Evaluation of Web Security Mechanisms Using Vulnerability & Attack Injection

被引:38
|
作者
Fonseca, Jose [1 ,2 ]
Vieira, Marco [2 ]
Madeira, Henrique [2 ]
机构
[1] Inst Polytech Guarda, Res Unit Inland Dev, Guarda, Portugal
[2] Univ Coimbra, Ctr Informat & Syst, P-3000 Coimbra, Portugal
关键词
Security; fault injection; internet applications; review and evaluation; FAULT INJECTION;
D O I
10.1109/TDSC.2013.45
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we propose a methodology and a prototype tool to evaluate web application security mechanisms. The methodology is based on the idea that injecting realistic vulnerabilities in a web application and attacking them automatically can be used to support the assessment of existing security mechanisms and tools in custom setup scenarios. To provide true to life results, the proposed vulnerability and attack injection methodology relies on the study of a large number of vulnerabilities in real web applications. In addition to the generic methodology, the paper describes the implementation of the Vulnerability & Attack Injector Tool (VAIT) that allows the automation of the entire process. We used this tool to run a set of experiments that demonstrate the feasibility and the effectiveness of the proposed methodology. The experiments include the evaluation of coverage and false positives of an intrusion detection system for SQL Injection attacks and the assessment of the effectiveness of two top commercial web application vulnerability scanners. Results show that the injection of vulnerabilities and attacks is indeed an effective way to evaluate security mechanisms and to point out not only their weaknesses but also ways for their improvement.
引用
收藏
页码:440 / 453
页数:14
相关论文
共 50 条
  • [31] Web of Things: Security Challenges and Mechanisms
    Sardar, Ruhma
    Anees, Tayyaba
    IEEE ACCESS, 2021, 9 : 31695 - 31711
  • [32] Multics security evaluation: Vulnerability analysis
    Karger, PA
    Schell, RR
    18TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2002, : 127 - 146
  • [33] Security Evaluation of LIGHTMAC: Second Preimage Attack using Existential Forgery
    Windarta, Susila
    Ramli, Kalamullah
    Sudiana, Dodi
    2020 1ST INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, ADVANCED MECHANICAL AND ELECTRICAL ENGINEERING (ICITAMEE 2020), 2020, : 265 - 269
  • [34] Physical security of deep learning on edge devices: Comprehensive evaluation of fault injection attack vectors
    Hou, Xiaolu
    Breier, Jakub
    Jap, Dirmanto
    Ma, Lei
    Bhasin, Shivam
    Liu, Yang
    MICROELECTRONICS RELIABILITY, 2021, 120
  • [35] Evaluation of Network Risk Using Attack Graph Based Security Metrics
    Kumar, Santosh
    Negi, Anuradha
    Prasad, Keshav
    Mahanti, Aniket
    2016 IEEE 14TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 14TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 2ND INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/DATACOM/CYBERSC, 2016, : 91 - 93
  • [36] Neutralizing SQL Injection Attack Using Server Side Code Modification in Web Applications
    Dalai, Asish Kumar
    Jena, Sanjay Kumar
    SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [37] Evaluation of Black-Box Web Application Security Scanners in Detecting Injection Vulnerabilities
    Althunayyan, Muzun
    Saxena, Neetesh
    Li, Shancang
    Gope, Prosanta
    ELECTRONICS, 2022, 11 (13)
  • [38] Network Security Node-Edge Scoring System Using Attack Graph Based on Vulnerability Correlation
    Shin, Gun-Yoon
    Hong, Sung-Sam
    Lee, Jung-Sik
    Han, In-Sung
    Kim, Hwa-Kyung
    Oh, Haeng-Rok
    APPLIED SCIENCES-BASEL, 2022, 12 (14):
  • [39] Game of information security investment: Impact of attack types and network vulnerability
    Wu, Yong
    Feng, Gengzhong
    Wang, Nengmin
    Liang, Huigang
    EXPERT SYSTEMS WITH APPLICATIONS, 2015, 42 (15-16) : 6132 - 6146
  • [40] A Framework for Modeling Cyber Attack Techniques from Security Vulnerability Descriptions
    Binyamini, Hodaya
    Bitton, Ron
    Elovici, Yuval
    Shabtai, Asaf
    Inokuchi, Masaki
    Yagyu, Tomohiko
    KDD '21: PROCEEDINGS OF THE 27TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY & DATA MINING, 2021, : 2574 - 2583