{"title":"网站安全分析:变异检测方法和决策","authors":"I. Alsmadi, Fahad Mira","doi":"10.1109/NCG.2018.8592962","DOIUrl":null,"url":null,"abstract":"Websites and web applications continue to evolve in terms of how they are developed and used. Different types of components in those websites and applications communicate with users through inputs taken from the users and outputs displayed to those users. Users, intentionally or unintentionally, may provide improper inputs. We proposed a model to investigate the behavior of websites when dealing with invalid inputs. From security perspectives, invalid inputs should be detected and rejected as early as possible. An invalid input is considered as a form of successful attack if it is processed by the website code or back-end database. Based on this assumption, we proposed a list of indicators that test invalid inputs are processed. A tool is developed to implement this model. We tested the model through evaluating several websites selected randomly. Our tool has no special credentials or access to any of the tested websites. We found many SQL injection vulnerabilities based on our proposed model. Upon the manual investigation of the web pages that showed such vulnerabilities, we found few instances of false positives. We believe that this can provide a systematic and automated approach to test websites for vulnerabilities related to improper input validation.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Website security analysis: variation of detection methods and decisions\",\"authors\":\"I. Alsmadi, Fahad Mira\",\"doi\":\"10.1109/NCG.2018.8592962\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Websites and web applications continue to evolve in terms of how they are developed and used. Different types of components in those websites and applications communicate with users through inputs taken from the users and outputs displayed to those users. Users, intentionally or unintentionally, may provide improper inputs. We proposed a model to investigate the behavior of websites when dealing with invalid inputs. From security perspectives, invalid inputs should be detected and rejected as early as possible. An invalid input is considered as a form of successful attack if it is processed by the website code or back-end database. Based on this assumption, we proposed a list of indicators that test invalid inputs are processed. A tool is developed to implement this model. We tested the model through evaluating several websites selected randomly. Our tool has no special credentials or access to any of the tested websites. We found many SQL injection vulnerabilities based on our proposed model. Upon the manual investigation of the web pages that showed such vulnerabilities, we found few instances of false positives. We believe that this can provide a systematic and automated approach to test websites for vulnerabilities related to improper input validation.\",\"PeriodicalId\":305464,\"journal\":{\"name\":\"2018 21st Saudi Computer Society National Computer Conference (NCC)\",\"volume\":\"94 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 21st Saudi Computer Society National Computer Conference (NCC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NCG.2018.8592962\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 21st Saudi Computer Society National Computer Conference (NCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NCG.2018.8592962","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Website security analysis: variation of detection methods and decisions
Websites and web applications continue to evolve in terms of how they are developed and used. Different types of components in those websites and applications communicate with users through inputs taken from the users and outputs displayed to those users. Users, intentionally or unintentionally, may provide improper inputs. We proposed a model to investigate the behavior of websites when dealing with invalid inputs. From security perspectives, invalid inputs should be detected and rejected as early as possible. An invalid input is considered as a form of successful attack if it is processed by the website code or back-end database. Based on this assumption, we proposed a list of indicators that test invalid inputs are processed. A tool is developed to implement this model. We tested the model through evaluating several websites selected randomly. Our tool has no special credentials or access to any of the tested websites. We found many SQL injection vulnerabilities based on our proposed model. Upon the manual investigation of the web pages that showed such vulnerabilities, we found few instances of false positives. We believe that this can provide a systematic and automated approach to test websites for vulnerabilities related to improper input validation.