A Novel Frame Work to Detect Malicious Attacks in Web Applications



Similar documents
Web Application Security

Cross Site Scripting Prevention

Where every interaction matters.

Check list for web developers

Application Security Testing. Generic Test Strategy

Magento Security and Vulnerabilities. Roman Stepanov

Adobe Systems Incorporated

Exploitation of Cross-Site Scripting (XSS) Vulnerability on Real World Web Applications and its Defense

Client Side Filter Enhancement using Web Proxy

Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

OWASP Top Ten Tools and Tactics

Criteria for web application security check. Version

A Multi agent Scanner to Detect Stored XSS Vulnerabilities

Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP

What is Web Security? Motivation

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

CSE598i - Web 2.0 Security OWASP Top 10: The Ten Most Critical Web Application Security Vulnerabilities

Web Application Guidelines

Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

SECURE APPLICATION DEVELOPMENT CODING POLICY OCIO TABLE OF CONTENTS

BASELINE SECURITY TEST PLAN FOR EDUCATIONAL WEB AND MOBILE APPLICATIONS

1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications

Web Application Security Considerations

External Network & Web Application Assessment. For The XXX Group LLC October 2012

Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008

Client vs. Server Implementations of Mitigating XSS Security Threats on Web Applications

Acunetix Website Audit. 5 November, Developer Report. Generated by Acunetix WVS Reporter (v8.0 Build )

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Res. J. Appl. Sci. Eng. Technol., 8(5): , 2014

How To Protect A Web Application From Attack From A Trusted Environment

Last update: February 23, 2004

(WAPT) Web Application Penetration Testing

Cross Site Scripting in Joomla Acajoom Component

DIPLOMA IN WEBDEVELOPMENT

Web Vulnerability Detection and Security Mechanism

INTRUSION PROTECTION AGAINST SQL INJECTION ATTACKS USING REVERSE PROXY

05.0 Application Development

Finding Execution Faults in Dynamic Web Application

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Sitefinity Security and Best Practices

SECURITY ADVISORY. December 2008 Barracuda Load Balancer admin login Cross-site Scripting

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011

SQL INJECTION MONITORING SECURITY VULNERABILITIES IN WEB APPLICATIONS

Data Breaches and Web Servers: The Giant Sucking Sound

Security Test s i t ng Eileen Donlon CMSC 737 Spring 2008

A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

Gateway Apps - Security Summary SECURITY SUMMARY

Cross-Site Scripting

Toward A Taxonomy of Techniques to Detect Cross-site Scripting and SQL Injection Vulnerabilities

elearning for Secure Application Development

HOD of Dept. of CSE & IT. Asst. Prof., Dept. Of CSE AIET, Lko, India. AIET, Lko, India

Cyber Security Workshop Ethical Web Hacking

Detection and Prevention of SQL Injection Attacks

FORBIDDEN - Ethical Hacking Workshop Duration

Columbia University Web Security Standards and Practices. Objective and Scope

Sample Report. Security Test Plan. Prepared by Security Innovation

Webapps Vulnerability Report

The Top Web Application Attacks: Are you vulnerable?

Hacking Web Apps. Detecting and Preventing Web Application Security Problems. Jorge Blanco Alcover. Mike Shema. Technical Editor SYNGRESS

Introduction to Web Application Security. Microsoft CSO Roundtable Houston, TX. September 13 th, 2006

Recommended Practice Case Study: Cross-Site Scripting. February 2007

Passing PCI Compliance How to Address the Application Security Mandates

Web Forensic Evidence of SQL Injection Analysis

Improving Web Application Security by Eliminating CWEs Weijie Chen, China INFSY 6891 Software Assurance Professor Dr. Maurice Dawson 15 December 2015

Project 2: Web Security Pitfalls

Penetration Test Report

IJMIE Volume 2, Issue 9 ISSN:

Preprocessing Web Logs for Web Intrusion Detection

Secure Web Development Teaching Modules 1. Threat Assessment

Keyword: Cloud computing, service model, deployment model, network layer security.

Contemporary Web Application Attacks. Ivan Pang Senior Consultant Edvance Limited

Defending against XSS,CSRF, and Clickjacking David Bishop

Bank Hacking Live! Ofer Maor CTO, Hacktics Ltd. ATC-4, 12 Jun 2006, 4:30PM

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Enhanced Model of SQL Injection Detecting and Prevention

Prevent Cross-site Request Forgery: PCRF

Web Application Report

How I hacked PacketStorm ( )

WEB ATTACKS AND COUNTERMEASURES

PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker

Security of Web Applications and Browsers: Challenges and Solutions

Detection of SQL Injection and XSS Vulnerability in Web Application

ICTN Enterprise Database Security Issues and Solutions

State of The Art: Automated Black Box Web Application Vulnerability Testing. Jason Bau, Elie Bursztein, Divij Gupta, John Mitchell

Loophole+ with Ethical Hacking and Penetration Testing

Application Security: What Does it Take to Build and Test a Trusted App? John Dickson, CISSP Denim Group

Cross-site site Scripting Attacks on Android WebView

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.

Introduction: 1. Daily 360 Website Scanning for Malware

Using Foundstone CookieDigger to Analyze Web Session Management

Transcription:

Technology, Volume-2, Issue-1, January-March, 2014, pp. 23-28, IASTER 2014, www.iaster.com, Online:2347-5099, Print:2348-0009 A Novel Frame Work to Detect Malicious Attacks in Web Applications N. Jayakanthan 1, R. Sivakumar 2 1 Department of Computer Applications, Kumaraguru College of Technology, Coimbatore 2 Department of Computer Applications, SNS College of Technology, Coimbatore, India ABSTRACT The web applications are now commonly used for information sharing and high performance computation. New web applications are added every day. The attack against the web applications are so challenging. Web security is a major issue. In this paper the proposed model address various faults and attacks of web applications. The model provides a frame work Web-fault-Detector for preventing the web applications from various attacks like SQL injection attacks, cross site scripting session hijacking and web parameter tampering. Result justifies the efficiency of the model. Keywords: Web attacks, Web-Fault-Detector, SQL Injection, Session Hijacking. 1. INTRODUCTION The web attacks breaks the security of the web applications. It is a threat to manage the personal and financial information. Cross cite scripting a malicious code is injected in the web browser which breaks the client side security and allow the intruder to perform the attacks bypassing the access control. Email, websites and URLs are used for cross site scripting attacks. The databases of the web are affected by the SQL injection attacks. Using malicious SQL statement to attack the SQL databases and allow the intruder to violate the database security and access the user information. The malicious inputs are used to bypass the access control. Some types of attacks are indented to corrupt the database applications. These kind of attacks provide inconvenient to trued organization to perform their regular operation. Session hijacking is a unauthorized access of the valid user session to perform some taint operation. The attacker can access the cookies of the active session to retrieve the information. Another kind of attack the intruder inject some malicious code in the packet that is transferred between two legal entities. This attack also knows as the man in the middle attack. Web parameter tampering is the attack against various parameters used in the web transactions which perform some critical activities. By injecting malicious parameter in the transaction which configures the server setting, the attacker can degrade the server performance and shut down the server. To protect the web from the parameter tampering is most challenging issue. The proposed system address the all the issues by monitoring web transactions. And it filters the malicious activities. The system is trained to detect the malicious URL by machine learning method. 23

2. RELATED WORK The original CERT advisory describing the technique defined cross-site scripting (Often referred to as "CSS" or, to avoid confusion with the acronym for Cascading Style Sheets, "XSS") attacks are a means by which "malicious HTML tags or script in a dynamically generated page based on invalidated input from Untrustworthy sources".[1] XSS attacks are rapidly gaining attention as one of the most common weaknesses in web applications; the winner of the 2002 eweek OpenHack contest won by discovering two potential XSS vulnerabilities.[2] Mike Ter LouW and V.N. Venkatakrishnan designed a XSS defense strategy for web browsers, to protect the web browser from the untrusted content. [3] Ke Wei et al propose a technique to defend against the attacks targeted at stored procedures. This technique combines static application code analysis with runtime validation to eliminate the occurrence of such attacks.[4] A similar work has done by M.Muthuprasanna et al to detect the occurrence of SQL Injection attack[5] Adam Kieyzun et al developed can automatic technique for creating inputs that expose SQLI and XSS vulnerabilities. The technique generates sample inputs, symbolically tracks taints through execution.[6] Joshua J et al introduce an experiment named CookieMonster that can be ran against any cookie granting (i.e. session identification generation) application to test for strength of the cookie generation algorithm.[7]. Kolsek provides detailed information about exploiting vulnerable systems to web- based applications about session management, including specifics on session IDs, session fixation, fixation attack, URL arguments,hidden form fields, and cookies [8] Rupinder Gill et al [9]presents techniques for improving detection of session hijacking attacks that are passive, computationally inexpensive, reliable, and have minimal impact on network performance. Static analysis tools developed by various experts [10, 11] to detect SQL injection attacks and cross site scripting. 3. ARCHITECTURE Figure 1 shows the architecture of the proposed system. The components of the system as follows. 3.1 Supervisor Supervisor monitors all the web transactions. It is primary module of the system. It activates the all other components and protect the user from malicious transaction. It permits the genuine transactions continues it operations. 24

3.2 Analyzer It is the brain of the system. It verifies the each transaction and classifies various web attacks like Cross site scripting. SQL injection attacks, Session hijacking and malicious parameters and inform the supervisor if any of such attack detected. 3.3 Filters Supervisor activates the filter to prevent the user from malicious transaction. Filter blocks the transaction and alerts the user. After blocking the transaction it sends a acknowledgement to the supervisor. Figure 1: Web Fault Detector 3. METHODOLOGY As the part of the proposed system three new tools are developed and implemented to detect the following web attacks. 3.1 Cross Site Scripting Code injection supervisor monitors codes injected by the transactions. Even though the transactions bypass the other client side security mechanisms are easily detected by the supervisor. It alerts the system administrator during a transaction attempts to inject a code in the browser and protects the secured information maintained by the web browser. Table 1 below shows the algorithm of code injection supervisor which verify the nature of each transaction. The tool is developed and implemented. It detects various malicious codes and enhances the security of the web applications. 25

Table 1. Algorithm of Code Injection Supervisor Algorithm Code Injection supervisor ( T[1.n]) Input : T1..Tn // web Transactions Output : Blocks malicious Ti Start S1 // Start the supervisor Supervisor while (i<n) { status = S1(Ti) if status = 0 block Ti i++; } Algorithm S1 (T i ) // Verifies the nature of the code input : T k { Output : 0 (malicious Transaction) or 1 (Genuine transaction) check the nature of code T k attempts to inject if code is malicious return 0 else return 1 } 3.2 SQL Injection A new tool Query Security System (QSS) is developed. The SQL transactions which access the database are executed through QSS system. The proposed systems block the malicious SQL statements and stored procedure and prevent the databases from SQL injection attacks. QSS also checks whether the transaction the transaction violate the access control or an attempt to corrupt the database and prevent the database from such attacks. Table1 Shows a example of SQL Injection (SQLI) attack. Table2.SQL Injection Attack Select username and passwords from emp where user name = ' ' or ' 1 ' = ' 1 ' Select * from <tablename> where <field name> = ' " + fieldname+ ' " 3.3 Session Hijacking Session hijacking is a major issue in present circumstance. By stealing the cookies the attacker able to access the users secured information. To handle session hijacking in the proposed system a new tool has developed known as Session Evaluator(SE) it verify the active session and remove the cookies of expired session. This method prevents user information from intruders. 26

Table3. Algorithm of Session Evaluator Algorithm Session Evaluator ([S1.Sn]) Input : Session Output : Remove the cookies of inactive sessions and allow the active session 1. Check the Session ID 2. Compare the Session with Active Session Log 3. If session ID is not in the active log a. Identify the cookies of the session b. Remove the cookies c. Block the Session ID d. Report inactive session 4. Else If the Session ID is in Active Log a. Allow the session to continue Report the session is active 3.4 Web Parameters Parameter tampering is a approach to attack the web sites and affects its performance. The proposed system is for maintaining a profile for genuine parameters. The parameters of the various transactions are verified against the profile. If any suspicious parameters are found the system blocks the transaction and warn the user about the attack. 4. EVALUATION AND RESULTS The system has developed and implemented. In initial stage the system is trained in the limited test environment using malicious transaction using machine learning methods. The various tools of the system successfully detect malicious transaction. Table 2 shows the results. Table 4. Result of Proposed system in detecting Malicious Transaction Sl.No Nature of Attack Number of attacks detected 1 Cross site scripting 25431 2 SQL Injection attacks 37612 3 Session Hijacking 31413 4 Malicious Web parameters 12500 The system is capable of detecting various malicious web transactions. It reports a high percentage detection in SQL injection attacks. Transactions holding the malicious web parameters are very low. Figure 3 shows of the result analysis. Figure 2 Result Analysis of the Proposed System Number Attacks detected 40000 35000 30000 25000 20000 15000 10000 5000 0 Cross site scripting Result Analysis SQL Injection attacks Session Hijacking Nautre of Malicious Attack Malicious Web parameters 27

5. CONCLUSION The Malicious web transactions are major threat to the society. The tools of the proposed system Code injection supervisor(qis), Query Security System (QSS) and Session Evaluator are developed and implemented The tools detects the Cross site scripting, SQL Injection attack, Session Hijacking and Malicious web parameters. The results shows the efficiency of the system. In future the system will enhanced to detect various emerging threats in web services. REFERENCES [1] CERT Coordination Center. "CERT Advisory CA-2000-02 Malicious HTML Tags Embedded in Client Web Requests." CERT/CC Advisories. 3 February 2000. http://www.cert.org/advisories/ca-2000-02.html [2] Dyck, Timothy. OpenHack Wrap. eweek. December 2, 2002 http://www.eweek.com/article2/0,3959,748061,00.asp [3] Mike Ter Louw and V.N. Venkatakrishnan. BLUEPRINT: Robust Prevention of Cross-site Scripting Attacks for Existing Browsers Proceedings: 30th IEEE Symposium on Security and Privacy, Oakland, May 2009. [4] Ke Wei,M.Muthuprasanna and Suraj Kothari Preventing SQL Injection Attacks in Stored Procedures.ASWEC '06 Proceedings of the Australian Software Engineering Conference IEEE Computer Society Sydney April 2006. [5] M.Muthuprasanna Ke Wei, and Suraj KothariEliminating SQL Injection Attacks - A Transparent Defense Mechanism SWEC '06 Proceedings of the Australian Software Engineering Conference IEEE Computer Society Sydney April 2006. [6] Adam Kieyzun,Philip J.Karthick Jayaraman and Michael D. Ernst Guo Automatic creation of SQL Injection and cross-site scripting attacksproceeding ICSE '09 Proceedings of the 31st International Conference on Software Engineering. Hong Kong March 2009. [7] Joshua J. Pauli, Patrick H. Engebretson, Michael J. Ham, MarcCharles J. Zautke, "CookieMonster: Automated Session Hijacking Archival and Analysis," itng, pp.403-407, 2011 Eighth International Conference on Information Technology: New Generations, 2011. [8] M. Kolsek. Session Fixation Vulnerability in Webbased Application. Acros, 2007. [9] Rupinder Gill, Jason Smith and Andrew Clark Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks.acsw Frontiers '06 Proceedings of the 2006 Australasian workshops on Grid computing and e-research. Hobart, Tasmania January 2006. [10] B.Livshits and M. Lam. Finding security vulnerabilities in Java applications with static analysis. In USENIX Security, 2005. [11] G. Wassermann and Z. Su. Static detection of cross-site scripting vulnerabilities. In ICSE, 2008.[11] 28