Customizing OWASP ZAP: A Proven Method for Detecting SQL Injection Vulnerabilities

被引:0
|
作者
Alazmi, Suliman [1 ]
de Leon, Daniel Conte [1 ]
机构
[1] Univ Idaho, Dept Comp Sci, Moscow, ID 83843 USA
关键词
OWASP ZAP; Error-based SQLi; Union -based SQLi; Time -based blind SQLi; Authentication Bypass SQLi;
D O I
10.1109/BigDataSecurity-HPSC-IDS58521.2023.00028
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
web applications become increasingly popular for offering data and services among businesses and organizations they also become more susceptible to security risks. Many organizations rely today on Web Vulnerability Scanners (WVSs) to identify vulnerabilities in their web applications. However, one of the most prevalent types of web application vulnerabilities, SQL Injections (SQLi), can often go undetected by WVSs. OWASP ZAP is an open-source web vulnerability scanner that allows security professionals to develop rules to improve vulnerability detection capability. In this paper, a new method is proposed to improve the detection capability of OWASP ZAP for SQLi. We aim to accurately detect the four major types of SQLi: Error-based, Union -based, Time -based blind, and Authentication Bypass. We implemented this new method using OWASP ZAP detection policies. The method was tested against two benchmark vulnerable web applications, Mutillidae and WebGoat, and was shown to significantly improve the detection of SQL injection attacks.
引用
收藏
页码:102 / 106
页数:5
相关论文
共 50 条
  • [1] Detecting SQL Injection Vulnerabilities in Web Services
    Antunes, Nuno
    Vieira, Marco
    LADC: 2009 4TH LATIN-AMERICAN SYMPOSIUM ON DEPENDABLE COMPUTING, 2009, : 17 - 24
  • [2] A Mutation Approach of Detecting SQL Injection Vulnerabilities
    Huang, Yanyu
    Fu, Chuan
    Chen, Xuan
    Guo, Hao
    He, Xiaoyu
    Li, Jin
    Liu, Zheli
    CLOUD COMPUTING AND SECURITY, PT II, 2017, 10603 : 175 - 188
  • [3] Detecting Various SQL Injection Vulnerabilities using String Matching and LCS Method
    Anitha, V
    Lakshmi, Supha A.
    Revathi, M.
    Selvi, K.
    2014 SIXTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, 2014, : 237 - 241
  • [4] A static analysis framework for detecting SQL injection vulnerabilities
    Fu, Xiang
    Lu, Xin
    Peltsverger, Boris
    Chen, Shijun
    Qian, Kai
    Tao, Lixin
    COMPSAC 2007: THE THIRTY-FIRST ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL I, PROCEEDINGS, 2007, : 87 - +
  • [5] Detecting SQL Injection Vulnerabilities Using Nature-inspired Algorithms
    Baptista, Kevin
    Bernardino, Anabela Moreira
    Bernardino, Eugenia Moreira
    COMPUTATIONAL SCIENCE, ICCS 2022, PT IV, 2022, : 451 - 457
  • [6] A Rejection-Based Approach for Detecting SQL Injection Vulnerabilities in Web Applications
    Saoudi, Lalia
    Adi, Kamel
    Boudraa, Younes
    FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2019, 2020, 12056 : 379 - 386
  • [7] Understanding and Discovering SQL Injection Vulnerabilities
    Sarhan, Abdullaziz A.
    Farhan, Shehab A.
    Al-Harby, Fahad M.
    ADVANCES IN HUMAN FACTORS IN CYBERSECURITY, 2018, 593 : 45 - 51
  • [8] Detecting SQL Injection Vulnerabilities Using Artificial Bee Colony and Ant Colony Optimization
    Baptista, Kevin
    Bernardino, Eugenia Moreira
    Bernardino, Anabela Moreira
    INFORMATION SYSTEMS AND TECHNOLOGIES, WORLDCIST 2022, VOL 3, 2022, 470 : 273 - 283
  • [9] Security Testing of Web Applications: A Search-Based Approach for Detecting SQL Injection Vulnerabilities
    Liu, Muyang
    Li, Ke
    Chen, Tao
    PROCEEDINGS OF THE 2019 GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE COMPANION (GECCCO'19 COMPANION), 2019, : 417 - 418
  • [10] Source Code Patterns of SQL Injection Vulnerabilities
    Schuckert, Felix
    Katt, Basel
    Langweg, Hanno
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,