Customizing OWASP ZAP: A Proven Method for Detecting SQL Injection Vulnerabilities

被引:0
|
作者
Alazmi, Suliman [1 ]
de Leon, Daniel Conte [1 ]
机构
[1] Univ Idaho, Dept Comp Sci, Moscow, ID 83843 USA
关键词
OWASP ZAP; Error-based SQLi; Union -based SQLi; Time -based blind SQLi; Authentication Bypass SQLi;
D O I
10.1109/BigDataSecurity-HPSC-IDS58521.2023.00028
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
web applications become increasingly popular for offering data and services among businesses and organizations they also become more susceptible to security risks. Many organizations rely today on Web Vulnerability Scanners (WVSs) to identify vulnerabilities in their web applications. However, one of the most prevalent types of web application vulnerabilities, SQL Injections (SQLi), can often go undetected by WVSs. OWASP ZAP is an open-source web vulnerability scanner that allows security professionals to develop rules to improve vulnerability detection capability. In this paper, a new method is proposed to improve the detection capability of OWASP ZAP for SQLi. We aim to accurately detect the four major types of SQLi: Error-based, Union -based, Time -based blind, and Authentication Bypass. We implemented this new method using OWASP ZAP detection policies. The method was tested against two benchmark vulnerable web applications, Mutillidae and WebGoat, and was shown to significantly improve the detection of SQL injection attacks.
引用
收藏
页码:102 / 106
页数:5
相关论文
共 50 条
  • [11] An Improved Approach for SQL Injection Vulnerabilities Detection
    Zhang, Zongzhi
    Wen, Qiaoyan
    Zhang, Zhao
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY, PTS 1-4, 2013, 263-266 : 3017 - 3020
  • [12] Automated Combinatorial Testing for Detecting SQL Vulnerabilities in Web Applications
    Simos, Dimitris E.
    Zivanovic, Jovan
    Leithner, Manuel
    2019 IEEE/ACM 14TH INTERNATIONAL WORKSHOP ON AUTOMATION OF SOFTWARE TEST (AST 2019), 2019, : 55 - 61
  • [13] A Machine Learning based Approach to Identify SQL Injection Vulnerabilities
    Zhang, Kevin
    34TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE 2019), 2019, : 1286 - 1288
  • [14] Security Slicing for Auditing XML, XPath, and SQL Injection Vulnerabilities
    Thome, Julian
    Shar, Lwin Khin
    Brian, Lionel
    2015 IEEE 26TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE), 2015, : 553 - 564
  • [15] Effective Detection of SQL/XPath Injection Vulnerabilities in Web Services
    Antunes, Nuno
    Laranjeiro, Nuno
    Vieira, Marco
    Madeira, Henrique
    2009 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING, 2009, : 260 - 267
  • [16] Analysis and Classification of SQL Injection Vulnerabilities and Attacks on Web Applications
    Sharma, Chandershekhar
    Jain, S. C.
    2014 INTERNATIONAL CONFERENCE ON ADVANCES IN ENGINEERING AND TECHNOLOGY RESEARCH (ICAETR), 2014,
  • [17] On automated prepared statement generation to remove SQL injection vulnerabilities
    Thomas, Stephen
    Williams, Laurie
    Xie, Tao
    INFORMATION AND SOFTWARE TECHNOLOGY, 2009, 51 (03) : 589 - 598
  • [18] Formal Analysis of Vulnerabilities of Web Applications Based on SQL Injection
    De Meo, Federico
    Rocchetto, Marco
    Vigano, Luca
    SECURITY AND TRUST MANAGEMENT, STM 2016, 2016, 9871 : 179 - 195
  • [19] Benchmarking Approach to Compare Web Applications Static Analysis Tools Detecting OWASP Top Ten Security Vulnerabilities
    Bermejo Higuera, Juan R.
    Bermejo Higuera, Javier
    Sicilia Montalvo, Juan A.
    Cubo Villalba, Javier
    Nombela Perez, Juan Jose
    CMC-COMPUTERS MATERIALS & CONTINUA, 2020, 64 (03): : 1555 - 1577
  • [20] Test SQL Injection Vulnerabilities in Web Applications Based on Structure Matching
    Wu, Haiyan
    Gao, Guozhu
    Miao, Chunyu
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 935 - 938