评估用于大规模检测Web应用程序漏洞的非侵入式漏洞扫描方法

Elwin Shaji, N. Subramanian
{"title":"评估用于大规模检测Web应用程序漏洞的非侵入式漏洞扫描方法","authors":"Elwin Shaji, N. Subramanian","doi":"10.1109/ICSCAN53069.2021.9526423","DOIUrl":null,"url":null,"abstract":"The online presence of organizations is increasing at a rapid pace with the major adaptation of work from home. Organizations have new digital infrastructure being added to their digital portfolio on a regular basis. The threats that organizations face are also increasing at an alarming rate. It is crucial in such a scenario to safeguard and test the new and growing digital infrastructure without causing any interruption to the services provided by these organizations. Through this paper, we would like to inspect six non-intrusive detection methodologies which are useful in the identification of web application vulnerabilities without hampering the organization’s service model. The dataset that was used for real-world analysis consisted of government agencies and reputable organizations. We have assessed these vulnerabilities on the criterion of the statistical probability of finding these vulnerabilities on the dataset. We were able to identify 44 sub-domain takeover vulnerability in 1628 domains (0.02%), 263 cryptographic vulnerabilities (0.17%) and 167 open port vulnerabilities (0.10%) in 1538 domains, and 10,491 GitHub API Leaks were found within 27 organization’s GitHub repository, 3 Cross-Origin Resource Sharing (CORS) misconfigurations in 1213 domains (0.002%) and 0 Wayback machine API leaks from 800 domains.","PeriodicalId":393569,"journal":{"name":"2021 International Conference on System, Computation, Automation and Networking (ICSCAN)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Assessing Non-Intrusive Vulnerability Scanning Methodologies for Detecting Web Application Vulnerabilities on Large Scale\",\"authors\":\"Elwin Shaji, N. Subramanian\",\"doi\":\"10.1109/ICSCAN53069.2021.9526423\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The online presence of organizations is increasing at a rapid pace with the major adaptation of work from home. Organizations have new digital infrastructure being added to their digital portfolio on a regular basis. The threats that organizations face are also increasing at an alarming rate. It is crucial in such a scenario to safeguard and test the new and growing digital infrastructure without causing any interruption to the services provided by these organizations. Through this paper, we would like to inspect six non-intrusive detection methodologies which are useful in the identification of web application vulnerabilities without hampering the organization’s service model. The dataset that was used for real-world analysis consisted of government agencies and reputable organizations. We have assessed these vulnerabilities on the criterion of the statistical probability of finding these vulnerabilities on the dataset. We were able to identify 44 sub-domain takeover vulnerability in 1628 domains (0.02%), 263 cryptographic vulnerabilities (0.17%) and 167 open port vulnerabilities (0.10%) in 1538 domains, and 10,491 GitHub API Leaks were found within 27 organization’s GitHub repository, 3 Cross-Origin Resource Sharing (CORS) misconfigurations in 1213 domains (0.002%) and 0 Wayback machine API leaks from 800 domains.\",\"PeriodicalId\":393569,\"journal\":{\"name\":\"2021 International Conference on System, Computation, Automation and Networking (ICSCAN)\",\"volume\":\"3 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-07-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 International Conference on System, Computation, Automation and Networking (ICSCAN)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSCAN53069.2021.9526423\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on System, Computation, Automation and Networking (ICSCAN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSCAN53069.2021.9526423","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

摘要

随着在家工作的主要适应,组织的在线存在正在迅速增加。组织定期将新的数字基础设施添加到其数字投资组合中。企业所面临的威胁也在以惊人的速度增长。在这种情况下,在不中断这些组织提供的服务的情况下保护和测试新的和不断增长的数字基础设施是至关重要的。通过本文,我们将考察六种非侵入式检测方法,它们在不妨碍组织服务模型的情况下有助于识别web应用程序漏洞。用于现实世界分析的数据集由政府机构和知名组织组成。我们根据在数据集中发现这些漏洞的统计概率标准评估了这些漏洞。我们在1628个域中发现了44个子域接管漏洞(0.02%),在1538个域中发现了263个加密漏洞(0.17%)和167个开放端口漏洞(0.10%),在27个组织的GitHub存储库中发现了10,491个GitHub API泄漏,在1213个域中发现了3个跨域资源共享(CORS)错误配置(0.002%),在800个域中发现了0个Wayback机器API泄漏。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Assessing Non-Intrusive Vulnerability Scanning Methodologies for Detecting Web Application Vulnerabilities on Large Scale
The online presence of organizations is increasing at a rapid pace with the major adaptation of work from home. Organizations have new digital infrastructure being added to their digital portfolio on a regular basis. The threats that organizations face are also increasing at an alarming rate. It is crucial in such a scenario to safeguard and test the new and growing digital infrastructure without causing any interruption to the services provided by these organizations. Through this paper, we would like to inspect six non-intrusive detection methodologies which are useful in the identification of web application vulnerabilities without hampering the organization’s service model. The dataset that was used for real-world analysis consisted of government agencies and reputable organizations. We have assessed these vulnerabilities on the criterion of the statistical probability of finding these vulnerabilities on the dataset. We were able to identify 44 sub-domain takeover vulnerability in 1628 domains (0.02%), 263 cryptographic vulnerabilities (0.17%) and 167 open port vulnerabilities (0.10%) in 1538 domains, and 10,491 GitHub API Leaks were found within 27 organization’s GitHub repository, 3 Cross-Origin Resource Sharing (CORS) misconfigurations in 1213 domains (0.002%) and 0 Wayback machine API leaks from 800 domains.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信