Customizing OWASP ZAP: A Proven Method for Detecting SQL Injection Vulnerabilities

被引:0
|
作者
Alazmi, Suliman [1 ]
de Leon, Daniel Conte [1 ]
机构
[1] Univ Idaho, Dept Comp Sci, Moscow, ID 83843 USA
关键词
OWASP ZAP; Error-based SQLi; Union -based SQLi; Time -based blind SQLi; Authentication Bypass SQLi;
D O I
10.1109/BigDataSecurity-HPSC-IDS58521.2023.00028
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
web applications become increasingly popular for offering data and services among businesses and organizations they also become more susceptible to security risks. Many organizations rely today on Web Vulnerability Scanners (WVSs) to identify vulnerabilities in their web applications. However, one of the most prevalent types of web application vulnerabilities, SQL Injections (SQLi), can often go undetected by WVSs. OWASP ZAP is an open-source web vulnerability scanner that allows security professionals to develop rules to improve vulnerability detection capability. In this paper, a new method is proposed to improve the detection capability of OWASP ZAP for SQLi. We aim to accurately detect the four major types of SQLi: Error-based, Union -based, Time -based blind, and Authentication Bypass. We implemented this new method using OWASP ZAP detection policies. The method was tested against two benchmark vulnerable web applications, Mutillidae and WebGoat, and was shown to significantly improve the detection of SQL injection attacks.
引用
收藏
页码:102 / 106
页数:5
相关论文
共 50 条
  • [31] Fault-based testing for discovering SQL injection vulnerabilities in web applications
    Alsmadi I.
    AlEroud A.
    Saifan A.A.
    International Journal of Information and Computer Security, 2021, 16 (1-2): : 51 - 62
  • [32] SQLIFIX: Learning Based Approach to Fix SQL Injection Vulnerabilities in Source Code
    Siddiq, Mohammed Latif
    Jahin, Md Rezwanur Rahman
    Ul Islam, Mohammad Rafid
    Shahriyar, Rifat
    Iqbal, Anindya
    2021 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION AND REENGINEERING (SANER 2021), 2021, : 354 - 364
  • [33] Code-motion for API migration: Fixing SQL injection vulnerabilities in Java
    Abadi, Aharon
    Feldman, Yishai A.
    Shomrat, Mati
    WRT 2011 - Proceedings of the 4th Workshop on Refactoring Tools, co-located with ICSE 2011, 2011, : 1 - 7
  • [34] Over the SQL Injection hacking method
    Razvan, Raducanu
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND INFORMATION TECHNOLOGY, 2009, : 116 - +
  • [35] An Automated Formal Process for Detecting Fault Injection Vulnerabilities in Binaries
    Given-Wilson, Thomas
    Jafri, Nisrine
    Lanet, Jean-Louis
    Legay, Axel
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 293 - 300
  • [36] A new algorithm for detecting SQL injection attack in Web application
    Lounis, Ouarda
    Guermeche, Salah Eddine Bouhouita
    Saoudi, Lalia
    Benaicha, Salah Eddine
    2014 SCIENCE AND INFORMATION CONFERENCE (SAI), 2014, : 589 - 594
  • [37] The Research of Detecting SQL Injection Based on the Connectivity with Its Behavior
    Wang, Hao
    Wang, Jinsong
    Zhang, Jian
    Lin, Sheng
    Xia, Chengyi
    FRONTIERS IN COMPUTER EDUCATION, 2012, 133 : 501 - 508
  • [38] Detecting SQL injection attacks using query result size
    Jang, Young-Su
    Choi, Jin-Young
    COMPUTERS & SECURITY, 2014, 44 : 104 - 118
  • [39] A Novel Approach for Detecting SQL Injection Attacks Using Snort
    Gupta A.
    Sharma L.S.
    Journal of The Institution of Engineers (India): Series B, 2022, 103 (5) : 1443 - 1451
  • [40] SQIRL: Grey-Box Detection of SQL Injection Vulnerabilities Using Reinforcement Learning
    Al Wahaibi, Salim
    Foley, Myles
    Maffeis, Sergio
    PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 6097 - 6114