Anomaly Detection Using Negative Security Model in Web Application
|
|
|
- Winfred Craig
- 10 years ago
- Views:
Transcription
1 Anomaly Detection Using Negative Security Model in Web Application Auxilia.M Department of Information Technology Christ College of Engineering & Technology Puducherry, India Tamilselvan.D Department of Information Technology Christ College of Engineering & Technology Puducherry, India Abstract Today s combat zone for both ethical and unethical hackers is the web. Rapid growth of web sites and web applications gives way to deliver complex business applications through the web. As the web dependency increases, so do the web hacking activities. Web applications are normally written in scripting languages like JavaScript, PHP embedded in HTML allowing connectivity to the databases, retrieving data and putting them in the WWW site. A web application is vulnerable to many kinds of threats and attacks. In order to detect known attacks, some set of attack rules and detections are needed. In this paper, a negative security model based on misuse of web applications is used. This negative security model provides a Web Application Firewall(WAF) engine with a rule set, to ensure critical protection across every web architecture. WAFs are deployed to establish an increased external security layer to detect and/or prevent attacks before they reach web applications. This paper has been tested with apache web server s log file. We have tested successfully almost all the common attacks. This paper also allows for HTTP traffic monitoring and realtime analysis with little or no changes to existing infrastructure. Keywords-; Web intrusion, web application firewall, sql injection,cross-site scripting, attacker, rule set, logging. I. INTRODUCTION The Internet services and use of web application are increasing rapidly around the world. But unfortunately it has been found easy to disturb the functionality of the Internet by attacking its infrastructure taking advantage of Internet services, and protocols. Thus hackers feel that the website and web application, in general web as the warfare. In order to hack a web application a web hacker needs the following (a) A web browser (b) An Internet connection (c) a port scanner, netcat, whisker(vulnerability checker) OpenSSL etc.. Web hacks falls under the following categories 1. URL interpretation attacks 2. Input validation attacks 3. SQL injection attacks 4. Impersonation attacks 5. Buffer overflow attacks. These attacks disallow regular services from being accessed by legitimate users. In today's world, web servers and web based applications are the popular corporate applications and become the targets of the attackers. Anomaly or misuse detection of web attacks consists of rules and descriptions. These detections do not consider pre- - defined signatures. This type of attack detections became the challenging task for the researcher's. Our proposed approach of anomaly based intrusion detection in web applications has the following features. 1. Full HTTP transaction logging is possible, allowing complete requests and responses to be logged 2. The HTTP traffic can be monitored in real time in order to detect attacks 3. Immediately prevents attacks from reaching your web applications 4. The WAF can either be deployed as a part of web server infrastructure or as a reverse proxy server in the network. The Core Rule set provides generic protection from unknown vulnerabilities often found in web applications, which are in most cases custom coded. PAPER ROADMAP Rest of the paper is organized as follows: In section 2, we have presented the related work and observations. In section 3, we have given the background of our proposed scheme. In section 4 we have given the proposed approach of attack detection. In section 5, we have given the implementation steps of our proposed approach. In Section 6, we have concluded with future work. II. RELATED WORKS The beginning of Intrusion Detection System is from the government and Ministry of Defence in 1980s [3]. The purpose of the system is to monitor network malicious behavior and was popular in the market in mid-1990s. Once an attack is being detected, based on supervised clustering technique, the system administrator is informed and can take the corrective measure [8]. A clustering algorithm for intrusion detection based on the concept of fuzzy connectedness known as FCC algorithm is also proposed[ 7] An anomaly-based system learning the profiles of the normal database access performed is also developed using a number of different models[6]. In [5], a detection system correlates the server-side programs referenced by client queries with the parameters contained in these queries. The system analyzes HTTP requests and builds data model based on the attribute length of requests, attribute character distribution, structural inference and attribute order. Based on the survey done, following observations have been made: * Limited work on anomaly based web intrusion detection; /10/$26.00 c 2010 IEEE 481
2 * Detection of SQL injection attack and HTTP overflow attacks are challenging issue for researchers; * Possibility of attack due to poor and careless web application coding by programmers. To address this evolving area of research, we propose an anomaly based intrusion detection mechanism using WAF. Next, we provide the background of our work. III. BACKGROUND Web applications typically interact with a database to retrieve persistent data and then present the data to the user as dynamically generated HTML web pages. Accordingly, user inputs are treated as secluded lexical units which, if not properly disinfected, can cause the web application to generate unintended output. Some categories of web attacks are reported below. A. Sophisticated HTTP Attacks Sophisticated HTTP attacks are one the most popular hacking techniques. The attacks are usually performed using HTTP port 80 or other HTTP communications. Web server must control port 80 to transfer an HTTP request for a web page in order to operate the website. Since the requests are processed through HTTP, attackers manipulate or change these HTTP requests to gain entry into the web server. Teamed with the legitimate entry, they get the green signal to bypass firewalls and several other security standards. Easy access to the web server assists them to pose any kind of attack. Defectively written applications are more susceptible to such attacks. B. SQL Injection Attacks SQL injection is a basically a trick to inject SQL command or query as a input mainly in the form of the POST or GET method in the web pages. Most of the websites takes parameter from the form and make SQL query to the database. With SQL injection attack, a intruder can send a crafted SQL query from the URL of the product detail page and that could possibly do lots of damage to the database. And even in worse scenario, it could even drop the database table as well. result, the malicious guy could log in to the system. Next, we present our approach which attempts to detect this attack using Web Application Firewall along with rule set. C. Cross-Site Scripting Cross-site scripting attacks occur when user input is not properly sanitized and ends up in pages sent back to users. This makes it possible for an attacker to include malicious scripts in a page by providing them as input to the page. The scripts will be no different than scripts included in pages by the website creators, and will thus have all the privileges of an ordinary script within the page such as the ability to read cookie data and session IDs. If markup such as <a href="..."> is allowed to be input by users in blog comments, forum posts, and similar places, then be aware that simply filtering out the <script> tag is not enough, as this simple example shows: <a href=" onmouseover="javascript:alert('xss Exploit!')">Innocent link</a> This link will execute the JavaScript code contained within the onmouseover attribute whenever the user hovers his mouse pointer over the link. Even if the web application replace <script>tags with their HTML-encoded version, an XSS exploit would still be possible by simply using onmouseover or any of the other related events available, such as onclick or onmousedown. IV. PROPOSED APPROACH The proposed approach is to use WAF which is deployed to establish an increased external security layer to detect and/ or prevent attacks before they reach web applications. It provides protection from a range of attacks against web applications and allows for HTTP traffic monitoring and real-time analysis with little or no changes to existing infrastructure. The WAF can be either inserted as a part of web server infrastructure or it can be deployed as a reverse proxy server in network. Figure 1 depicts the deployment of the WAF Example of SQL Injection Attack in PHP: Let s look at the usual query for user login in PHP, $sql= SELECT * FROM tbl_user WHERE username=.$_post['username']. AND password=.$_post['password']. ; $result=mysql_query($sql); Most of us think that only the valid user can log in inside the system but that s not true. But anybody can log in to that website with a simple trick.let s suppose that a intruder injected x OR x ='x in the username field and x OR x ='x in the password field. Then the final query will become like this SELECT * FROM tbl_user WHERE username= x OR x ='x AND password= x OR x ='x ; but that query is always true and returns the row from the database. As the Figure 1. Deployment of the WAF in the web server infrastructure as well as external reverse proxy server Web Application Firewall engine can provide very little protection on its own. In order to become useful, it must be configured with rules such that its advantages are fully exploited. The significance of using rule set is that it is not signature based and can provide generic protection from unknown vulnerabilities found often in a web application. To achieve this rule set use the following techniques: International Conference on Computer Information Systems and Industrial Management Applications (CISIM)
3 HTTP protection - detecting violations of the HTTP protocol and a locally defined usage policy. Common Web Attacks Protection - detecting common web application security attack. Automation detection - Detecting bots, crawlers, scanners and other surface malicious activity. Trojan Protection - Detecting access to Trojans horses. Error Hiding - Disguising error messages sent by the server. The rule set can be used along with directives. The advantage of using the directives is that the rules can be evaluated for its correctness if specific "allow" rules are need to implement or to correct any false positives in the rules as they are applied to a site. The following are some of the rules to detect some of the common attacks. A. Negative Security Model Negative security model monitors requests for anomalies, unusual behaviour, and common web application attacks. It keeps anomaly scores for each request, IP addresses, application sessions, and user accounts. Requests with high anomaly scores are either logged or rejected altogether. B. System Architecture The proposed system architecture is given below in Figure 2 Preprocessor After packets are captured, they are transferred to preprocessor for packet repacking and normalizing based on the format of each protocol. The preprocessor also analyses statistics of the network traffic and detects unregulated attacks such as deny of service and worms. IDS The IDS is the core of the proposed system. Users could download the signature database from the official website. With suitable settings detection of network attacks can be effective. If the packet captured matches any signature pattern, the system will alert an attack alarm to audit logs. Audit Logs When the system determines an attack, it will generate logs and make an alert containing related information of the attack for the administrator to remove the attack. Output Module Various output modules are supported such that users can choose suitable for different environments and objects. Default Logging SNMP traps XML Logging Syslog SMB Alerting PCAP logging SnortDb Unified Log C. Rule Set to Detect Some Attacks Some of the sample rule sets adopted are the following 1. To detect HTTP attacks the following rules are used Figure 2. Proposed System Architecture Decode the Packet PCAP library of Snort is used to capture the packets transferred/received in the LAN which contains the captured time, packet length, and link type (for example: Ethernet, FDDI etc.). It also creates a pointer pointing each packer for efficient analysis. With the inline mode, it has additional function of firewall such as packet transfer, packet modification, rejecting specific packets or dropping them. # Defeat HTTP fingerprinting # # Change server signature SecServerSignature "Microsoft-IIS/6.0" # Deny requests without a host header SecRule &REQUEST_HEADERS:Host "@eq 0" "phase:1,deny" # Deny requests without an accept header SecRule &REQUEST_HEADERS:Accept "@eq 0" "phase:1,deny" # Deny request that don't use GET, HEAD or POST SecRule REQUEST_METHOD!^(get head post)$ "phase:1,t:lowercase,deny" # Only allow HTTP version 1.0 and 1.1 SecRule REQUEST_PROTOCOL!^http/1.(0 1)$ "phase:1,t:lowercase,deny" # Add X-Powered-By header to mimic IIS Header set X-Powered-By "ASP.NET 2.0" # Remove the ETag header #Header unset ETag 2. To prevent SQL injection in Cookies the following rule is used #Prevent SQL injection in cookies 2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM) 483
4 SecFilterSelective COOKIE_VALUES "((select grant delete insert drop alter replace truncate update create rename describe)[[:space:]]+[a-z a-z 0-9 \* \,]+[[:space:]]+(from into table database index view)[[:space: ]]+[A-Z a-z 0-9 \* \,] UNION SELECT.*\'.*\'.*,[0-9].*INTO.*FROM)" "id:300011,rev:1,severity:2,msg:'generic SQL injection in cookie'" # Generic filter to prevent SQL injection attacks # Understand that all SQL filters are very limited and are very difficult # to prevent false postives and negatives. # Pplease report false positives/negatives to [email protected] SecFilterSelective REQUEST_URI "!((/wpadmin/post privmsg /ticket/admin /misc tikieditpage /post /horde3?/imp/compose /posting)\.php /modules \.php\?op=modload&name=(downloads Submit_News) /ad min\.php\?module=ns\- AddStory\&op= /index\.php\?name=pnphpbb2&file=postin g&mode=reply.* /phpmyadmin/ /PNphpBB2- posting\.html /otrs/index\.pl tikiindex\.php\?page= /index\.php\?title=.*&action=edit /_mmse rverscripts/ /node/[0-9]+/edit /_vti_bin/.*\.exe/)" "chain,id:300013,rev:1,severity:2,msg:'generic SQL injection protection'" SecFilter "((select grant delete insert drop alter replace truncate update create rename describe)[[:space:]]+[a-z a-z 0-9 \* \,]+[[:space:]]+(from into table database index vi 3. To detect cross-site scripting the following rules are used: # # Add HttpOnly flag to session cookies # SecRule RESPONSE_HEADERS:Set-Cookie "!(?i:httponly)" "phase:3,chain,pass" SecRule MATCHED_VAR "(?i:sess(ion)?id)" "setenv:session_ cookie=%{matched_var}" Header set Set-Cookie "%{SESSION_COOKIE}e; HttpOnly" env=session_cookie D. Logging Using the proposed approach, it is possible to log full HTTP transaction, allowing complete requests and responses to be logged. Here is some of the sample shots of how the request is logged ======================================== Request: [[18/May/2003:11:20: ]] "GET /cgi-bin/printenv?p1=666 \ HTTP/1.0" Handler: cgi-script GET /cgi-bin/printenv?p1=666 HTTP/1.0 Host: wkx.dyndns.org:8080 User-Agent: security regression test utility Connection: Close WAF-message: Access denied with code 406. Pattern match "666" at \ ARGS_SELECTIVE action: 406 HTTP/ Not Acceptable ======================================== A typical audit log entry may look like this: b6b-A-- [15/Jul/2005:11:56: ] G3yTd38AAAEAAAM7BLwAAAAA \ b6b-B-- POST /form.php HTTP/1.1 Host: :8080 User-Agent: Mozilla/5.0 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO ,utf-8;q=0.7,*;q=0.7 Keep-Alive: 300 Connection: keep-alive Referer: Content-Type: application/x-www-form-urlencoded Content-Length: b6b-C-- f= b6b-E (Response body) b6b-F-- HTTP/ Forbidden Last-Modified: Fri, 08 Jul :25:30 GMT ETag: "decb4-3-34b96a80" Accept-Ranges: bytes Content-Length: 19 Keep-Alive: timeout=15, max=100 Connection: Keep-Alive Content-Type: text/html b6b-H-- ETag: "decb4-3-34b96a80" Accept-Ranges: bytes Content-Length: 19 Keep-Alive: timeout=15, max=100 Connection: Keep-Alive Content-Type: text/html b6b-H-- Message: Pattern match "111" at POST_PAYLOAD \ [id "1"] [rev "2"] [msg "3"] [severity "4"] Apache-Handler: application/x-httpd-php Stopwatch: (7276* ) b6b-Z. V. IMPLEMENTATION The purpose of this paper is to modify the preprocessor in the system architecture [Refer Figure 2] to be able cooperate with the Rule Sets specified in the above section. The International Conference on Computer Information Systems and Industrial Management Applications (CISIM)
5 following functions must be implemented to achieve this. The functions are illustrated in Figure 3. could not be analyzed by simply examining the HTTP Requests. They must be examined by further analysis of their behaviors. If an http request contains web sites in the black lists, it will be determined a Web attack. The advantage is low false alert rate, but it could not detect an unknown malicious web site automatically. Examining Http Request This function mainly implements the ability to recognize the attacks toward the four major web application vulnerabilities, which include SQL Injection, Cross Site Scripting, Insecure Direct Object Reference and Cross Site Request Forgery. Result Analysis is shown in Figure 4 and Figure 5 Figure 3. Implementation Steps Normalization Since the web server log is taken as input data, which Snort could not analyze directly this paper uses off-line mode to analyze collected web server logs. First, preprocess the web server based on Apache and IIS format to get full URLs, and then put them in the Web attack engine for analysis. URL decode Before the browser sends a HTTP Request,it would first encode some symbols and Chinesewords. Therefore, it should be decoded before the analysis, which would lower false alert rate of the system. At the meanwhile, hackers usually use multi-type encoding methods to encode the malicious codes evades Intrusion Detection Systems. This function would decode URLs and then determine those that still contain encoded URLs to be Web attacks. Examining White List Many kinds of web servers have special http request pattern and different search engines such as Google, Yahoo, Msn and Baidu spiders. They can be added into the white list in the first place to analyze them, as well as those that are similar to malicious attacks but normal Http request. Examining Black List The known malicious web sites are for black list [7,11]. They are usually presented as normal files likes as js, css, and other text files, or malicious binary files that contains shell codes such as gif, ppt and pdf etc. The malicious files Figure 4. Result Analysis of Unknown Attacks Figure 5. Result Analysis of Known Attacks VI. CONCLUSION In this paper, we have presented an offline web intrusion detection mechanism using negative security model. This paper detects, mitigates or blocks almost all the common 2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM) 485
6 attacks using the web application firewall with Rule set. This paper creates awareness on creation of heightened levels of security. The observation is that it is wise to use formal software engineering methods for developing web applications. Secure coding practices must be used and thorough application testing is needed Along with the current research projects, more insight into the vulnerabilities and motivation to find a complete solution is needed. The closing thought is that There is no patch for carelessness. REFERENCES [1] [2] M. Almgren, H. Debar, M. Dacier, "A lightweight tool for detecting web server attacks", In Proceedings of the ISOC Symposium on Network and Distributed Systems Security, 2000.sytms, America,Wiley [3] Crothers,T., 2002, Implementing Intrusion Detection System, America,Willey. [4] Battachariya, Debasish Das, Utpal Sharma, A Web Based Intrusion Detection Mechanism Based on Feature Based Data Clustering, International Advance Computing Conference,2009. [5] Jung-Ying Lai, Jain-shing Wu, shih-jen Chen, Chia-Huan Wu, Chung-Huang Yang, Designing a Taxonomy of Web Attacks, International Conference on Convergence and Hybrid Information Technology,2008. [6] C. Kruegel, G. Vigna, "Anomaly Detection of Web-based Attacks",Proceedings of the 10th ACM Conference on Computer and Communication Security (CCS '03),2003, pp [7] Qiang and Vasileios Megalooikonomou, A Clustering Algorithm for Intrusion Detection. DEnLab, Temple University. [8] Rebecca Bace, Peter Mell, NIST Special publication on Intrusion Detection Systesm, 16th August [9] Sanghyun cho, Sungdeok cha, SAD, Web Session Anomaly detection based on Parameter Estimation, Computer Security,pp ,2004 [10] F. Valeur, D. Mutz, G. Vigna, "A Learning-Based Approach to the Detection of SQL Attacks", Proceedings of the Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), Austria, [11] IIS W3C Extended Log Format, International Conference on Computer Information Systems and Industrial Management Applications (CISIM)
IMPLEMENT WEB ATTACK DETECTION ENGINE WITH SNORT BY USING MODSECURITY CORE RULES
The E-Learming and Information Technology Symposium Tainan, TAIWAN, 1 April, 2009 IMPLEMENT WEB ATTACK DETECTION ENGINE WITH SNORT BY USING MODSECURITY CORE RULES Chung-Huang Yang and Chung-Hsiang Shen
Guidelines for Web applications protection with dedicated Web Application Firewall
Guidelines for Web applications protection with dedicated Web Application Firewall Prepared by: dr inŝ. Mariusz Stawowski, CISSP Bartosz Kryński, Imperva Certified Security Engineer INTRODUCTION Security
Playing with Web Application Firewalls
Playing with Web Application Firewalls DEFCON 16, August 8-10, 2008, Las Vegas, NV, USA Who is Wendel Guglielmetti Henrique? Penetration Test analyst at SecurityLabs - Intruders Tiger Team Security division
Cyber Security Workshop Ethical Web Hacking
Cyber Security Workshop Ethical Web Hacking May 2015 Setting up WebGoat and Burp Suite Hacking Challenges in WebGoat Concepts in Web Technologies and Ethical Hacking 1 P a g e Downloading WebGoat and Burp
Preprocessing Web Logs for Web Intrusion Detection
Preprocessing Web Logs for Web Intrusion Detection Priyanka V. Patil. M.E. Scholar Department of computer Engineering R.C.Patil Institute of Technology, Shirpur, India Dharmaraj Patil. Department of Computer
Acunetix Website Audit. 5 November, 2014. Developer Report. Generated by Acunetix WVS Reporter (v8.0 Build 20120808)
Acunetix Website Audit 5 November, 2014 Developer Report Generated by Acunetix WVS Reporter (v8.0 Build 20120808) Scan of http://filesbi.go.id:80/ Scan details Scan information Starttime 05/11/2014 14:44:06
Ethical Hacking as a Professional Penetration Testing Technique
Ethical Hacking as a Professional Penetration Testing Technique Rochester ISSA Chapter Rochester OWASP Chapter - Durkee Consulting, Inc. [email protected] 2 Background Founder of Durkee Consulting since 1996
Intrusion detection for web applications
Intrusion detection for web applications Intrusion detection for web applications Łukasz Pilorz Application Security Team, Allegro.pl Reasons for using IDS solutions known weaknesses and vulnerabilities
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
Introduction to Computer Security
Introduction to Computer Security Web Application Security Pavel Laskov Wilhelm Schickard Institute for Computer Science Modern threat landscape The majority of modern vulnerabilities are found in web
Contemporary Web Application Attacks. Ivan Pang Senior Consultant Edvance Limited
Contemporary Web Application Attacks Ivan Pang Senior Consultant Edvance Limited Agenda How Web Application Attack impact to your business? What are the common attacks? What is Web Application Firewall
Check list for web developers
Check list for web developers Requirement Yes No Remarks 1. Input Validation 1.1) Have you done input validation for all the user inputs using white listing and/or sanitization? 1.2) Does the input validation
Web Application Security
E-SPIN PROFESSIONAL BOOK Vulnerability Management Web Application Security ALL THE PRACTICAL KNOW HOW AND HOW TO RELATED TO THE SUBJECT MATTERS. COMBATING THE WEB VULNERABILITY THREAT Editor s Summary
Web applications. Web security: web basics. HTTP requests. URLs. GET request. Myrto Arapinis School of Informatics University of Edinburgh
Web applications Web security: web basics Myrto Arapinis School of Informatics University of Edinburgh HTTP March 19, 2015 Client Server Database (HTML, JavaScript) (PHP) (SQL) 1 / 24 2 / 24 URLs HTTP
Playing with Web Application Firewalls
Playing with Web Application Firewalls Who is Wendel? Independent penetration test analyst. Affiliated to Hackaholic team. Over 7 years in the security industry. Discovered vulnerabilities in Webmails,
Recommended Practice Case Study: Cross-Site Scripting. February 2007
Recommended Practice Case Study: Cross-Site Scripting February 2007 iii ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland Security to provide guidance for control system cyber
Implementation of Web Application Firewall
Implementation of Web Application Firewall OuTian 1 Introduction Abstract Web 層 應 用 程 式 之 攻 擊 日 趨 嚴 重, 而 國 內 多 數 企 業 仍 不 知 該 如 何 以 資 安 設 備 阻 擋, 仍 在 採 購 傳 統 的 Firewall/IPS,
Detection and mitigation of Web Services Attacks using Markov Model
Detection and mitigation of Web Services Attacks using Markov Model Vivek Relan [email protected] Bhushan Sonawane [email protected] Department of Computer Science and Engineering, University of Maryland,
THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS
THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS INCONVENIENT STATISTICS 70% of ALL threats are at the Web application layer. Gartner 73% of organizations have been hacked in the past two
EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.
CENTER FOR ADVANCED SECURITY TRAINING 619 Advanced SQLi Attacks and Countermeasures Make The Difference About Center of Advanced Security Training () The rapidly evolving information security landscape
External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION
External Vulnerability Assessment -Technical Summary- Prepared for: ABC ORGANIZATI On March 9, 2008 Prepared by: AOS Security Solutions 1 of 13 Table of Contents Executive Summary... 3 Discovered Security
Web Forensic Evidence of SQL Injection Analysis
International Journal of Science and Engineering Vol.5 No.1(2015):157-162 157 Web Forensic Evidence of SQL Injection Analysis 針 對 SQL Injection 攻 擊 鑑 識 之 分 析 Chinyang Henry Tseng 1 National Taipei University
Hack Yourself First. Troy Hunt @troyhunt troyhunt.com [email protected]
Hack Yourself First Troy Hunt @troyhunt troyhunt.com [email protected] We re gonna turn you into lean, mean hacking machines! Because if we don t, these kids are going to hack you Jake Davies, 19 (and
Client vs. Server Implementations of Mitigating XSS Security Threats on Web Applications
Journal of Basic and Applied Engineering Research pp. 50-54 Krishi Sanskriti Publications http://www.krishisanskriti.org/jbaer.html Client vs. Server Implementations of Mitigating XSS Security Threats
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young
ArcGIS Server Security Threats & Best Practices 2014 David Cordes Michael Young Agenda Introduction Threats Best practice - ArcGIS Server settings - Infrastructure settings - Processes Summary Introduction
HOD of Dept. of CSE & IT. Asst. Prof., Dept. Of CSE AIET, Lko, India. AIET, Lko, India
Volume 5, Issue 12, December 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Investigation
Mingyu Web Application Firewall (DAS- WAF) - - - All transparent deployment for Web application gateway
Mingyu Web Application Firewall (DAS- WAF) - - - All transparent deployment for Web application gateway All transparent deployment Full HTTPS site defense Prevention of OWASP top 10 Website Acceleration
Web Security Threat Report: January April 2007. Ryan C. Barnett WASC Member Project Lead: Distributed Open Proxy Honeypots
Web Security Threat Report: January April 2007 Ryan C. Barnett WASC Member Project Lead: Distributed Open Proxy Honeypots What are we reporting? We are presenting real, live web attack data captured in-the-wild.
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP Aakanksha Vijay M.tech, Department of Computer Science Suresh Gyan Vihar University Jaipur, India Mrs Savita Shiwani Head Of
IJMIE Volume 2, Issue 9 ISSN: 2249-0558
Survey on Web Application Vulnerabilities Prevention Tools Student, Nilesh Khochare* Student,Satish Chalurkar* Professor, Dr.B.B.Meshram* Abstract There are many commercial software security assurance
REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL
REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL AWF Series Web application firewalls provide industry-leading Web application attack protection, ensuring continuity
Guideline on Auditing and Log Management
CMSGu2012-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Auditing and Log Management National Computer Board Mauritius
WEB ATTACKS AND COUNTERMEASURES
WEB ATTACKS AND COUNTERMEASURES February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
Web. Services. Web Technologies. Today. Web. Technologies. Internet WWW. Protocols TCP/IP HTTP. Apache. Next Time. Lecture #3 2008 3 Apache.
JSP, and JSP, and JSP, and 1 2 Lecture #3 2008 3 JSP, and JSP, and Markup & presentation (HTML, XHTML, CSS etc) Data storage & access (JDBC, XML etc) Network & application protocols (, etc) Programming
Web Intrusion Detection with ModSecurity. Ivan Ristic <[email protected]>
Web Intrusion Detection with ModSecurity Ivan Ristic Aim of This Talk Discuss the state of Web Intrusion Detection Introduce ModSecurity Introduce an open source web application
Web Application Security
Web Application Security Richard A. Kemmerer Reliable Software Group Computer Science Department University of California Santa Barbara, CA 93106, USA http://www.cs.ucsb.edu/~rsg www.cs.ucsb.edu/~rsg/
Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion
Network Security Tampere Seminar 23rd October 2008 1 Copyright 2008 Hirschmann 2008 Hirschmann Automation and and Control GmbH. Contents Overview Switch Security Firewalls Conclusion 2 Copyright 2008 Hirschmann
Module 45 (More Web Hacking)
(More Web Hacking) In this Module, you'll lear how to use netcat to perform cursory server reconnaissance. You'll lear what a web proxy is and how it functions. You'll know how to enable your browser to
(WAPT) Web Application Penetration Testing
(WAPT) Web Application Penetration Testing Module 0: Introduction 1. Introduction to the course. 2. How to get most out of the course 3. Resources you will need for the course 4. What is WAPT? Module 1:
Sitefinity Security and Best Practices
Sitefinity Security and Best Practices Table of Contents Overview The Ten Most Critical Web Application Security Risks Injection Cross-Site-Scripting (XSS) Broken Authentication and Session Management
ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST
ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST Performed Between Testing start date and end date By SSL247 Limited SSL247 Limited 63, Lisson Street Marylebone London
Using Foundstone CookieDigger to Analyze Web Session Management
Using Foundstone CookieDigger to Analyze Web Session Management Foundstone Professional Services May 2005 Web Session Management Managing web sessions has become a critical component of secure coding techniques.
CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Web Application Firewall Technology Insight OWASP 22/2-2007. The OWASP Foundation. Joakim Sandström Role: OWASP Prospect. http://www.owasp.
Web Application Firewall Technology Insight Joakim Sandström Role: Prospect 22/2-2007 Copyright The Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the
T14 SECURITY TESTING: ARE YOU A DEER IN THE HEADLIGHTS? Ryan English SPI Dynamics Inc BIO PRESENTATION. Thursday, May 18, 2006 1:30PM
BIO PRESENTATION T14 Thursday, May 18, 2006 1:30PM SECURITY TESTING: ARE YOU A DEER IN THE HEADLIGHTS? Ryan English SPI Dynamics Inc International Conference On Software Testing Analysis and Review May
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
HTTP. Internet Engineering. Fall 2015. Bahador Bakhshi CE & IT Department, Amirkabir University of Technology
HTTP Internet Engineering Fall 2015 Bahador Bakhshi CE & IT Department, Amirkabir University of Technology Questions Q1) How do web server and client browser talk to each other? Q1.1) What is the common
WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project
WEB SECURITY Oriana Kondakciu 0054118 Software Engineering 4C03 Project The Internet is a collection of networks, in which the web servers construct autonomous systems. The data routing infrastructure
HTTP Fingerprinting and Advanced Assessment Techniques
HTTP Fingerprinting and Advanced Assessment Techniques Saumil Shah Director, Net-Square Author: Web Hacking - Attacks and Defense BlackHat 2003, Washington DC The Web Hacker s playground Web Client Web
Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011
Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011 Agenda Evolving Threats Operating System Application User Generated Content JPL s Application Security Program Securing
Cross Site Scripting Prevention
Project Report CS 649 : Network Security Cross Site Scripting Prevention Under Guidance of Prof. Bernard Menezes Submitted By Neelamadhav (09305045) Raju Chinthala (09305056) Kiran Akipogu (09305074) Vijaya
Application Layer Encryption: Protecting against Application Logic and Session Theft Attacks. Whitepaper
Application Layer Encryption: Protecting against Application Logic and Session Theft Attacks Whitepaper The security industry has extensively focused on protecting against malicious injection attacks like
Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com
SAINT Integrated Network Vulnerability Scanning and Penetration Testing www.saintcorporation.com Introduction While network vulnerability scanning is an important tool in proactive network security, penetration
How To Protect A Web Application From Attack From A Trusted Environment
Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
Web Vulnerability Scanner by Using HTTP Method
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 9, September 2015,
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability WWW Based upon HTTP and HTML Runs in TCP s application layer Runs on top of the Internet Used to exchange
Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool
Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool Mukta Garg Assistant Professor, Advanced Educational Institutions, Palwal Abstract Today s society
A B S T R A C T. Index Terms: DoubleGuard; database server; intruder; web server I INTRODUCTION
Intervention Detection System Using DoubleGuard Technique Web Application. Prof.P.M.Bhujbal, Prof.S.V.Gumaste, Mr.N.S.Jadhav, Mr.S.N.Dhage Department Of Computer Engineering Jaihind College Of Engineering,
Network- vs. Host-based Intrusion Detection
Network- vs. Host-based Intrusion Detection A Guide to Intrusion Detection Technology 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free: 800.776.2362 Fax: 678.443.6477
IBM Protocol Analysis Module
IBM Protocol Analysis Module The protection engine inside the IBM Security Intrusion Prevention System technologies. Highlights Stops threats before they impact your network and the assets on your network
Advanced Administration for Citrix NetScaler 9.0 Platinum Edition
Advanced Administration for Citrix NetScaler 9.0 Platinum Edition Course Length: 5 Days Course Code: CNS-300 Course Description This course provides the foundation to manage, configure and monitor advanced
Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified
Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI
WordPress Security Scan Configuration
WordPress Security Scan Configuration To configure the - WordPress Security Scan - plugin in your WordPress driven Blog, login to WordPress as administrator, by simply entering the url_of_your_website/wp-admin
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda 1. Introductions for new members (5 minutes) 2. Name of group 3. Current
Information Technology Policy
Information Technology Policy Enterprise Web Application Firewall ITP Number ITP-SEC004 Category Recommended Policy Contact [email protected] Effective Date January 15, 2010 Supersedes Scheduled Review
ASL IT SECURITY BEGINNERS WEB HACKING AND EXPLOITATION
ASL IT SECURITY BEGINNERS WEB HACKING AND EXPLOITATION V 2.0 A S L I T S e c u r i t y P v t L t d. Page 1 Overview: Learn the various attacks like sql injections, cross site scripting, command execution
1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications
1. Introduction 2. Web Application 3. Components 4. Common Vulnerabilities 5. Improving security in Web applications 2 What does World Wide Web security mean? Webmasters=> confidence that their site won
The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.
This sample report is published with prior consent of our client in view of the fact that the current release of this web application is three major releases ahead in its life cycle. Issues pointed out
CS 558 Internet Systems and Technologies
CS 558 Internet Systems and Technologies Dimitris Deyannis [email protected] 881 Heat seeking Honeypots: Design and Experience Abstract Compromised Web servers are used to perform many malicious activities.
Web Application Report
Web Application Report This report includes important security information about your Web Application. Security Report This report was created by IBM Rational AppScan 8.5.0.1 11/14/2012 8:52:13 AM 11/14/2012
Web Application Security
Web Application Security Ng Wee Kai Senior Security Consultant PulseSecure Pte Ltd About PulseSecure IT Security Consulting Company Part of Consortium in IDA (T) 606 Term Tender Cover most of the IT Security
Intrusion Detection Systems (IDS)
Intrusion Detection Systems (IDS) What are They and How do They Work? By Wayne T Work Security Gauntlet Consulting 56 Applewood Lane Naugatuck, CT 06770 203.217.5004 Page 1 6/12/2003 1. Introduction Intrusion
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Outline Definition of Webserver HTTP Static is no fun Software SSL. Webserver. in a nutshell. Sebastian Hollizeck. June, the 4 th 2013
Definition of in a nutshell June, the 4 th 2013 Definition of Definition of Just another definition So what is it now? Example CGI php comparison log-file Definition of a formal definition Aisaprogramthat,usingthe
A Review on Network Intrusion Detection System Using Open Source Snort
, pp.61-70 http://dx.doi.org/10.14257/ijdta.2016.9.4.05 A Review on Network Intrusion Detection System Using Open Source Snort Sakshi Sharma and Manish Dixit Department of CSE& IT MITS Gwalior, India [email protected],
CTIS 256 Web Technologies II. Week # 1 Serkan GENÇ
CTIS 256 Web Technologies II Week # 1 Serkan GENÇ Introduction Aim: to be able to develop web-based applications using PHP (programming language) and mysql(dbms). Internet is a huge network structure connecting
10 Things Every Web Application Firewall Should Provide Share this ebook
The Future of Web Security 10 Things Every Web Application Firewall Should Provide Contents THE FUTURE OF WEB SECURITY EBOOK SECTION 1: The Future of Web Security SECTION 2: Why Traditional Network Security
Cross-Site Scripting
Cross-Site Scripting (XSS) Computer and Network Security Seminar Fabrice Bodmer ([email protected]) UNIFR - Winter Semester 2006-2007 XSS: Table of contents What is Cross-Site Scripting (XSS)? Some
Divide and Conquer Real World Distributed Port Scanning
Divide and Conquer Real World Distributed Port Scanning Ofer Maor CTO Hacktics 16 Feb 2006 Hackers & Threats I, 3:25PM (HT1-302) Introduction Divide and Conquer: Real World Distributed Port Scanning reviews
EVALUATING COMMERCIAL WEB APPLICATION SECURITY. By Aaron Parke
EVALUATING COMMERCIAL WEB APPLICATION SECURITY By Aaron Parke Outline Project background What and why? Targeted sites Testing process Burp s findings Technical talk My findings and thoughts Questions Project
Why Web Applications are making a hackers life easy. Presented by Jon Grew BT SBS
Why Web Applications are making a hackers life easy. Presented by Jon Grew BT SBS Acknowledgements Ed Barlow Technical Director EMEA Ed sends his apologies. The following presentation is based on the talk
Malware Analysis Quiz 6
Malware Analysis Quiz 6 1. Are these files packed? If so, which packer? The file is not packed, as running the command strings shelll reveals a number of interesting character sequences, such as: irc.ircnet.net
Barracuda Networks Web Application Firewall
McAfee Enterprise Security Manager Data Source Configuration Guide Data Source: Barracuda Networks Web Application Firewall January 30, 2015 Barracuda Networks Web Application Firewall Page 1 of 10 Important
WSF: An HTTP-level Firewall for Hardening Web Servers
WSF: An HTTP-level Firewall for Hardening Web Servers Xin Zhao and Atul Prakash EECS Department, University of Michigan 1301 Beal Ave, Ann Arbor, MI, 48109 {zhaoxin, aprakash}@eecs.umich.edu ABSTRACT Due
A Decision Maker s Guide to Securing an IT Infrastructure
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
ICSA Labs Web Application Firewall Certification Testing Report Web Application Firewall - Version 2.1 (Corrected) Radware Inc. AppWall V5.6.4.
ICSA Labs Web Application Firewall Certification Testing Report Radware Inc. V5.6.4.1 May 30, 2013 Prepared by ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg, PA 17050 www.icsalabs.com WAFX RADWAREINC-2013-0530-01
Threat Center. Real-time multi-level threat detection, analysis, and automated remediation
Threat Center Real-time multi-level threat detection, analysis, and automated remediation Description Advanced targeted and persistent threats can easily evade standard security, software vulnerabilities
Web Application Security
Web Application Security John Zaharopoulos ITS - Security 10/9/2012 1 Web App Security Trends Web 2.0 Dynamic Webpages Growth of Ajax / Client side Javascript Hardening of OSes Secure by default Auto-patching
Web Application Vulnerabilities and Avoiding Application Exposure
Web Application Vulnerabilities and Avoiding Application Exposure The introduction of BIG-IP Application Security Manager (ASM) version 9.4.2 marks a major step forward. BIG-IP ASM now offers more features
Unit 3 Research Project. Eddie S. Jackson. Kaplan University. IT540: Management of Information Security. Kenneth L. Flick, Ph.D.
Running head: UNIT 3 RESEARCH PROJECT 1 Unit 3 Research Project Eddie S. Jackson Kaplan University IT540: Management of Information Security Kenneth L. Flick, Ph.D. 10/07/2014 UNIT 3 RESEARCH PROJECT 2
Bug Report. Date: March 19, 2011 Reporter: Chris Jarabek ([email protected])
Bug Report Date: March 19, 2011 Reporter: Chris Jarabek ([email protected]) Software: Kimai Version: 0.9.1.1205 Website: http://www.kimai.org Description: Kimai is a web based time-tracking application.
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
Monitoring System Status
CHAPTER 14 This chapter describes how to monitor the health and activities of the system. It covers these topics: About Logged Information, page 14-121 Event Logging, page 14-122 Monitoring Performance,
Global Partner Management Notice
Global Partner Management Notice Subject: Critical Vulnerabilities Identified to Alert Payment System Participants of Data Compromise Trends Dated: May 4, 2009 Announcement: To support compliance with
