Evaluation of Web Security Mechanisms Using Vulnerability & Attack Injection

被引:38
|
作者
Fonseca, Jose [1 ,2 ]
Vieira, Marco [2 ]
Madeira, Henrique [2 ]
机构
[1] Inst Polytech Guarda, Res Unit Inland Dev, Guarda, Portugal
[2] Univ Coimbra, Ctr Informat & Syst, P-3000 Coimbra, Portugal
关键词
Security; fault injection; internet applications; review and evaluation; FAULT INJECTION;
D O I
10.1109/TDSC.2013.45
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we propose a methodology and a prototype tool to evaluate web application security mechanisms. The methodology is based on the idea that injecting realistic vulnerabilities in a web application and attacking them automatically can be used to support the assessment of existing security mechanisms and tools in custom setup scenarios. To provide true to life results, the proposed vulnerability and attack injection methodology relies on the study of a large number of vulnerabilities in real web applications. In addition to the generic methodology, the paper describes the implementation of the Vulnerability & Attack Injector Tool (VAIT) that allows the automation of the entire process. We used this tool to run a set of experiments that demonstrate the feasibility and the effectiveness of the proposed methodology. The experiments include the evaluation of coverage and false positives of an intrusion detection system for SQL Injection attacks and the assessment of the effectiveness of two top commercial web application vulnerability scanners. Results show that the injection of vulnerabilities and attacks is indeed an effective way to evaluate security mechanisms and to point out not only their weaknesses but also ways for their improvement.
引用
下载
收藏
页码:440 / 453
页数:14
相关论文
共 50 条
  • [1] A Top Web Security Vulnerability SQL Injection attack - Survey
    Abirami, J.
    Devakunchari, R.
    Valliyammai, C.
    2015 SEVENTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2015,
  • [2] Analysis of web application security mechanism and attack detection using vulnerability injection technique
    Bhor, R. V.
    Khanuja, H. K.
    2016 INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA), 2016,
  • [3] Vulnerability & Attack Injection for Web Applications
    Fonseca, Jose
    Vieiraz, Marco
    Madeira, Henrique
    2009 IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS & NETWORKS (DSN 2009), 2009, : 93 - +
  • [4] NoSQL Injection: Data Security on Web Vulnerability
    Abdalla, Hemn B.
    Li, Guoquang
    Lin, Jinzhao
    Alazeez, Mustafa A.
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (09): : 55 - 64
  • [5] SURVEY OF OS COMMAND INJECTION WEB APPLICATION VULNERABILITY ATTACK
    Alahmad, Mohammad
    Alkandari, Abdulrahman
    Alawadhi, Nayef
    JOURNAL OF ENGINEERING SCIENCE AND TECHNOLOGY, 2022, 17 (01): : 75 - 84
  • [6] Vulnerability Discovery with Attack Injection
    Antunes, Joao
    Neves, Nuno
    Correia, Miguel
    Verissimo, Paulo
    Neves, Rui
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2010, 36 (03) : 357 - 370
  • [7] A Performance Evaluation of Security Mechanisms for Web services
    Alrouh, Bachar
    Ghinea, Gheorghita
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 715 - 718
  • [8] Automated Security Testing Framework for Detecting SQL Injection Vulnerability in Web Application
    Awang, Nor Fatimah
    Abd Manaf, Azizah
    GLOBAL SECURITY, SAFETY AND SUSTAINABILITY: TOMORROW'S CHALLENGES OF CYBER SECURITY, ICGS3 2015, 2015, 534 : 160 - 171
  • [9] Backporting Security Patches of Web Applications: A Prototype Design and Implementation on Injection Vulnerability Patches
    Shi, Youkun
    Zhang, Yuan
    Luo, Tianhan
    Mao, Xiangyu
    Cao, Yinzhi
    Wang, Ziwen
    Zhao, Yudi
    Huang, Zongan
    Yang, Min
    PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, 2022, : 1993 - 2010
  • [10] Research on SQL Injection Vulnerability Attack model
    Su, Guanyu
    Wang, Fang
    Li, Qi
    PROCEEDINGS OF 2018 5TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENCE SYSTEMS (CCIS), 2018, : 217 - 221