Analysis on Injection Vulnerabilities of Web Application

被引:1
|
作者
Yadav, Nilesh [1 ]
Shekokar, Narendra [1 ]
机构
[1] DJ Sanghvi Coll Engn, Dept Comp Engn, Mumbai, Maharashtra, India
来源
PROCEEDINGS OF INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATION, ICWICOM 2017 | 2018年 / 19卷
关键词
Web application; Injection vulnerability; Attack; Security; OWASP;
D O I
10.1007/978-981-10-8339-6_2
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The number of Internet users has incredible grown. Web applications are normally utilized in various sectors like Ecommerce, Banking, and Military. It is collection of thousands of lines of program, which habitually contain some bugs. Part of them have impact on security and can lead to complete control of the application by an attacker. While in client-server communication, the attacker inputs the vulnerable content into the application, these unnoticed vulnerabilities cause financial losses to organizations. Thus, mitigating such an attack is vital to evade mischievous penalties. An enormous research work on application security has been continuously going on but every defense has its own advantages and disadvantages. The aim of this paper is to study and consolidate the understanding of injection vulnerabilities and its mitigation technique. Different approaches proposed by researchers are analyzed here and discussed about the observed pitfalls present in the existing solutions.
引用
收藏
页码:13 / 22
页数:10
相关论文
共 50 条
  • [31] Effect of Coding Styles in Detection of Web Application Vulnerabilities
    Medeiros, Iberia
    Neves, Nuno
    2020 16TH EUROPEAN DEPENDABLE COMPUTING CONFERENCE (EDCC 2020), 2020, : 111 - 118
  • [32] Automatic Generation of Tests to Exploit XML Injection Vulnerabilities in Web Applications
    Jan, Sadeeq
    Panichella, Annibale
    Arcuri, Andrea
    Briand, Lionel
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2019, 45 (04) : 335 - 362
  • [33] Securing web applications from injection and logic vulnerabilities: Approaches and challenges
    Deepa, G.
    Thilagam, P. Santhi
    INFORMATION AND SOFTWARE TECHNOLOGY, 2016, 74 : 160 - 180
  • [34] Test SQL Injection Vulnerabilities in Web Applications Based on Structure Matching
    Wu, Haiyan
    Gao, Guozhu
    Miao, Chunyu
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 935 - 938
  • [35] Comparing the Effectiveness of Penetration Testing and Static Code Analysis on the Detection of SQL Injection Vulnerabilities in Web Services
    Antunes, Nuno
    Vieira, Marco
    IEEE 15TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING, PROCEEDINGS, 2009, : 301 - 306
  • [36] Static Analysis Approaches to Detect SQL Injection and Cross Site Scripting Vulnerabilities in Web Applications: A Survey
    Gupta, Mukesh Kumar
    Govil, M. C.
    Singh, Girdhari
    2014 RECENT ADVANCES AND INNOVATIONS IN ENGINEERING (ICRAIE), 2014,
  • [37] Commix: automating evaluation and exploitation of command injection vulnerabilities in Web applications
    Stasinopoulos, Anastasios
    Ntantogian, Christoforos
    Xenakis, Christos
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2019, 18 (01) : 49 - 72
  • [38] Commix: automating evaluation and exploitation of command injection vulnerabilities in Web applications
    Anastasios Stasinopoulos
    Christoforos Ntantogian
    Christos Xenakis
    International Journal of Information Security, 2019, 18 : 49 - 72
  • [39] Analysis of Field Data on Web Security Vulnerabilities
    Fonseca, Jose
    Seixas, Nuno
    Vieira, Marco
    Madeira, Henrique
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2014, 11 (02) : 89 - 100
  • [40] Mobile Application Web API Reconnaissance: Web-to-Mobile Inconsistencies & Vulnerabilities
    Mendoza, Abner
    Gu, Guofei
    2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2018, : 756 - 769