Evaluation of Web Security Mechanisms Using Vulnerability & Attack Injection

被引:38
|
作者
Fonseca, Jose [1 ,2 ]
Vieira, Marco [2 ]
Madeira, Henrique [2 ]
机构
[1] Inst Polytech Guarda, Res Unit Inland Dev, Guarda, Portugal
[2] Univ Coimbra, Ctr Informat & Syst, P-3000 Coimbra, Portugal
关键词
Security; fault injection; internet applications; review and evaluation; FAULT INJECTION;
D O I
10.1109/TDSC.2013.45
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we propose a methodology and a prototype tool to evaluate web application security mechanisms. The methodology is based on the idea that injecting realistic vulnerabilities in a web application and attacking them automatically can be used to support the assessment of existing security mechanisms and tools in custom setup scenarios. To provide true to life results, the proposed vulnerability and attack injection methodology relies on the study of a large number of vulnerabilities in real web applications. In addition to the generic methodology, the paper describes the implementation of the Vulnerability & Attack Injector Tool (VAIT) that allows the automation of the entire process. We used this tool to run a set of experiments that demonstrate the feasibility and the effectiveness of the proposed methodology. The experiments include the evaluation of coverage and false positives of an intrusion detection system for SQL Injection attacks and the assessment of the effectiveness of two top commercial web application vulnerability scanners. Results show that the injection of vulnerabilities and attacks is indeed an effective way to evaluate security mechanisms and to point out not only their weaknesses but also ways for their improvement.
引用
收藏
页码:440 / 453
页数:14
相关论文
共 50 条
  • [21] A Distributed Attack Simulation for Quantitative Security Evaluation using SimEvents
    Khazan, Golriz
    Azgomi, Mohammad Abdollahi
    2009 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1 AND 2, 2009, : 382 - +
  • [22] Studying Cyber Security Threats to Web Platforms Using Attack Tree Diagrams
    Petrica, Gabriel
    Axinte, Sabina-Daniela
    Bacivarov, Ioan C.
    Firoiu, Marian
    Mihai, Ioan-Cosmin
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTERS AND ARTIFICIAL INTELLIGENCE - ECAI 2017, 2017,
  • [23] Web 2.0 Injection Infection Vulnerability Class
    Hyatt, Derrick
    INFORMATION SECURITY JOURNAL, 2009, 18 (05): : 213 - 223
  • [24] Security Attack Analysis Using Attack Patterns
    Li, Tong
    Paja, Elda
    Mylopoulos, John
    Horkoff, Jennifer
    Beckers, Kristian
    2016 IEEE TENTH INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN INFORMATION SCIENCE (RCIS), 2016, : 513 - 525
  • [25] Evaluation and Comparison of Security Mechanisms In-Place in Various Web Server Systems
    Aaqib, Syed Mutahar
    Sharma, Lalitsen
    SOFTWARE ENGINEERING (CSI 2015), 2019, 731 : 441 - 447
  • [26] IoT Security Vulnerability: A Case Study of a Web Camera
    Seralathan, Yogeesh
    Oh, Tae
    Jadhav, Suyash
    Myers, Jonathan
    Jeong, Jaehoon
    Kim, Young Ho
    Kim, Jeong Neyo
    2018 20TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2018, : 172 - 177
  • [27] An Integrated Approach for Effective Injection Vulnerability Analysis of Web Applications Through Security Slicing and Hybrid Constraint Solving
    Thome, Julian
    Shar, Lwin Khin
    Bianculli, Domenico
    Briand, Lionel
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2020, 46 (02) : 163 - 195
  • [28] Vulnerability Coverage Criteria for Security Testing of Web Applications
    Murthy, P. V. R.
    Shilpa, R. G.
    2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2018, : 489 - 494
  • [29] Detection Model for SQL Injection Attack: An Approach for Preventing a Web Application from the SQL Injection Attack
    Buja, Geogiana
    Bin Abd Jalil, Kamarularifin
    Ali, Fakariah Bt Hj Mohd
    Rahman, Teh Faradilla Abdul
    2014 IEEE SYMPOSIUM ON COMPUTER APPLICATIONS AND INDUSTRIAL ELECTRONICS (ISCAIE), 2014,
  • [30] Vulnerability Analysis for a Quantitative Security Evaluation
    Vache, Geraldine
    ESEM: 2009 3RD INTERNATIONAL SYMPOSIUM ON EMPIRICAL SOFTWARE ENGINEERING AND MEASUREMENT, 2009, : 527 - 535