumvent these checks. In this paper, a field study is presented on two of the most extensively spread and vital web application vulnerabilities: SQL Injection and XSS. It investigates the source code of security patches of extensively used web applications written in feeble and strong kind of languages. In this research work, initially an overview of the various categories of SQL injection attacks is provided and presented a technique called AMNESIA, which automatically detects and prevents SQL injection threats. AMNESIA makes use of static analysis to construct a model of the genuine queries; an application can produce and subsequently, at execution, ensures that all queries produced by the application comply with this technique. In order to reveal the effectiveness of the proposed technique, assessed web applications and discovered different categories of SQL injection vulnerabilities. In case of both the high analysis speed and the low number of generated false positives, it confirms that this technique can be employed for performing efficient security audits. Index terms: Security, web application vulnerability, web application data, Internet applications, languages, review and evaluation, SQL injection attacks and vulnerability description. 2015, IJCSMC All Rights Reserved 657
2 I. INTRODUCTION The rapid rise of corporate web applications offers abundant opportunities for e-businesses to flourish. Web applications have become one of the most important communication channels between various kinds of service providers and clients on the Internet. However, this also raises many security issues and exacerbates the demand for practical customer-friendly solutions [1-2]. Although there are many approaches of vulnerability analysis, web applications require a more technology-independent solution. Along with the increased importance of web applications, the negative impact of security flaws in such applications has grown as well. Vulnerabilities that may lead to the compromise of sensitive information are being reported continuously to network [3]. Costs of the resulting damages are increasing. The main reasons for this phenomenon are time and financial constraints, limited programming skills, and lack of security awareness on part of the developers. In other words, systems can be compromised via web technologies, e.g. exploitation via a web script may start a security breach. Many web vulnerability classes have also been detected, classified and documented [4]. Berghe et al. [5] and Bazaz and Arthur [6] proposed different models of vulnerability taxonomy, on which new analytical methodologies may be designed and implemented. Others only concentrate research on potential classes of vulnerability: Jovanovic et al. contributed work on cross-site scripting (XSS) [7], Kals et al. [8] focus on SQL Injection. The existing approaches for mitigating threats to web applications can be divided into client-side and server-side solutions. The only client-side tool known to the authors is Noxes [9], an application-level firewall offering protection in case of suspected cross-site scripting (XSS) attacks that attempt to steal user credentials. Server-side solutions have the advantage of being able to discover a larger range of vulnerabilities, and the benefit of a security flaw fixed by the service provider is instantly propagated to all its clients. These server-side techniques can be further classified into dynamic and static approaches. Dynamic tools (e.g., [10], and Perl s taint mode) try to detect attacks while executing the audited program, whereas static analyzers [11] scan the entire web application s source code for vulnerabilities before it is deployed. The security of web applications becomes a major concern and it is receiving more and more attention from governments, corporations, and the research community. Given the preponderant role of web applications in many organizations, one can realize the importance of finding ways to reduce the number of vulnerabilities. SQL Injection Attacks (SQLIAs) have emerged as one of the most serious threats to the security of database-driven applications. In fact, the Open Web Application Security Project (OWASP), an international organization of web developers, has placed SQLIAs among the top ten vulnerabilities that a web application. This paper contributes to fill this gap by presenting a study on characteristics of source code defects generating major web application vulnerabilities. The main research goal is to understand the typical software faults that are behind the majority of web application vulnerabilities, taking into account different programming languages. Regarding the programming language perspective, focused on the most widely used weak typed language, PHP. Then, we analyzed strong typed languages, namely Java, C#, and VB. The proposed approach not only ability to prevent security vulnerabilities, but to analyze the vulnerabilities and their relation with some language characteristics, like the type system. Like most security vulnerabilities, SQLIAs can be prevented by using defensive coding. In practice however, this solution is very difficult to implement and enforce. As developers put new checks in place, attackers continue to innovate and find new ways to circumvent these checks Present AMNESIA (Analysis and Monitoring for Neutralizing SQL Injection Attacks), a fully automated technique and tool for the detection and prevention of SQLIAs.' AMNESIA was developed based on two key insights: (1) The information needed to predict the possible structure of all legitimate queries generated by a web application is contained within the application's code, and (2) An SQLIA, by injecting additional SQL statements into a query, would violate that structure. Based on these two insights developed a technique against SQL injection that combines static analysis and runtime monitoring. The structure of the paper is as follows. Section 2 presents some background on security vulnerabilities and web programming languages. Section 3 details the detection and prevention method for SQL injection attacks detection and classification the patch of each vulnerability. Section 4 discusses the results of the field study. Finally, Section 5 concludes the paper and suggests future work. 2015, IJCSMC All Rights Reserved 658
3 II. BACKGROUND KNOWLEDGE Clowes [12] discussed common security problems related to the easiness in programming with PHP and its features, but this affects many other programming languages. The choice of the type system (strong or weak) and the type checking of the programming language also affects the robustness of the software. For example, a strong typed language with a static type checking can help deliver a safer application without affecting its performance. Scholte et al. [13] presented an empirical study on a large set of input validation vulnerabilities developed in six programming languages. However, that work focused on the relationship between the specific programming language used and the vulnerabilities that are commonly reported, not going into details in what concerns the typical software faults that originate vulnerabilities, like we do in the present work. The attacker s perspective has also been of some focus in the literature [14-15], but mainly through empirical data gathered by the authors highlighting social networking and what could be obtained from attacking specific vulnerabilities. Some studies analyzed the attacks from the victim s perspective, including the proposal of taxonomy to classify attacks based on their similarities and the analysis of attack traces from HoneyPots to separate the attack types. There is, however, a lack of knowledge about existing exploits and their correlation with the vulnerabilities. According to OWASP [16], the most efficient way of finding security vulnerabilities in web applications is manual code review. This technique is very time-consuming, requires expert skills, and is prone to overlooked errors. Therefore, security society actively develops automated approaches to finding security vulnerabilities. These approaches can be divided into two wide categories: black-box and white-box testing. The first approach is based on web application analysis from the user side, assuming that source code of an application is not available [17]. The idea is to submit various malicious patterns into web application forms and to analyze its output thereafter. If any application errors are observed an assumption of possible vulnerability is made. This approach does guarantee neither accuracy nor completeness of the obtained results. The second approach is based on web application analysis from the server side, with assumption that source code of the application is available. In this case dynamic or static analysis techniques can be applied. A comprehensive survey of these techniques was made [18] by Vigna et al. Several tools and techniques have been developed to analyze vulnerabilities in webbased applications. In recent survey, Cova et al. [19] has classified vulnerability analysis of web-based applications according to detection models and analysis techniques. Analysis tools and scanners, however, are specific to web technology and practically, no single scanner provides a complete methodology to find more vulnerabilities and a technology-independent coverage of all possible SQL injection vulnerabilities in the source code with different languages. However, vulnerability description provided by tools or vulnerability databases such as Security Focus Vulnerabilities list. It does not describe the vulnerability in enough detail and a common format. III. PROPOSED DETECTION AND PREVENTION OF SQL ATTACKS METHODOLOGY Web Applications Analyzed One mandatory condition of our field study is the ability to analyze the source code of current and previous versions of the target web applications, together with the associated security patches. For the strong typed programming languages, for which used 11 web applications developed in Java, C#, and VB (see Table, Versions of Strong Typed Apps [23]) AMNESIA, (Analysis for Monitoring and NEutralizing SQL Injection Attacks) is a fully-automated and general technique for detecting and preventing all types of SQLIAs. The approach works by combining static analysis and runtime monitoring. Our two key insights behind the approach are that (1) the information needed to predict the possible structure of all legitimate queries generated by a web application is contained within the application's code, and (2) an SQLIA, by injecting additional SQL statements into a query, would violate that structure. In its static part, our technique uses program analysis to automatically build a model of the legitimate queries that could be generated by the application. In its dynamic part, our technique monitors the dynamically generated queries at runtime and checks them for compliance with the statically-generated model. Queries that violate the model represent potential SQLIAs and are reported and prevented from executing on the database. The technique consists of four main steps. A. AMNESIA Approach 1) Identify Hotspots: In this step, AMNESIA performs a simple scan of the application code to identify hotspots. In the Java language, all interactions with the database are performed through a predefined API, so identifying all the 2015, IJCSMC All Rights Reserved 659
4 hotspots is a trivial step. Scan the application code to identify hotspots points in the application code that issue SQL queries to the underlying database. 2) Build SQL-query models: In the first part, use Java String Analysis (JSA) to compute all of the possible values for each hotspot's query string. JSA computes a flow graph that abstracts away the control flow of the program and only represents string-manipulation operations performed on string variables. For each string of interest, the library analyzes the flow graph and simulates the string-manipulation operations that are performed on the string. The result is a Non- Deterministic Finite Automaton (NDFA) that expresses, at the character level, all possible values that the considered string variable can assume. Because JSA is conservative, the NDFA for a given string variable is an overestimate of all of its possible values. In the second part, we transform the NDFA computed by JSA into an SQL-query model. More precisely, we perform an analysis of the NDFA that produces another NDFA in which all of the transitions are labeled with SQL keywords, operators, or literal values. We create this model by performing a depth first traversal of the character-level NDFA and grouping characters that correspond to SQL keywords, operators, or literal values. For each hotspot, build a model that represents all the possible SQL queries that may be generated at that hotspot. A SQL-query model is a non-deterministic finite-state automaton in which the transition labels consist of SQL tokens (SQL keywords and operators), delimiters, and placeholders for string values. 3) Instrument application: Instrument the application by adding calls to the monitor that checks the queries at runtime. For each hotspot, the technique inserts a call to the monitor before the call to the database. The monitor is invoked with two parameters: the query string that is about to be submitted to the database and a unique identifier for the hotspot. Using the unique identifier, the runtime monitor is able to correlate the hotspot with the specific SQL-query model that was statically generated for that point and check the query against the correct model. At each hotspot in the application, add calls to the runtime monitor. 4) Runtime monitoring: At runtime, the application executes normally until it reaches a hotspot. At this point, the query string is sent to the runtime monitor, which parses it into a sequence of tokens according to the specific SQL syntax considered. In our parsing of the query string, the parser identifies empty string and empty numeric literals by their syntactic position, and we denote them in the parsed query string using. At runtime, check the dynamically-generated queries against the SQL-query model and reject and report queries that violate the model. From detected and prevented SQL injection attacks then performed classification for detected software faults. B. Classification of Software Faults from the Security Vulnerability Point of View After choosing a web application, searched the web for all reported SQLi and XSS patches that were classified based on the work presented in [20]. This classification is derived from the code defect types (assignment, checking, interface, and algorithm) of the ODC software fault types [21-22]. As ODC fault types are still too broad, detailed them according to the nature of the defect: missing construct, wrong construct, and extraneous construct. All the security vulnerabilities collected could be classified using only 15 of the fault types already identified and one extra fault type, the missing function call extended (MFCE); however, not all were found in both weak typed and strong typed web applications (see Table, Fault Types Observed in the Field and Corresponding ODC Fault Type [23]). The missing function call extended (marked with an * in Table 2) is a new addition and it is based on a missing function in situations where the return value is used in the code (as opposed to the MFC where the return value is not used). C. Obtaining the Patch Code For our field study, need to obtain the web application code, as well as the source code of the patches. To gather the source code of security patches, used several sources of data, such as developer sites, online magazines, news sites, sites related to security, hacker sites, change log files of the application, the version control system (VCS) repository, and so on. Next are the main sources of information 1) Security patched files: These files are applied to the application by replacing the vulnerable files. To extract only the code change that these files provide, used the UNIX diff command applied to both the patch and the original file. 2) Updated versions of the web application: This represents completely new releases of the application containing new features and fault fixes. It is necessary to compare all the files of the vulnerable and updated versions of the application looking for security fixes. This process can be eased when there is a change log file. After identifying the vulnerable source file and the fix, the UNIX diff command was used. 2015, IJCSMC All Rights Reserved 660
5 3) Security diff files: These are files containing only the code changes needed to fix a referenced vulnerability. The contents are ready to be applied to the target application using the UNIX patch command. This single file has all the information needed and not common. 4) Version control system repositories: Many applications are developed using a VCS to manage the contributions of the community of developers from around the world. Through the change log file, can identify the revisions of the application where vulnerabilities were fixed. A differential analysis using the UNIX diff command obtained the code changes that fixed the vulnerabilities. IV. EXPERIMENTATION RESULTS This section presents and discusses the results of the field study. Used the Pearson product-moment correlation (statistically significant when P < 0:05) to see the strength and direction of the relationship of two variables. A positive correlation (positive r) indicates that when one variable increases so does the other and a negative correlation (negative r) indicates that when one variable increases the other decreases. Strong correlation is when r is between 1 and 0.5; medium correlation when r is between 0.5 and 0.3; weak correlation when r is lower than 0.3. The number of samples is n. For the strong typed language, collected and classified 60 XSS and SQLi vulnerabilities, distributed over 11 web applications comparing with Table, Versions of Strong Typed Apps [23], five fault types (WVAV, WFCS, MLAC, MLOC, ELOC) were not found in this study. The data shows that MFCE is the most frequent as the majority of vulnerabilities are sanitized using functions that clean and validate the input. The high value observed may be related to the common use of specific functions to validate or clean input data. The web applications analyzed are just a small sample of the whole population so, although most of the results have statistical significance, they may lack practical significance. Observations may not apply to other applications, even for those written with the same programming languages. There are many ways and tools to develop an application and they may influence the outcome. This can also be seen from data, if take into consideration the high standard deviation values that represents the data dispersion related to the number of vulnerabilities and exploits per application (See Table, Distribution of Fault Types per Vulnerabilities [23]). Naturally, results will fit better to applications developed with the same languages analyzed, but as improvements are being introduced to those languages results may also change. V. CONCLUSION AND FUTURE WORK Web applications having become popular, wide spread and rapidly proliferated raises many security issues and exacerbates the demand for practical solutions. Number of reported web applications vulnerabilities is increasing dramatically. Manual security solutions targeted at these vulnerabilities are language-dependent, type-specific, labor-intensive, expensive and errorprone. Most of them result from improper or none input validation by the web application. SQLIAs have become one of the more serious and harmful attacks on database driven web applications. Analyzes 715 vulnerabilities and 121 exploits of 17 web applications using field data on past security fixes. Some web applications were written in a weak typed language and others in strong typed languages. In this article, have discussed the various types of SQLIAs known to date and presented AMNESIA, a fully automated technique and tool for detecting and preventing SQLIAs. AMNESIA uses static analysis to build a model of the legitimate queries that an application can generate and runtime monitoring to check the dynamically generated queries against this model. Also observed that a single fault type (MFCE) was responsible for most (76 percent) of the security problems analyzed. It see that the fault types responsible for XSS and SQLi belong to a narrow list, which points a path to the improvement of web applications, namely in the context of code inspections and the use of tools for static analysis. Results suggest that applications written with strong typed languages have a smaller number of reported vulnerabilities and exploits. In due course, hope to provide a commercializable tool to web site administrators and web developers to actively secure their applications. In future work will be extended into following directions: First of all, generalization of the model will be developed to support analysis of data flows through other data storage types or implemented by means of stored procedures and triggers. Second, special attention to development of automatic crawling mechanisms will be given. The present work will be extended to focus on the importance of the attack surface in the distribution of vulnerabilities and exploits. This may compare different results of vulnerabilities and exploits of both web applications and their add-ons, regarding their size. REFERENCES [1] K. Raina. (2004). Trends in Web Application Security [Online]. Available: [2] J. Grossman, "WhiteHat Website Security Statistics Report," WhiteHat Security, October , IJCSMC All Rights Reserved 661
6 [3] M. Dowd, J. McDonald, and J. Schuh, in The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities. Addison Wesley Professional, 2006, ch. 1, 2, 3, 4, 8, 13, 17, 18. [4] A. Nguyen-Tuong, S. Guarnieri, D. Greene, J. Shirley, and D. Evans, "Automatically Hardening Web Applications Using Precise Tainting." in Proc. The 20th IFIP International Information Security Conference, Makuhari-Messe, Chiba, Japan, 30 May - 1 June 2005 [5] C. V. Berghe, J. Riordan, and F. Piessens, "A Vulnerability Taxonomy Methodology applied to Web Services." in Proc. The 10th Nordic Workshop on Secure IT-systems (NORDSEC 2005), Tartu, Estonia, October 2005 [6] A. Bazaz, and J. D. Arthur, "Towards A Taxonomy of Vulnerabilities." in Proc. The 40th Annual Hawaii International Conference on System Sciences (HICSS ), Waikoloa, HI, USA, 3-6 January 2007, pp. 163a - 163a. [7] N. Jovanovic, C. Kruegel, and E. Kirda, "Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short paper)." in Proc.The 2006 IEEE Symposium on Security and Privacy (S&P'06), Berkeley/Oakland, California, USA, May 2006, pp [8] S. Kals, E. Kirda, C. Kruegel, and N. Jovanovic, "SecuBat: A Web Vulnerability Scanner." in Proc. The 15th International Conference on World Wide Web (WWW 2006), Edinburgh, Scotland, May 2006, pp [9] Engin Kirda, Christopher Kruegel, Giovanni Vigna, and Nenad Jovanovic. Noxes: A client-side solution for mitigating cross-site scripting attacks. In The 21st ACM Symposium on Applied Computing (SAC 2006), [10] A. Nguyen-Tuong, S. Guarnieri, D. Greene, J. Shirley, and D. Evans. Automatically hardening web applications using precise tainting. In IFIP Security 2005, [11] V. Benjamin Livshits and Monica S. Lam. Finding security errors in Java programs with static analysis. In Proceedings of the 14th Usenix Security Symposium, August [12] S. Clowes, A Study in Scarlet, Exploiting Common Vulnerabilities in PHP Applications, securereality. com.au/ studyinscarlet.txt, [13] T. Scholte et al., An Empirical Analysis of Input Validation Mechanisms, Proc. ACM Symp. Applied Computing, pp , [14] S. Clowes, A Study in Scarlet, Exploiting Common Vulnerabilities in PHP Applications, com. Au / studyinscarlet.txt, [15] M. Howard, D. LeBlanc, and J. Viega, 19 Deadly Sins of Software Security: Programming Flaws and How to Fix Them, McGraw-Hill, [16] Curphey, M., Wiesman, A., Van der Stock, A., Stirbei, R.: A Guide to Building Secure Web Applications and Web Services. OWASP (2005). [17] Andrews, M.: The State of Web Security. IEEE Security & Privacy, vol. 4, no. 4, pp (2006). [18] Cova, M., Felmetsger, V., Vigna, G.: Testing and Analysis of Web Services. Springer (2007). [19] M. Cova, V. Felmetsger, and G. Vigna: "Vulnerability Analysis of Web based Applications", in Test and Analysis of Web Services, Baresi, L., and Nitto, E.D. (Eds.) Springer Berlin Heidelberg, 2007, pp , ch. IV. Reliability, Security, and Trust. [20] J. Dura es and H. Madeira, Emulation of Software Faults: A Field Data Study and a Practical Approach, Trans. Software Eng., vol. 32, pp , [21] R. Chillarege, I.S. Bhandari, J.K. Chaar, M.J. Halliday, D. Moebus, B. Ray, and M. Wong, Orthogonal Defect Classification A Concept for In-Process Measurement, IEEE Trans. Software Eng., vol. 18, no. 11, pp , Nov [22] J. Christmansson and R. Chillarege, Generation of an Error Set That Emulates Software Faults, Proc. IEEE Fault Tolerant Computing Symp., pp , [23] Fonseca, J., Seixas, N., Vieira, M., & Madeira, H. (2014). Analysis of field data on web security vulnerabilities. Dependable and Secure Computing, IEEE Transactions on, 11(2), [24] Halfond, W. G., & Orso, A. (2007). Detection and prevention of sql injection attacks. In Malware Detection (pp ). Springer US. 2015, IJCSMC All Rights Reserved 662
Detection and Prevention of SQL Injection Attacks
Detection and Prevention of SQL Injection Attacks 1 Sailor Pratik, 2 Prof. Jaydeep Gheewala 1 Computer Department 1 Sarvajanik College of Engineering and Technology, Surat, Gujarat, India 1 [email protected],
Evaluation of Web Security Mechanisms Using Inline Scenario & Online Scenario
Evaluation of Web Security Mechanisms Using Inline Scenario & Online Scenario M. Durai Ganesh (Research Scholars) Information Technology, St. Peter s University, Chennai- 54, Tamil Nadu, India Dr. G.Gunasekaran,
A Multi agent Scanner to Detect Stored XSS Vulnerabilities
A Multi agent Scanner to Detect Stored XSS Vulnerabilities E. Galán, A. Alcaide, A. Orfila, J. Blasco University Carlos III of Madrid, UC3M Leganés, Spain {edgalan,aalcaide,adiaz,jbalis}@inf.uc3m.es Abstract
Toward A Taxonomy of Techniques to Detect Cross-site Scripting and SQL Injection Vulnerabilities
NCSU CSC TR 2008-4 1 Toward A Taxonomy of Techniques to Detect Cross-site Scripting and SQL Injection Vulnerabilities Yonghee SHIN, Laurie WILLIAMS, Members, IEEE Abstract Since 2002, over half of reported
The Devils Behind Web Application Vulnerabilities
The Devils Behind Web Application Vulnerabilities Defending against Web Application Vulnerabilities IEEE Computer, February 2012 Nuno Antunes, Marco Vieira {nmsa, mvieira}@dei.uc.pt Postgrad Colloquium
An Effective Approach for Detecting and Preventing Sqlinjection Attacks
An Effective Approach for Detecting and Preventing Sqlinjection Attacks M. Roslinmary 1, S. Sivasakthi 2, A. Shenbaga Bharatha Priya 3 1, 2, 3 PG scholar, Department of IT, Dr. Sivanthi Aditanar College
SQL INJECTION MONITORING SECURITY VULNERABILITIES IN WEB APPLICATIONS
SQL INJECTION MONITORING SECURITY VULNERABILITIES IN WEB APPLICATIONS Manas Kumar 1, S. Senthil kumar 2 and D. Sarvanan 3 1 M.C.A. (Final Year) Abstract Sql injection: a recently discovered application
Securing PHP Based Web Application Using Vulnerability Injection
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 5 (2013), pp. 391-398 International Research Publications House http://www. irphouse.com /ijict.htm Securing
An analysis on Blocking of SQL Injection Attacks by Comparing Static and Dynamic Queries
An analysis on Blocking of SQL Injection Attacks by Comparing Static and Dynamic Queries Jaskanwal Minhas Dept. of Computer Science and Engineering, Sant Baba Bhag Singh Institute of Engineering and Technology,
Securing Network Software using Static Analysis
Securing Network Software using Static Analysis Lauri Kolmonen Helsinki University of Technology [email protected] Abstract Writing network software is not easy and developing secure network software
An Automated Vulnerability Scanner for Injection Attack Based on Injection Point
An Automated Vulnerability Scanner for Injection Attack Based on Injection Point Jan-Min Chen The Dept. of Information Management Yu Da University Miaoli, Taiwan E-Mail: [email protected] Chia-Lun Wu
Protecting Database Centric Web Services against SQL/XPath Injection Attacks
Protecting Database Centric Web Services against SQL/XPath Injection Attacks Nuno Laranjeiro, Marco Vieira, and Henrique Madeira CISUC, Department of Informatics Engineering University of Coimbra, Portugal
Exploitation of Cross-Site Scripting (XSS) Vulnerability on Real World Web Applications and its Defense
Exploitation of Cross-Site Scripting (XSS) Vulnerability on Real World Web Applications and its Defense Shashank Gupta Lecturer in Department of Information Technology, Model Institute of Engineering and
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
RIPS - A static source code analyser for vulnerabilities in PHP scripts
RIPS - A static source code analyser for vulnerabilities in PHP scripts Johannes Dahse 1 Introduction The amount of websites have increased rapidly during the last years. While websites consisted mostly
ASSESSMENT OF OPEN SOURCE WEB APPLICATION SECURITY SCANNERS
ASSESSMENT OF OPEN SOURCE WEB APPLICATION SECURITY SCANNERS 1 FAKHRELDEEN ABBAS SAEED, 2 ELTYEB E. ABED ELGABAR 1,2 Asstt Prof., Department of Information Technology, College of Computer Science and Information
Security of Web Applications and Browsers: Challenges and Solutions
Security of Web Applications and Browsers: Challenges and Solutions A Tutorial Proposal for ACM SAC 2015 By Dr. Hossain Shahriar Department of Computer Science Kennesaw State University Kennesaw, GA 30144,
How To Prevent An Sql Injection Attack
CHAPTER 1 PROJECT OVERVIEW 1.1 Introduction Database security is the degree to which all data is fully protected from tampering or unauthorized acts. Security vulnerability, security threat and security
Res. J. Appl. Sci. Eng. Technol., 8(5): 658-663, 2014
Research Journal of Applied Sciences, Engineering and Technology 8(5): 658-663, 2014 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2014 Submitted: May 09, 2014 Accepted: June 16,
Preventing SQL Injection through Automatic Query Sanitization with ASSIST
Preventing SQL Injection through Automatic Query Sanitization with ASSIST Raymond Mui Polytechnic Institute of NYU 6 Metrotech Center Brooklyn, NY, 11201, USA [email protected] Phyllis Frankl Polytechnic
Detection of DOM-based Cross-Site Scripting by Analyzing Dynamically Extracted Scripts
Detection of DOM-based Cross-Site Scripting by Analyzing Dynamically Extracted Scripts Suman Saha 1, Shizhen Jin 2,3 and Kyung-Goo Doh 3 1 LIP6-Regal, France [email protected] 2 GTOne, Seoul, Korea [email protected]
CHAPTER 5 INTELLIGENT TECHNIQUES TO PREVENT SQL INJECTION ATTACKS
66 CHAPTER 5 INTELLIGENT TECHNIQUES TO PREVENT SQL INJECTION ATTACKS 5.1 INTRODUCTION In this research work, two new techniques have been proposed for addressing the problem of SQL injection attacks, one
Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group
Securing Your Web Application against security vulnerabilities Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group Agenda Security Landscape Vulnerability Analysis Automated Vulnerability
Classification of SQL Injection Attacks Using SVM Classifier
Classification of SQL Injection Attacks Using SVM Classifier Priti Sonare 1, Sumit Dhariwal 2 and Megha Kamble 3 Excellence,Bhopal, India 1 Excellence,Bhopal, India 2 Excellence,Bhopal, India 3 [email protected]
05.0 Application Development
Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development
How I hacked PacketStorm (1988-2000)
Outline Recap Secure Programming Lecture 8++: SQL Injection David Aspinall, Informatics @ Edinburgh 13th February 2014 Overview Some past attacks Reminder: basics Classification Injection route and motive
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
How to achieve PCI DSS Compliance with Checkmarx Source Code Analysis
How to achieve PCI DSS Compliance with Checkmarx Source Code Analysis Document Scope This document aims to assist organizations comply with PCI DSS 3 when it comes to Application Security best practices.
Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011
Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011 Agenda Evolving Threats Operating System Application User Generated Content JPL s Application Security Program Securing
WEB APPLICATION VULNERABILITY STATISTICS (2013)
WEB APPLICATION VULNERABILITY STATISTICS (2013) Page 1 CONTENTS Contents 2 1. Introduction 3 2. Research Methodology 4 3. Summary 5 4. Participant Portrait 6 5. Vulnerability Statistics 7 5.1. The most
5 Simple Steps to Secure Database Development
E-Guide 5 Simple Steps to Secure Database Development Databases and the information they hold are always an attractive target for hackers looking to exploit weaknesses in database applications. This expert
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
Client vs. Server Implementations of Mitigating XSS Security Threats on Web Applications
Journal of Basic and Applied Engineering Research pp. 50-54 Krishi Sanskriti Publications http://www.krishisanskriti.org/jbaer.html Client vs. Server Implementations of Mitigating XSS Security Threats
En efficient approaches for statistics Organization for SQL Injection Attacks Using SVM Classifier
En efficient approaches for statistics Organization for SQL Injection Attacks Using SVM Classifier ABSTRACT Preeti Sonare 1,Sumit Dhariwal 2 1 Department of Computer science &Engineering Sagar Institute
Web Vulnerability Scanner by Using HTTP Method
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 9, September 2015,
PROP - PATRONAGE OF PHP WEB APPLICATIONS
PROP - PATRONAGE OF PHP WEB APPLICATIONS ABSTRACT Sireesha C 1, Jyostna G 2, Raghu Varan P 3 and P R L Eswari 4 Centre for Development of Advanced Computing, Hyderabad, India PHP is one of the most commonly
INTRUSION PROTECTION AGAINST SQL INJECTION ATTACKS USING REVERSE PROXY
INTRUSION PROTECTION AGAINST SQL INJECTION ATTACKS USING REVERSE PROXY Asst.Prof. S.N.Wandre Computer Engg. Dept. SIT,Lonavala University of Pune, [email protected] Gitanjali Dabhade Monika Ghodake Gayatri
IJMIE Volume 2, Issue 9 ISSN: 2249-0558
Survey on Web Application Vulnerabilities Prevention Tools Student, Nilesh Khochare* Student,Satish Chalurkar* Professor, Dr.B.B.Meshram* Abstract There are many commercial software security assurance
DETECTION AND PREVENTION OF TAUTOLOGY AND UNION QUERY BASED SQL INJECTION ATTACKS
DETECTION AND PREVENTION OF TAUTOLOGY AND UNION QUERY BASED SQL INJECTION ATTACKS Jyoti Agrawal 1, Mukesh Gupta 2 1,2 Dept. of Computer Science, SKIT, (India) ABSTRACT Web applications are pervasive and
A Novel Frame Work to Detect Malicious Attacks in Web Applications
Technology, Volume-2, Issue-1, January-March, 2014, pp. 23-28, IASTER 2014, www.iaster.com, Online:2347-5099, Print:2348-0009 A Novel Frame Work to Detect Malicious Attacks in Web Applications N. Jayakanthan
Cross Site Scripting Prevention
Project Report CS 649 : Network Security Cross Site Scripting Prevention Under Guidance of Prof. Bernard Menezes Submitted By Neelamadhav (09305045) Raju Chinthala (09305056) Kiran Akipogu (09305074) Vijaya
Cross-site site Scripting Attacks on Android WebView
IJCSN International Journal of Computer Science and Network, Vol 2, Issue 2, April 2013 1 Cross-site site Scripting Attacks on Android WebView 1 Bhavani A B 1 Hyderabad, Andhra Pradesh-500050, India Abstract
HOD of Dept. of CSE & IT. Asst. Prof., Dept. Of CSE AIET, Lko, India. AIET, Lko, India
Volume 5, Issue 12, December 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Investigation
Reducing Application Vulnerabilities by Security Engineering
Reducing Application Vulnerabilities by Security Engineering - Subash Newton Manager Projects (Non Functional Testing, PT CoE Group) 2008, Cognizant Technology Solutions. All Rights Reserved. The information
LASTLINE WHITEPAPER. Large-Scale Detection of Malicious Web Pages
LASTLINE WHITEPAPER Large-Scale Detection of Malicious Web Pages Abstract Malicious web pages that host drive-by-download exploits have become a popular means for compromising hosts on the Internet and,
Font Level Tainting: Another Approach for Preventing SQL Injection Attacks
International Journal of Computer Applications in Engineering Sciences [VOL I, ISSUE IV, DECEMBER 2011] [ISSN: 2231-4946] Font Level Tainting: Another Approach for Preventing SQL Injection Attacks V. Krishna
Detection of SQL Injection Attacks by Combining Static Analysis and Runtime Validation
Detection of SQL Injection Attacks by Combining Static Analysis and Runtime Validation Witt Yi Win, and Hnin Hnin Htun Abstract SQL injection attack is a particularly dangerous threat that exploits application
WEB APPLICATION VULNERABILITY DETECTION USING DYNAMIC ANALYSIS WITH PENETERATION TESTING
WEB APPLICATION VULNERABILITY DETECTION USING DYNAMIC ANALYSIS WITH PENETERATION TESTING Sreenivasa Rao B 1 Dept. of Computer Science & Engineering CMJ University, Shillong, India Kumar N 2 Dept. of Computer
A heuristic-based approach for detecting SQL-injection vulnerabilities in Web applications [Position paper]
A heuristic-based approach for detecting SQL-injection vulnerabilities in Web applications [Position paper] Angelo Ciampa Dept. of Engineering-RCOST, Univ. Of Sannio, Italy [email protected] Corrado
A clustering Approach for Web Vulnerabilities Detection
A clustering Approach for Web Vulnerabilities Detection Mohamed Kaâniche Rim Akrout, Eric Alata, Yann Bachy, Anthony Dessiatnikoff, Vincent Nicome?e Design and Assessment of application Level Intrusion
Application Code Development Standards
Application Code Development Standards Overview This document is intended to provide guidance to campus system owners and software developers regarding secure software engineering practices. These standards
Finding Execution Faults in Dynamic Web Application
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 5 (2014), pp. 445-452 International Research Publications House http://www. irphouse.com /ijict.htm Finding
External Network & Web Application Assessment. For The XXX Group LLC October 2012
External Network & Web Application Assessment For The XXX Group LLC October 2012 This report is solely for the use of client personal. No part of it may be circulated, quoted, or reproduced for distribution
Adobe Systems Incorporated
Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...
Web Forensic Evidence of SQL Injection Analysis
International Journal of Science and Engineering Vol.5 No.1(2015):157-162 157 Web Forensic Evidence of SQL Injection Analysis 針 對 SQL Injection 攻 擊 鑑 識 之 分 析 Chinyang Henry Tseng 1 National Taipei University
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
HTTPParameter Pollution. ChrysostomosDaniel
HTTPParameter Pollution ChrysostomosDaniel Introduction Nowadays, many components from web applications are commonly run on the user s computer (such as Javascript), and not just on the application s provider
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
A B S T R A C T. Index Terms: DoubleGuard; database server; intruder; web server I INTRODUCTION
Intervention Detection System Using DoubleGuard Technique Web Application. Prof.P.M.Bhujbal, Prof.S.V.Gumaste, Mr.N.S.Jadhav, Mr.S.N.Dhage Department Of Computer Engineering Jaihind College Of Engineering,
How To Prevent A Cross Site Scripting Attack On A Web Browser From Being Successful
39 CHAPTER 2 LITERATURE REVIEW 2.1 INTRODUCTION A threat is any circumstance or event with the potential to cause harm to an application through the disclosure, modification or destruction of information,
SQLAS: TOOL TO DETECT AND PREVENT ATTACKS IN PHP WEB APPLICATIONS
SQLAS: TOOL TO DETECT AND PREVENT ATTACKS IN PHP WEB APPLICATIONS Vandana Dwivedi 1, Himanshu Yadav 2 and Anurag Jain 3 1 Department of Computer Science & Engineering, RITS,Bhopal (India) 2 Department
A DYNAMIC TOOL FOR DETECTION OF XSS ATTACKS IN A REAL-TIME ENVIRONMENT
A DYNAMIC TOOL FOR DETECTION OF XSS ATTACKS IN A REAL-TIME ENVIRONMENT K. G. Maheswari 1 and R. Anita 2 1 Department of MCA, Institute of Road and Transport Technology, Anna University, Erode, Tamil Nadu,
Automating Security Testing. Mark Fallon Senior Release Manager Oracle
Automating Security Testing Mark Fallon Senior Release Manager Oracle Some Ground Rules There are no silver bullets You can not test security into a product Testing however, can help discover a large percentage
Web Application Security
Web Application Security Richard A. Kemmerer Reliable Software Group Computer Science Department University of California Santa Barbara, CA 93106, USA http://www.cs.ucsb.edu/~rsg www.cs.ucsb.edu/~rsg/
Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008
Detecting Web Application Vulnerabilities Using Open Source Means OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008 Kostas Papapanagiotou Committee Member OWASP Greek Chapter [email protected]
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY www.alliancetechpartners.com WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY More than 70% of all websites have vulnerabilities
Development and Industrial Application of Multi-Domain Security Testing Technologies. Innovation Sheet Model Inference Assisted Evolutionary Fuzzing
Development and Industrial Application of Multi-Domain Security Testing Technologies Innovation Sheet Model Inference Assisted Evolutionary Fuzzing Description The technique dynamically analyzes the application
Detection and mitigation of Web Services Attacks using Markov Model
Detection and mitigation of Web Services Attacks using Markov Model Vivek Relan [email protected] Bhushan Sonawane [email protected] Department of Computer Science and Engineering, University of Maryland,
ETHICAL HACKING 010101010101APPLICATIO 00100101010WIRELESS110 00NETWORK1100011000 101001010101011APPLICATION0 1100011010MOBILE0001010 10101MOBILE0001
001011 1100010110 0010110001 010110001 0110001011000 011000101100 010101010101APPLICATIO 0 010WIRELESS110001 10100MOBILE00010100111010 0010NETW110001100001 10101APPLICATION00010 00100101010WIRELESS110
Rational AppScan & Ounce Products
IBM Software Group Rational AppScan & Ounce Products Presenters Tony Sisson and Frank Sassano 2007 IBM Corporation IBM Software Group The Alarming Truth CheckFree warns 5 million customers after hack http://infosecurity.us/?p=5168
Web application security: automated scanning versus manual penetration testing.
Web application security White paper January 2008 Web application security: automated scanning versus manual penetration testing. Danny Allan, strategic research analyst, IBM Software Group Page 2 Contents
Analysis of SQL injection prevention using a proxy server
Computer Science Honours 2005 Project Proposal Analysis of SQL injection prevention using a proxy server By David Rowe Supervisor: Barry Irwin Department of Computer
The Evolution of Enterprise Application Security. Why enterprises need runtime application self-protection
The Evolution of Enterprise Application Security Why enterprises need runtime application self-protection 2 Abstract Enterprise information security encompasses a broad set of disciplines and technologies,
Security Test s i t ng Eileen Donlon CMSC 737 Spring 2008
Security Testing Eileen Donlon CMSC 737 Spring 2008 Testing for Security Functional tests Testing that role based security functions correctly Vulnerability scanning and penetration tests Testing whether
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
Prevent Cross-site Request Forgery: PCRF
Prevent Cross-site Request Forgery: PCRF Sooel Son University of Texas, Austin [email protected] Abstract CSRF attacks are one of the most prevalent and dangerous web threats at the level of XSS, SQL
Java Program Vulnerabilities
Java Program Vulnerabilities Sheetal Thakare, Dr.B.B.Meshram Abstract The Java programming language provides a lot of security features, build directly into the language and also supplied by security relevant
THE EVOLUTION OF ENTERPRISE APPLICATION SECURITY
THE EVOLUTION OF ENTERPRISE APPLICATION SECURITY THE EVOLUTION OF ENTERPRISE APPLICATION SECURITY Why enterprises need runtime application self-protection 2 ABSTRACT Enterprise information security encompasses
Introduction: 1. Daily 360 Website Scanning for Malware
Introduction: SiteLock scans your website to find and fix any existing malware and vulnerabilities followed by using the protective TrueShield firewall to keep the harmful traffic away for good. Moreover
Real-Time Analysis of Non-stationary and Complex Network Related Data for Injection Attempts Detection
Real-Time Analysis of Non-stationary and Complex Network Related Data for Injection Attempts Detection Micha l Choraś 12, Rafa l Kozik 2 1 ITTI Ltd., Poznań, Poland [email protected] 2 Institute of Telecommunications,
The Web AppSec How-to: The Defenders Toolbox
The Web AppSec How-to: The Defenders Toolbox Web application security has made headline news in the past few years. Incidents such as the targeting of specific sites as a channel to distribute malware
Double guard: Detecting Interruptions in N- Tier Web Applications
Vol. 3, Issue. 4, Jul - Aug. 2013 pp-2014-2018 ISSN: 2249-6645 Double guard: Detecting Interruptions in N- Tier Web Applications P. Krishna Reddy 1, T. Manjula 2, D. Srujan Chandra Reddy 3, T. Dayakar
WHITEPAPER. Nessus Exploit Integration
Nessus Exploit Integration v2 Tenable Network Security has committed to providing context around vulnerabilities, and correlating them to other sources, such as available exploits. We currently pull information
DFW INTERNATIONAL AIRPORT STANDARD OPERATING PROCEDURE (SOP)
Title: Functional Category: Information Technology Services Issuing Department: Information Technology Services Code Number: xx.xxx.xx Effective Date: xx/xx/2014 1.0 PURPOSE 1.1 To appropriately manage
A Review of Web Application Security for Preventing Cyber Crimes
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 7 (2014), pp. 699-704 International Research Publications House http://www. irphouse.com A Review of Web Application
IT Security & Compliance. On Time. On Budget. On Demand.
IT Security & Compliance On Time. On Budget. On Demand. IT Security & Compliance Delivered as a Service For businesses today, managing IT security risk and meeting compliance requirements is paramount
Expert Services Group (Security Testing) Nilesh Dasharathi Sadaf Kazi Aztecsoft Limited
Practical Aspects of Web Application Penetration Testing & Vulnerability Analysis Expert Services Group (Security Testing) Nilesh Dasharathi Sadaf Kazi Aztecsoft Limited Presentation Path Motivation Penetration
Columbia University Web Security Standards and Practices. Objective and Scope
Columbia University Web Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Security Standards and Practices document establishes a baseline of security related requirements
Using Web Security Scanners to Detect Vulnerabilities in Web Services
FACULDADE DE CIÊNCIAS E TECNOLOGIA DA UNIVERSIDADE DE COIMBRA DEPARTAMENTO DE ENGENHARIA INFORMÁTICA Using Web Security Scanners to Detect Vulnerabilities in Web Services Marco Vieira Nuno Antunes Henrique
Adobe ColdFusion. Secure Profile Web Application Penetration Test. July 31, 2014. Neohapsis 217 North Jefferson Street, Suite 200 Chicago, IL 60661
Adobe ColdFusion Secure Profile Web Application Penetration Test July 31, 2014 Neohapsis 217 North Jefferson Street, Suite 200 Chicago, IL 60661 Chicago Dallas This document contains and constitutes the
Application security testing: Protecting your application and data
E-Book Application security testing: Protecting your application and data Application security testing is critical in ensuring your data and application is safe from security attack. This ebook offers
Implementation of Web Application Security Solution using Open Source Gaurav Gupta 1, B. K. Murthy 2, P. N. Barwal 3
Implementation of Web Application Security Solution using Open Source Gaurav Gupta 1, B. K. Murthy 2, P. N. Barwal 3 ABSTRACT 1 Project Engineer, CDACC-56/1, Sector-62, Noida, 2 Executive Director, CDACC-56/1,
Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications
Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications Davide Balzarotti, Marco Cova, Vika Felmetsger, Nenad Jovanovic, Engin Kirda, Christopher Kruegel, and Giovanni
