Automatic Detection and Correction of Web Application Vulnerabilities using Data Mining to Predict False Positives

被引:51
|
作者
Medeiros, Iberia [1 ]
Neves, Nuno F. [1 ]
Correia, Miguel [2 ]
机构
[1] Univ Lisbon, Fac Sci, LaSIGE, Lisbon, Portugal
[2] Univ Lisbon, Inst Super Tecn, INESC ID, Lisbon, Portugal
关键词
Web applications; security; input validation vulnerabilities; false positives; source code analysis; automatic protection; software security; data mining;
D O I
10.1145/2566486.2568024
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Web application security is an important problem in today's internet. A major cause of this status is that many programmers do not have adequate knowledge about secure coding, so they leave applications with vulnerabilities. An approach to solve this problem is to use source code static analysis to find these bugs, but these tools are known to report many false positives that make hard the task of correcting the application. This paper explores the use of a hybrid of methods to detect vulnerabilities with less false positives. After an initial step that uses taint analysis to flag candidate vulnerabilities, our approach uses data mining to predict the existence of false positives. This approach reaches a trade-off between two apparently opposite approaches: humans coding the knowledge about vulnerabilities (for taint analysis) versus automatically obtaining that knowledge (with machine learning, for data mining). Given this more precise form of detection, we do automatic code correction by inserting fixes in the source code. The approach was implemented in the WAP tool (1) and an experimental evaluation was performed with a large set of open source PHP applications.
引用
收藏
页码:63 / 73
页数:11
相关论文
共 50 条
  • [1] Automatic Detection and Correction of Vulnerabilities using Machine Learning
    Tommy, Robin
    Sundeep, Gullapudi
    Jose, Hima
    2017 INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN COMPUTER, ELECTRICAL, ELECTRONICS AND COMMUNICATION (CTCEEC), 2017, : 1062 - 1065
  • [2] Detecting and Removing Web Application Vulnerabilities with Static Analysis and Data Mining
    Medeiros, Iberia
    Neves, Nuno
    Correia, Miguel
    IEEE TRANSACTIONS ON RELIABILITY, 2016, 65 (01) : 54 - 69
  • [3] Correction to: False positives: handling them operationally for automatic pollen monitoring
    Benoît Crouzy
    Gian Lieberherr
    Fiona Tummon
    Bernard Clot
    Aerobiologia, 2022, 38 : 597 - 597
  • [4] An Approach to Minimize False Positive in SQLI Vulnerabilities Detection Techniques through Data Mining
    Gupta, Mukesh Kumar
    Govil, Mahesh Chand
    Singh, Girdhari
    2014 INTERNATIONAL CONFERENCE ON SIGNAL PROPAGATION AND COMPUTER TECHNOLOGY (ICSPCT 2014), 2014, : 407 - 410
  • [5] Data mining approach to web application intrusions detection
    Kalicki, Arkadiusz
    PHOTONICS APPLICATIONS IN ASTRONOMY, COMMUNICATIONS, INDUSTRY, AND HIGH-ENERGY PHYSICS EXPERIMENTS 2011, 2011, 8008
  • [6] Using Outlier Detection to Reduce False Positives in Intrusion Detection
    Xiao, Fu
    Li, Xie
    2008 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING, PROCEEDINGS, 2008, : 26 - +
  • [7] A two-stage process based on data mining and optimization to identify false positives and false negatives generated by intrusion detection systems
    Fatma, Hachmi
    Limam, Mohamed
    2015 11TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2015, : 308 - 311
  • [8] Web Application Vulnerabilities Detection Techniques Survey
    Khochare, Nilesh
    Chalurkar, Satish
    Meshram, B. B.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2013, 13 (06): : 71 - 75
  • [9] Detection of Web Application Vulnerabilities Accelerated by GPU
    Li, Shaotao
    PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON MECHANICAL MATERIALS AND MANUFACTURING ENGINEERING (MMME 2016), 2016, 79 : 329 - 331
  • [10] False Fire Alarm Detection Using Data Mining Techniques
    Zafar, Raheel
    Zaib, Shah
    Asif, Muhammad
    INTERNATIONAL JOURNAL OF DECISION SUPPORT SYSTEM TECHNOLOGY, 2020, 12 (04) : 21 - 35