Vous êtes sur la page 1sur 2

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/266654806

Security vulnerabilities and mitigation techniques of web applications

Article · November 2013


DOI: 10.1145/2523514.2523589

CITATION READS
1 283

1 author:

Hossain Shahriar
Kennesaw State University
103 PUBLICATIONS   664 CITATIONS   

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Mitigating distributed denial of service attacks at the application layer View project

COMPSAC Message View project

All content following this page was uploaded by Hossain Shahriar on 17 December 2015.

The user has requested enhancement of the downloaded file.


Security Vulnerabilities and Mitigation Techniques of Web
Applications
Hossain Shahriar
Department of Computer Science
Kennesaw State University
Kennesaw, GA 30144, USA
hshahria@kennesaw.edu

ABSTRACT result in security breaches such as stealing of confidential


Web applications contain vulnerabilities, which may lead to information and session hijacking. Thus, it is necessity to increase
serious security breaches such as stealing of confidential the awareness of common web security vulnerabilities, their
information. To protect against security breaches, it is necessary impact on the end users, and available mitigation techniques.
to understand the detailed steps of attacks and the pros and cons of In this tutorial, we discuss four types of web application
existing defense mechanisms. This tutorial provides an overview vulnerabilities: SQLI [3], XSS [4], Cross-Site Request Forgery
of four web application security vulnerabilities: SQL injection, (CSRF) [5], and clickjacking [6]. We show examples of
Cross-Site Scripting, Cross-Site Request Forgery, and exploitations for each of the vulnerabilities. Then, we discuss two
clickjacking. Then it discusses two popular mitigation approaches: well-known mitigation approaches: security testing, and
security testing and monitoring. The tutorial is intended to enable monitoring (e.g., [7-10]). Our discussion for security testing
practitioners for choosing the right technique to defend against involves comparing existing mitigation approaches based on some
web application security vulnerabilities. common features such as test case generation, source of test case,
test case granularity, and vulnerability coverage [11]. We examine
Categories and Subject Descriptors existing mitigation techniques based on monitoring objectives
C.2.0 [COMPUTER-COMMUNICATION NETWORKS] such as code execution flow and code structure integrity.
General, Security and protection. The tutorial is intended to highlight the context and applicability
of mitigation approaches. The discussion would enable
H.2.7 [DATABASE ADMINISTRATION] Security, Integrity, practitioners to choose the desired mitigation techniques based on
and Protection. their needs.
General Terms 2. REFERENCES
Security, Languages, Verification. [1] J. Grossman, How does your website security stack up against peers?
White Hat Report, Summer 2012, Accessed from
Keywords https://www.whitehatsec.com/assets/WPstats_summer12_12th.pdf
Web security, SQL Injection, XSS, CSRF, Clickjacking, Security [2] Application Vulnerability Trend Report, CEZNIC White paper, 2013,
testing, monitoring. Accessed from http://info.cenzic.com/rs/cenzic/images/Cenzic-
Application-Vulnerability-Trends-Report-2013.pdf
1. INTRODUCTION [3] SQL Injection, https://www.owasp.org/index.php/SQL_Injection
[4] XSS, https://www.owasp.org/index.php/Cross-site_Scripting_(XSS)
Web applications are implemented in different languages and [5] Cross-Site Request forgery, https://www.owasp.org/index.php/Cross-
many of them contain security vulnerabilities at the code level Site_Request_Forgery_(CSRF).
(e.g., insufficient input sanitization). Some of the vulnerabilities [6] Clickjacking, https://www.owasp.org/index.php/Clickjacking
can be attributed to the runtime features (e.g., browsers attach [7] H. Shahriar, S. North, and W. Chen, “Early Detection of SQL Injection
cookie automatically for outgoing requests). Thus, vulnerabilities Attacks,” International Journal of Network Security & Its
open up the door for attackers to perform malicious activities with Applications (IJNSA), Vol. 5, No. 4, July 2013, pp. 53-65.
or without the knowledge of victims. [8] H. Shahriar, V. Devendran, and H. Haddad, “ProClick: A Framework
for Testing Clickjacking Attacks in Web Applications,” Proc. of 6th
A recent survey by Grossman [1] indicates that web applications
ACM/SIGSAC International Conference on Security of Information
from various domains (e.g., Banking, Healthcare, IT, Education, and Networks (SIN 2013), Aksaray, Turkey, November 2013, 8 pp.
Social Networking) are still commonly found to be vulnerable. (to appear).
Fixing reported vulnerabilities may easily take more than a month. [9] H. Shahriar and M. Zulkernine, “S2XS2: A Server Side Approach to
Another report [2] indicates that SQL Injection (SQLI) and Cross- Automatically Detect XSS Attacks,” Proc. of the 9th IEEE
Site Scripting (XSS) are still the two top ranked vulnerabilities International Conference on Dependable, Autonomic and Secure
widely discovered in web applications followed by session Computing (DASC), Sydney, Australia, December 2011, pp. 7-14.
management related vulnerabilities. These vulnerabilities can [10] H. Shahriar and M. Zulkernine, “Client-Side Detection of Cross-Site
Request Forgery Attacks,” Proc. of the 21st IEEE International
Symposium on Software Reliability Engineering (ISSRE), San Jose,
USA, November 2010, pp. 358-367.
Permission to make digital or hard copies of all or part of this work for [11] H. Shahriar and M. Zulkernine, “Mitigation of Program Security
personal or classroom use is granted without fee provided that copies are Vulnerabilities: Approaches and Challenges,” ACM Computing
not made or distributed for profit or commercial advantage and that Surveys, Vol. 44, No. 3, Article 11, pp. 1-46, May 2012.
copies bear this notice and the full citation on the first page. To copy
otherwise, or republish, to post on servers or to redistribute to lists,
requires prior specific permission and/or a fee.
SIN’13, November 26-28, 2013, Aksaray, Turkey.
Copyright © 2013 ACM 978-1-4503-2498-4/00/10... $15.00

View publication stats

Vous aimerez peut-être aussi