Customizing OWASP ZAP: A Proven Method for Detecting SQL Injection Vulnerabilities

被引:0
|
作者
Alazmi, Suliman [1 ]
de Leon, Daniel Conte [1 ]
机构
[1] Univ Idaho, Dept Comp Sci, Moscow, ID 83843 USA
关键词
OWASP ZAP; Error-based SQLi; Union -based SQLi; Time -based blind SQLi; Authentication Bypass SQLi;
D O I
10.1109/BigDataSecurity-HPSC-IDS58521.2023.00028
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
web applications become increasingly popular for offering data and services among businesses and organizations they also become more susceptible to security risks. Many organizations rely today on Web Vulnerability Scanners (WVSs) to identify vulnerabilities in their web applications. However, one of the most prevalent types of web application vulnerabilities, SQL Injections (SQLi), can often go undetected by WVSs. OWASP ZAP is an open-source web vulnerability scanner that allows security professionals to develop rules to improve vulnerability detection capability. In this paper, a new method is proposed to improve the detection capability of OWASP ZAP for SQLi. We aim to accurately detect the four major types of SQLi: Error-based, Union -based, Time -based blind, and Authentication Bypass. We implemented this new method using OWASP ZAP detection policies. The method was tested against two benchmark vulnerable web applications, Mutillidae and WebGoat, and was shown to significantly improve the detection of SQL injection attacks.
引用
收藏
页码:102 / 106
页数:5
相关论文
共 50 条
  • [41] Finding SQL Injection and Cross Site Scripting Vulnerabilities with Diverse Static Analysis Tools
    Algaith, Areej
    Nunes, Paulo
    Fonseca, Jose
    Gashi, Ilir
    Vieira, Marco
    2018 14TH EUROPEAN DEPENDABLE COMPUTING CONFERENCE (EDCC 2018), 2018, : 57 - 64
  • [42] Mining SQL Injection and Cross Site Scripting Vulnerabilities using Hybrid Program Analysis
    Shar, Lwin Khin
    Tan, Hee Beng Kuan
    Briand, Lionel C.
    PROCEEDINGS OF THE 35TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2013), 2013, : 642 - 651
  • [43] Mining Input Sanitization Patterns for Predicting SQL Injection and Cross Site Scripting Vulnerabilities
    Shar, Lwin Khin
    Tan, Hee Beng Kuan
    2012 34TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2012, : 1293 - 1296
  • [44] FaultHunter: Automatically Detecting Vulnerabilities in C against Fault Injection Attacks
    Reichling, Logan
    Warsame, Ikran
    Reilly, Shane
    Brownfield, Austen
    Niu, Nan
    Wang, Boyang
    2022 IEEE/ACM INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING, APPLICATIONS AND TECHNOLOGIES, BDCAT, 2022, : 271 - 276
  • [45] Characterizing, Exploiting, and Detecting DMA Code Injection Vulnerabilities in the Presence of an IOMMU
    Alex, Markuze
    Vargaftik, Shay
    Kupfer, Gil
    Pismeny, Boris
    Amit, Nadav
    Morrison, Adam
    Tsafrir, Dan
    PROCEEDINGS OF THE SIXTEENTH EUROPEAN CONFERENCE ON COMPUTER SYSTEMS (EUROSYS '21), 2021, : 395 - 409
  • [46] Static analysis method for detecting buffer overflow vulnerabilities
    Puchkov, FM
    Shapchenko, KA
    PROGRAMMING AND COMPUTER SOFTWARE, 2005, 31 (04) : 179 - 189
  • [47] An automated and scalable formal process for detecting fault injection vulnerabilities in binaries
    Given-Wilson, Thomas
    Heuser, Annelie
    Jafri, Nisrine
    Legay, Axel
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (23):
  • [48] Detecting SQL Injection Attacks in Cloud SaaS using Machine Learning
    Tripathy, Dharitri
    Gohil, Rudrarajsinh
    Halabi, Talal
    2020 IEEE 6TH INT CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY) / 6TH IEEE INT CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) / 5TH IEEE INT CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2020, : 145 - 150
  • [49] Static Analysis Method for Detecting Buffer Overflow Vulnerabilities
    F. M. Puchkov
    K. A. Shapchenko
    Programming and Computer Software, 2005, 31 : 179 - 189
  • [50] SQLiGoT: Detecting SQL injection attacks using graph of tokens and SVM
    Kar, Debabrata
    Panigrahi, Suvasini
    Sundararajan, Srikanth
    COMPUTERS & SECURITY, 2016, 60 : 206 - 225