Customizing OWASP ZAP: A Proven Method for Detecting SQL Injection Vulnerabilities

被引:0
|
作者
Alazmi, Suliman [1 ]
de Leon, Daniel Conte [1 ]
机构
[1] Univ Idaho, Dept Comp Sci, Moscow, ID 83843 USA
关键词
OWASP ZAP; Error-based SQLi; Union -based SQLi; Time -based blind SQLi; Authentication Bypass SQLi;
D O I
10.1109/BigDataSecurity-HPSC-IDS58521.2023.00028
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
web applications become increasingly popular for offering data and services among businesses and organizations they also become more susceptible to security risks. Many organizations rely today on Web Vulnerability Scanners (WVSs) to identify vulnerabilities in their web applications. However, one of the most prevalent types of web application vulnerabilities, SQL Injections (SQLi), can often go undetected by WVSs. OWASP ZAP is an open-source web vulnerability scanner that allows security professionals to develop rules to improve vulnerability detection capability. In this paper, a new method is proposed to improve the detection capability of OWASP ZAP for SQLi. We aim to accurately detect the four major types of SQLi: Error-based, Union -based, Time -based blind, and Authentication Bypass. We implemented this new method using OWASP ZAP detection policies. The method was tested against two benchmark vulnerable web applications, Mutillidae and WebGoat, and was shown to significantly improve the detection of SQL injection attacks.
引用
收藏
页码:102 / 106
页数:5
相关论文
共 50 条
  • [21] APPLICATION TO EXAMINE SQL INJECTION VULNERABILITIES AS A TOOL IN COMPUTER SCIENCE EDUCATION
    Koziel, Grzegorz
    Krawczynski, Bogdan
    Marucha, Jaroslaw
    Wojcicki, Piotr
    Skulimowski, Stanislaw
    12TH INTERNATIONAL TECHNOLOGY, EDUCATION AND DEVELOPMENT CONFERENCE (INTED), 2018, : 7404 - 7409
  • [22] FaultArm: Detecting Fault Injection Vulnerabilities in Arm Assembly
    Kharangate, Prateek
    Rached, Guillermo
    Musungu, Harris
    Niu, Nan
    Wang, Boyang
    IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE, NAECON 2024, 2024, : 285 - 290
  • [23] SEPTIC: Detecting Injection Attacks and Vulnerabilities Inside the DBMS
    Medeiros, Iberia
    Beatriz, Miguel
    Neves, Nuno
    Correia, Miguel
    IEEE TRANSACTIONS ON RELIABILITY, 2019, 68 (03) : 1168 - 1188
  • [24] Detecting SOQL-Injection Vulnerabilities in SalesForce Applications
    Saxena, Amitabh
    Sengupta, Shubhashis
    Duraisamy, Pradeepkumar
    Kaulgud, Vikrant
    Chakraborty, Amit
    2013 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2013, : 489 - 493
  • [25] LogInjector: Detecting Web Application Log Injection Vulnerabilities
    Pan, Zulie
    Chen, Yu
    Chen, Yuanchao
    Shen, Yi
    Li, Yang
    APPLIED SCIENCES-BASEL, 2022, 12 (15):
  • [26] Detecting Injection vulnerabilities in Executable Codes with Concolic Execution
    Mouzarani, Maryam
    Sadeghiyan, Babak
    Zolfaghari, Mohammad
    PROCEEDINGS OF 2017 8TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2017), 2017, : 50 - 57
  • [27] Approach to detecting SQL injection behaviors in network environment
    Zhao Y.-F.
    Xiong G.
    He L.-T.
    Li Z.-J.
    Tongxin Xuebao/Journal on Communications, 2016, 37 (02): : 88 - 97
  • [28] Detecting SQL Injection Attacks Using SNORT IDS
    Alnabulsi, Hussein
    Islam, Md Rafiqul
    Mamun, Quazi
    2014 ASIA-PACIFIC WORLD CONGRESS ON COMPUTER SCIENCE AND ENGINEERING (APWC ON CSE), 2014,
  • [29] Detecting and Preventing SQL Injection Attacks: A Formal Approach
    Qbea'h, Mohammad
    Alshraideh, Mohammad
    Sabri, Khair Eddin
    2016 CYBERSECURITY AND CYBERFORENSICS CONFERENCE (CCC), 2016, : 123 - 129
  • [30] SQL-Injection Vulnerabilities Resolving using Valid Security Tool in Cloud
    Singh, Niharika
    Singh, Ashutosh Kumar
    PERTANIKA JOURNAL OF SCIENCE AND TECHNOLOGY, 2019, 27 (01): : 159 - 174