Evaluation of Web Security Mechanisms Using Vulnerability & Attack Injection

被引:38
|
作者
Fonseca, Jose [1 ,2 ]
Vieira, Marco [2 ]
Madeira, Henrique [2 ]
机构
[1] Inst Polytech Guarda, Res Unit Inland Dev, Guarda, Portugal
[2] Univ Coimbra, Ctr Informat & Syst, P-3000 Coimbra, Portugal
关键词
Security; fault injection; internet applications; review and evaluation; FAULT INJECTION;
D O I
10.1109/TDSC.2013.45
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we propose a methodology and a prototype tool to evaluate web application security mechanisms. The methodology is based on the idea that injecting realistic vulnerabilities in a web application and attacking them automatically can be used to support the assessment of existing security mechanisms and tools in custom setup scenarios. To provide true to life results, the proposed vulnerability and attack injection methodology relies on the study of a large number of vulnerabilities in real web applications. In addition to the generic methodology, the paper describes the implementation of the Vulnerability & Attack Injector Tool (VAIT) that allows the automation of the entire process. We used this tool to run a set of experiments that demonstrate the feasibility and the effectiveness of the proposed methodology. The experiments include the evaluation of coverage and false positives of an intrusion detection system for SQL Injection attacks and the assessment of the effectiveness of two top commercial web application vulnerability scanners. Results show that the injection of vulnerabilities and attacks is indeed an effective way to evaluate security mechanisms and to point out not only their weaknesses but also ways for their improvement.
引用
收藏
页码:440 / 453
页数:14
相关论文
共 50 条
  • [11] Evaluation of SOA security metrics using attack graphs
    Magott, Jan
    Woda, Marek
    DEPCOS - RELCOMEX 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON DEPENDABILITY OF COMPUTER SYSTEMS, 2008, : 277 - 284
  • [12] Web Service Injection Attack Detection
    Clincy, Victor
    Shahriar, Hossain
    2017 12TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2017, : 173 - 178
  • [13] IC Security Evaluation against Fault Injection Attack Based on FPGA Emulation
    Xu, Song
    Liu, Qiang
    Li, Tao
    Fan, Hongxiang
    2016 INTERNATIONAL CONFERENCE ON FIELD-PROGRAMMABLE TECHNOLOGY (FPT), 2016, : 285 - 288
  • [14] NoSQL Injection Attack Detection in Web Applications Using RESTful Service
    Eassa, Ahmed M.
    Elhoseny, Mohamed
    El-Bakry, Hazem M.
    Salama, Ahmed S.
    PROGRAMMING AND COMPUTER SOFTWARE, 2018, 44 (06) : 435 - 444
  • [15] NoSQL Injection Attack Detection in Web Applications Using RESTful Service
    Ahmed M. Eassa
    Mohamed Elhoseny
    Hazem M. El-Bakry
    Ahmed S. Salama
    Programming and Computer Software, 2018, 44 : 435 - 444
  • [16] Power Analysis Attack: A Vulnerability to Smart Card Security
    Mahanta, Hridoy Jyoti
    Azad, Abul Kalam
    Khan, Ajoy Kumar
    2015 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION ENGINEERING SYSTEMS (SPACES), 2015, : 506 - 510
  • [17] Vulnerability Analysis for Simultaneous Attack in Smart Grid Security
    Paul, Shuva
    Ni, Zhen
    2017 IEEE POWER & ENERGY SOCIETY INNOVATIVE SMART GRID TECHNOLOGIES CONFERENCE (ISGT), 2017,
  • [18] A survey on EOSIO systems security: vulnerability, attack, and mitigation
    Ningyu He
    Haoyu Wang
    Lei Wu
    Xiapu Luo
    Yao Guo
    Xiangqun Chen
    Frontiers of Computer Science, 2025, 19 (6)
  • [19] Evaluation of Web Vulnerability Scanners
    Makino, Yuma
    Klyuev, Vilaly
    2015 IEEE 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS (IDAACS), VOLS 1-2, 2015, : 399 - 402
  • [20] Software security evaluation using multilevel vulnerability discovery modeling
    Sharma, Ruchi
    Shrivastava, Avinash K.
    Hoang Pham
    QUALITY ENGINEERING, 2023, 35 (02) : 341 - 352