0% found this document useful (0 votes)
78 views9 pages

Paper 2-The Reality of Applying Security in Web Applications in Academia

This document discusses the need to secure web applications in academic institutions. It notes that while many academic websites contain sensitive information, security has not received sufficient attention. The study analyzes vulnerabilities in the websites of several Kuwaiti universities, colleges, and research institutes from 2013-2014. It finds that education systems commonly have vulnerabilities in their web applications. The document recommends that education systems improve web application security and provides techniques to defend against known threats.

Uploaded by

Sharda Shelke
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
78 views9 pages

Paper 2-The Reality of Applying Security in Web Applications in Academia

This document discusses the need to secure web applications in academic institutions. It notes that while many academic websites contain sensitive information, security has not received sufficient attention. The study analyzes vulnerabilities in the websites of several Kuwaiti universities, colleges, and research institutes from 2013-2014. It finds that education systems commonly have vulnerabilities in their web applications. The document recommends that education systems improve web application security and provides techniques to defend against known threats.

Uploaded by

Sharda Shelke
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

(IJACSA) International Journal of Advanced Computer Science and Applications,

Vol. 5, No. 10, 2014

The Reality of Applying Security in Web Applications


in Academia
Mohamed Al-Ibrahim Yousef Shams Al-Deen
College of Basic Education, PAAET Telecommunication & Navigation Institute, PAAET
Kuwait Kuwait

Abstract—Web applications are used in academic institutions, collaborations, discussions, conferences, grading, training,
such as universities, for variety of purposes. Since these web distance learning, research activities and many others. Web
pages contain critical information, securing educational systems applications in education sector usually hold sensitive
is as important as securing any banking system. It has been information, such as faculty-members researches, student
found that many academic institutions have not fully secured grades, staffs accounts ...etc. These data or information need
their web pages against some class of vulnerabilities. In this to be secured from non-authorized users. Unfortunately, the
empirical study, these vulnerabilities are focused and their sense and awareness of securing these data have not received
existences in the web sites of the academic institutions are shown. great attention from academicians. While securing enterprise
The degree of securing web pages in education systems is
data is usually focused on financial, military or demographic
measured. The differences among academic institutions on
organizations, it is often neglected in education organizations.
protecting their web applications are discussed.
Recommendation on ways of protecting websites is addressed. Goals and Contributions:
The main goals behind this research paper are twofold.
Keywords—Web applications; Security; Education systems First, is raising the digital security awareness among
academicians in education, scientific, or research centers.
I. INTRODUCTION
Second, is to identify the main security vulnerabilities in web
A web application is an application that is accessed with a applications in education system. Also, to measure the
web browser over a network such as the Internet or an variation of security level of the education organization from
intranet. Web applications are popular due to the ubiquity of the standard levels of security set by known organizations.
the browser as a client. The ability to update and maintain web Further, to study why education institutions differ in terms of
applications without distributing and installing software on securing their web pages, i.e. what are the factors (budget,
potentially thousands of client computers is a key reason for specialists, technology,…, etc) that affect implementing
their popularity. Web applications are used to implement security procedures.
various sort of applications including E-commerce, online
banking, webmail, business applications and many other The methods includes auditing web application security
functions [15]. for the interactive web site of several academic institutions in
State of Kuwait during the years 2013 and 2014, including
Since the Internet is open systems and the web universities, colleges, and research institutes. The results
applications are increasingly used to deliver critical services, reveal a set of vulnerabilities in web applications that are
they become a valuable target for security attacks. The commonly found in educational systems. It also exposes the
security of the web applications become a main concern to degree of using security technologies in protecting the web
many users of the web applications, especially when the web application against a set of known threats.
application is interactive and requires the exchange of
sensitive information such as financial, health, or credit cards We suggested some defend techniques as counterattack.
numbers. If these web applications were not secured, then the We also list a number of recommendations as security policy.
entire database of sensitive information is at serious risk. The methodology and tools described later in this paper could
Therefore, there was great effort in both the research and be used as guideline for similar studies. The main lesson to
industry community to provide secure communication services address is that educational systems have to revise their web-
to web applications. A great deal of attention has been given based applications against sort of vulnerabilities.
to network-level security, such as port scanning, and great Paper Structure:
achievements have been accomplished at this level as well. The paper is organized as follow. Section II provides a
However, it was found that about 75% of attacks were brief technical background on the security of web technology
targeted to application-level, such as web servers [8]. as well as a literature review on research papers in web
One of the important sectors that exploit the web security. Section III describes the methodology and tools used
technology in their services is the education sector such as in data gathering. Section IV present the results obtained and
research institutions, universities, training organizations …etc. analyzed the outcomes. Section V discusses the factors the
Web application and web sites are heavily used in education affect applying security in institutions. Finally, Section VI
for information dissemination, lectures, assignments, concludes with recommendations.

7|P age
www.ijacsa.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 5, No. 10, 2014

II. BACKGROUND because access to the website has to be made public. Web
It is important at this stage to start defining some security applications often have direct access to backend data such as
terminologies used frequently in this paper. First, a threat is a customer databases. Most web applications are custom-made
danger that could affect the security (confidentiality, integrity, and, therefore, involve a lesser degree of testing than off-the-
availability) of assets in an organization, leading to a potential shelf software. If web applications are compromised, hackers
loss or damage. Vulnerability is the existence of a weakness will have complete access to backend data of the institution
in design or implementation error that can lead to an even though its firewall is configured correctly and its
unexpected, undesirable event compromising the security of operating system and applications are patched repeatedly.
the system. While an Exploit is a software bug, or feature, that Also, network security defense provides no protection against
allows access to a computer system beyond what was web application attacks since these are launched on port 80
originally intended by the operator or programmer. Last, which has to remain open to allow regular operation of the
attack is an action that violates security carried out by an business. It is therefore imperative that the institution
adversary, or an unauthorized entity, trying to carry out a regularly and consistently audit its web applications for
hostile action against a system in a way that may compromise exploitable vulnerabilities.
the system security. The Web platform is a complex C. Web Application Security Organizations
ecosystem composed of a large number of components and
Due to the increase number of incidents of security attacks
technologies, including HTTP protocol, web browser (e.g.,
to web applications, many software vendors had fair efforts to
Explorer, Chrome), server applications (e.g., PHP,ASP) and
clarify the web application security awareness, and type of
client technologies (e.g., Javascript, Flash).
vulnerabilities on the web sites to customers. Nevertheless,
A. Why the need to secure web applications? special, non-profit, charitable organizations have established
Website security is today's most overlooked aspect of solely to promote to the concept of web application security.
securing the enterprise and should be a priority in any The most two important organizations in this area are the
organization. Increasingly, hackers are concentrating their Open Web Application Security Project OWASP [9], and the
efforts on web-based applications – shopping carts, forms, Web Application Security Consortium, WASC [13]. OWASP
login pages, dynamic content, etc. Accessible twenty-four is dedicated to finding and fighting the causes of insecure
hours a day, seven days a week from anywhere in the world, software. Everything in OWASP is free and open source.
insecure web applications provide easy access to backend OWASP provides an awareness document that describes the
corporate databases and also allow hackers to perform illegal top ten web application security vulnerabilities. The OWASP
activities using the attacked sites. According to a report Top-Ten represents a broad consensus about what the most
conducted by Web Application Security Consortium WASC critical web application security flaws are. Also, they provide
[13] reveals that about 49% of the web applications being OWASP Guide Project, a massive document covering all
reviewed contain vulnerabilities of high risk level and more aspects of web application and web service security. Among
than 13% of the website can be compromised. A victim’s other documentation and video presentations, a complete list
website can be used to launch criminal activities such as of their projects can be found in their project home page
hosting phishing sites or to transfer illicit content, while OWASP.
abusing the website’s bandwidth and making its owner liable D. Literatre Review
for these unlawful acts. Another study by Gartner Group [5]
In the last few years, application-level vulnerabilities have
reveals that 75% of cyber-attacks are launched at the web
been exploited with serious consequences: Hackers have
application level. Website security is today's most overlooked
tricked e-commerce sites into shipping goods for no charge,
aspect of securing the enterprise and should be a priority in
usernames and passwords have been harvested, and
any organization. Increasingly, hackers are concentrating their
confidential information (such as addresses and credit-card
efforts on web-based applications – shopping carts, forms,
numbers) has been leaked. Researchers start to investigate
login pages, dynamic content …etc.
new tools and techniques which address the problem of
On the other hand, hackers already have a wide repertoire application-level web security from multiple directions: pre,
of attacks that they regularly launch against organizations within, and post. Glisson,and Welland in [6] argue that
including SQL Injection, Cross Site Scripting, Directory security should be started first before the application
Traversal Attacks, Parameter Manipulation (e.g., URL, development process upfront through an independent flexible
Cookie, HTTP headers, web forms), Authentication Attacks, methodology that contains customizable security components.
Directory Enumeration and other exploits. Moreover, the Scott and Sharp in [10] described a scalable structuring
hacker community is very close-knit; newly discovered web mechanism when developing an application facilitating the
application intrusions, known as Zero Day exploits, are posted abstraction of security policies from large web-applications
on a number of forums and websites known only to members developed in heterogeneous multiplatform environments; and
of that exclusive group. Postings are updated daily and are presented a set of tools which assist programmers in
used to propagate and facilitate further hacking. developing secure applications which are resilient to a wide
range of common attacks. Seo, Kim, Cho and Cha in [11]
B. Why are web applications vulnerable? developed web Intrusion Detection System (IDS) that uses
Although most of the originations try to protect their anomaly-based intrusion detection and application-level IDS
intranet system by firewalls and SSL, firewalls and SSL tailored to web services to detect any security anomalies in
provide no protection against web application hacking, simply web application. On the other hand, Grier, Tang and King in

8|P age
www.ijacsa.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 5, No. 10, 2014

[7] noticed that web browsers itself are not secure enough, so type, their version and any patches were installed; this
they focused on building a new secure web browser that information usually appears in system banner and is helpful to
prevent various vulnerabilities that exist in current browsers. discover well-known vulnerabilities on the server [12].
Other papers presented different ideas (e.g., [2]; [3];[4]. Later Therefore, it is wise to hide such information from non-
a substantial amount of research effort have been devoted to authorized. We used a web vulnerability scanner tools named
hardening web applications and mitigating the attacks. Many Acunetix [1]. This software is used to check a wide range of
of these techniques make assumptions on the web vulnerabilities in a web site, and it includes many innovative
technologies used. Li and Xue [14] argued that a secure web features such as:
application should preserve three security properties: Input
validity means the user input should be validated before it can 1) Automatic JavaScript analyzer
be utilized by the web application; state integrity, means the 2) Industry’s most advanced and in-depth SQL injection
application state should be kept untampered; and logic and Cross-site scripting testing
correctness means the application logic should be executed 3) Visual macro recorder makes testing web forms and
correctly as intended by the developer. password protected areas easy
4) Extensive reporting facilities including OWASP Top 10
III. METHODOLOGY
vulnerabilities
A. Target Destinations. 5) Multi-threaded and lightning fast scanner crawls
We targeted twelve higher-education, academic and hundreds of thousands of pages
research institutes in State of Kuwait who are involved under 6) Intelligent crawler detects web server and application
the umbrella of Ministry of Higher Education (MOHE). These language types
are divided into two categories: governmental & private 7) Crawls, analyzes web sites including flash content
institutes. The governmental institutes are those non-profit
organizations which their budgets are funded directly from the C. Process
government as well there policies. These institutions three in The followed methodology, in this research, to determine
total including Kuwait University (KU), Public Authority for the degree of security in web application servers involved the
Applied Education and Training (PAAET) and Kuwait following steps. First, scanning through the websites of each
Institute for Scientific Research (KISR). The private institutes targeted destination and list all found vulnerabilities. Then,
are profit-based organizations and partially directed to segregate the found vulnerabilities into four types according to
government regulations include nine authorized private their degree of severity, namely: High, Medium, Low and
universities licensed from the Private Universities Council Informational. Later, we identified the vulnerabilities of each
(PUC) which belongs to (MOHE). These colleges or type and list them in separate groups according to their
universities includes (in abbreviations without extension) : severity, and a table for each type was built. Fig.1 is snapshot
ACK, ACM, AUM, AUK, AOU, KILAW,BHCK, GUST, and of a session in a scanning process. Tables 2 through 5 list all
KBMS. vulnerabilities that were found of each type of vulnerability.
Finally, each type of vulnerability was cross-checked with the
The targeted destinations of both categories are basically list of top-ten vulnerabilities of OWASP [9] and if any of the
the application software's that provide services in shape of vulnerabilities were matched, then a 10 percent number was
web-application. The main services in academia are student added.
Information System (SIS). Campus-solution-systems such as
PeopleSoft, Campus Vue, River Vue, Banner,
Academia,…,etc are examples for on-shelf SIS software's.
Due to system limitations in these applications, some colleges
or universities prefer developing in-house applications for SIS
using web technologies, such as ASP, PHP, .Net. to build
dynamic and interactive websites applications and storing
their data in databases.
B. Tools
The software specialist in finding security holes or
vulnerability in websites is called Scanner. Web Scanners
launches an automatic security audit of a website. It consists
of two phases: first is Crawling, the process of building the
site's structure. It enumerates all files and is vital to ensure that
all the files on the website are scanned. Second is Scanning,
the process of inspection intensely to find security
vulnerabilities. By default, scanning process involves
crawling.
Scanners are used to find crackers and possible problems
in the applications. First it collects essential information about
the web application such as web-server, Operating-System Fig. 1. Snapshot of scanning process

9|P age
www.ijacsa.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 5, No. 10, 2014

IV. ANALYSIS A. HIGH


The scanning tool of Acunetix reveals abundant The vulnerabilities of this type of severity are the most
information on the targeted destination under examination that dangerous sort of threats which put a site at maximum risk for
may discloses valuable information useful for tactician the hacking and data theft. It has direct effect on the security,
method of attack. Examples of basic exposed information are integrity, privacy of the information of the websites. A
the following: the used web technology in the host, the malicious user can exploit these vulnerabilities and
operating system running the web server, the versions of compromise the backend database and/or deface the website.
system software's … etc. Other advanced diagnosing The total number of vulnerabilities of all websites that
information includes: distribution of the total alerts for each scanned destinations were limited to fourteen threats. Table 2
type of threat levels (namely High, Medium, Low, and lists these vulnerabilities. From the table, we can define a
Informational), a list of file extensions found and the number shortlist of the most serious attacks that commonly found in
of files per extension (file extensions can provide information education sector are H1 (ASP.NET Padding Oracle
on what technologies are being used on attacked websites), a Vulnerability), H2 (Slow HTTP DOS attack) and H3 (Cross
distribution of top ten files that has lowest response times Site Scripting) with 18% appearance each. These three
measured during the crawling process (the average response vulnerabilities occupy more than 50% of the most potential
time for each host is computed in milliseconds and these files serious attacks. To analyze these three attacks in particular, as
could be targeted in denial of service attacks), a distribution of a sample for type 'High' of severity, a brief description of the
the list of client scripts that contain Javascript code referenced attack and its direct implication as well as quick remedy for
from the website (Javascript is potential threat for many types this threat are shortly described. Fig.2 below presents its
of attacks), list of the external hosts that are linked from the appearance frequency.
organization websites, and finally, a list of email addresses
found on the targeted host.

TABLE I. DISTRIBUTION OF VULNERABILITIES IN INSTITUTIONS


5
4.5
4
Inst

Level High Medium Low Information 3.5


3
ACK 1 0 0 1 2.5
ACM 2 2 6 4 2
AOU 4 11 11 221
1.5
1
AUK 1 11 4 111
0.5
AUM 6 8 2 2 0
BHCK 4 1 22 11
H1 H1 H1 H1 H1 H9 H8 H7 H6 H5 H4 H3 H2 H1
4 3 2 1 0
KBMS 1121 716 11 172
Total 1 1 1 1 0 1 2 1 1 3 1 5 5 5
KILAW 2 1 1 16
Fig. 2. High risk vulnerabilities
GUST 1 2 0 21
PAAET 2 144 12 1 First, H1, ASP.Net uses encryption to hide sensitive data
KU 111 24 11 4 and protect it from tampering by the client. However, a
vulnerability in the ASP.Net encryption implementation can
KISR 0 7 2 4
allow an attacker to decrypt and tamper with this data. This
After scanning tool analyzed target destinations, huge vulnerability exists in all versions of ASP.Net. A direct result
amount of data was accumulated. The total number of of this attack that an attacker who exploited this vulnerability
different threats found in all target destinations for each level could view data, such as the View State, which was encrypted
of severity was as the following: High 14, Medium 15, Low 8, by the target server, or read data on the server, such as
and 9 threats for informational. Table 1 provides statistical web.config. This would allow the attacker to tamper with the
summary on the number of vulnerabilities found for each type contents of the data. By sending back the altered contents to
in the websites of each institution of target destination. an affected server, the attacker could observe the error codes
returned by the server. One of the recommendations to stop
Information revealed from figures Fig. 2 through Fig. 5 this threat is to apply Microsoft patches solely for this
illustrate the frequencies of attacks of each type. It is easy to problem.
note from the graphs the common vulnerabilities that mostly
appeared in the scanned website and their percentages of Second, Slow HTTP POST DoS attacks rely on the fact
appearance according to the total number of found that the HTTP protocol, by design, requires requests to be
vulnerabilities of each type. We can figure out several remarks completely received by the server before they are processed. If
of each type of severity as we detail their discussion in the an HTTP request is not complete, or if the transfer rate is very
following subsections. low, the server keeps its resources busy waiting for the rest of
the data. If the server keeps too many resources busy, this

10 | P a g e
www.ijacsa.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 5, No. 10, 2014

creates a denial of service. The impact is that a single machine result is that SQL Injection threat was appeared only 8%,
can take down another machine's web server with minimal although it was the top threat for many years according to
bandwidth and side effects on unrelated services and ports. OWASP statistics. This gives an indication of spread of web-
One of possible solutions to this problem is that web server security awareness among web developers against this threat.
administrators can isolate or abort the traffic from the source
of the attack. B. MEDIUM
Vulnerabilities of this type are caused by server
Third, Cross site scripting (also referred to as XSS) is a misconfiguration and site-coding flaws which facilitate server
vulnerability that allows an attacker to send malicious code disruption and intrusion. The error messages of this type may
(usually in the form of Javascript) to another user. It is a cause disclose sensitive information. These information can be used
of the lack of input validity property to web applications. This to launch further attacks. Table 3 list the found vulnerabilities.
is because a browser cannot know if the script should be
trusted or not, it will execute the script in the user context TABLE III. MEDIUM RISK VULNERABILITIES
allowing the attacker to access any cookies or session tokens
retained by the browser. The implication is an attacker can No Medium Total %
steal the session cookie and take over the account, M1 Application error message 6 19.4
impersonating the user, and it is also possible to modify the
content of the page presented to the user. The remedy to this M2 Error message on page 4 12.9
threat is that scripts sent from a user as input should filter the M3 HTML form without CSRF protection 3 9.7
metacharacters, i.e. a character that has a special meaning M4 User credentials sent in clear text 5 16.1
(instead of a literal meaning) to a computer program such as \ M5 Web Application Firewall detected 1 3.2
or ; or . (dot) or $ or ? ..etc.
M6 OPTIONS method is enabled 1 3.2
TABLE II. HIGH RISK VULNERABILITIES M7 Possible Virtual Host found 1 3.2
Session Cookie without Http only flag
No High Total % M8 1 3.2
set
H1 ASP.NET Padding Oracle Vulnerability 5 18 M9 Session Cookie without Secure flag set 1 3.2
H2 Slow HTTP DOS attack 5 18
M10 Apache http Remote Denial of Service 1 3.2
H3 Cross Site Scripting 5 18
M11 Apache httpOnly Cookie Disclosure 1 3.2
H4 Apache Tomcat version older than 6.0.35 1 4
H5 Microsoft IIS tilde directory enumeration 3 11 M12 FCKeditor Arbitrary File Upload 1 3.2
H6 WebDAV Directory with Write 1 4 M13 HTML form without CSRF protection 3 9.7
Permissions Unencrypted __VIEWSTATE
H7 WebDAV Remote Code Execution 1 4 M14 1 3.2
parameter
H8 Blind SQL Injection 2 7 M15 SSL weak ciphers 1 3.2
H9 FCKeditor spellchecker.php Cross Site 1 4
Scripting The highest three threats of this type are M1, M2 and M4
H10 jQuery Cross Site Scripting 0 0 are interestingly common in similarity. The three threats share
H11 Spellchecker.php Cross Site Scripting 1 4 the vitality of system messages for malicious users. First, M1
H12 HTTP Parameter Pollution 1 4 represent the problem that error/warning message may
H13 HTML form without CSRF protection 1 4 disclose sensitive information that could lead the adversary to
some facts about the system application. It is usually
H14 CRLF injection/HTTP response splitting 1 4
originated to guide the system administrator to solve the
It is possible to detect short names of files and directories problem, such as the location of the file that produced the
which have MS 8.3 file naming scheme equivalent in unhandled exception, but it may used by adversary to better
Windows by using some vectors in several versions of plan for an attack. Second, M4 reveals the problem of not
Microsoft IIS. For instance, it is possible to detect all short- encrypting user credentials such as input text data such as
names of ".aspx" files as they have 4 letters in their usernames or passwords that make it easy for malicious users
extensions. This can be a major issue especially for the .Net to launch further attacks. This piece of information should
websites which are vulnerable to direct URL access as an always be transferred via an encrypted channel (HTTPS) to
attacker can find important files and folders that they are not avoid being intercepted by adversaries. Third, M2 has similar
normally visible. The severity of this threat stem from the cause and impact as M4. Fortunately, these the three threats
potential for possible disclosure of sensitive information. despite its spread are easy to deal with by applying encryption
on captured text and directing error messages to a designated
One interesting observation can be concluded from the log console. Fig. 3 shows a distribution of this type.

11 | P a g e
www.ijacsa.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 5, No. 10, 2014

6
5 7
4 6
5
3
4
2
3
1
2
0 1
M M M M M M M M M M M M M M M
15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 0
L8 L7 L6 L5 L4 L3 L2 L1
total 1 1 3 1 1 1 1 1 1 1 1 5 3 4 6
Total 1 2 3 2 7 6 5 6
Fig. 3. Medium risk vulnerabilities Fig. 4. Low risk vulnerabilities

C. LOW D. INFORMATIONAL
These vulnerabilities are derived from lack of encryption This type of threats reveal information through Google
of data traffic, or directory path disclosures. In this type of hacking search strings, or email address disclosure. Threat I1,
attacks, the set of highest three appearance of attacks are L4, Broken Links, alone form 30% of this type of attacks. It refers
L3 and L1. First, L4 reflects the security status for an online to any link that should take user to a document, image or
session that is connected to the web in which its cookie does webpage, that actually results in an error. It indicates that a
not have the Secure flag set. When a cookie is set with the page was linked from the website but it is inaccessible
Secure flag, it instructs the browser that the cookie can only be anymore. It may cause problems navigating the site. Second,
accessed over secure SSL channels. This is an important I2 represent the threat of exposure of email addresses that may
security protection for session cookies but does not have not be needed to be exposed and it is the source of the
serious impact. Second, L3 represent a threat of a slow majority of spam problems. Third, I6 represent a threat when a
response time of a webpage when its response time is below new name and password is entered in a form and the form is
the average response time of its site. This types of files can be submitted, the browser asks if the password should be saved.
targeted in denial of service attacks. An attacker can request Thereafter, when the form is displayed, the name and
this page repeatedly from multiple computers until the server password are filled-in automatically or are completed as the
becomes overloaded. Third, L1 threat indicates that the name is entered. An attacker with local access could obtain the
OPTIONS method is enabled on this web server and it clear-text password from the browser cache. The set of threats
provides a list of methods that are supported by the web I1, I2 and I6 represent 60% of threats of this type, but
server, it represents a request for information about the fortunately they are easy to solve or prevent. It seems that the
communication options available on the request/response systems administrator do not have enough tools to discover
chain identified by the Request-URI. The OPTIONS method these threats. Fig. 5 presents the distribution of this type of
may expose sensitive information that may help an malicious threats.
user to prepare more advanced attacks. Therefore, it's
TABLE V. INFORMATIONAL RISK VULNERABILITIES
recommended to disable OPTIONS method on the web server.
Fig. 4 presents distribution of low vulnerabilities
No Informational Total %
TABLE IV. LOW RISK VULNERABILITIES
I1 Broken links 9 30
No Low Total %
I2 Email address found 5 16
L1 OPTIONS method is enabled 6 18.8
Microsoft Frontpage Configuration
L2 Possible sensitive directories 5 15.6 I3 3 10
Information
L3 Slow response time 6 18.8 I4 GHDB: Frontpage extensions for Unix 3 10
L4 Session Cookie without Secure flag set 7 21.9 I5 Possible username or password disclosure 3 10
Session Cookie without HttpOnly flag Password type input with auto-complete
L5 2 6.3 I6 4 13
set enabled
L6 Login page password-guessing attack 3 9.4 I7 Files listed in robots.txt but not linked 1 3
I8 Content type is not specified 1 3
L7 File upload 2 6.3
I9 Error page web server version disclosure 1 3
L8 TRACE method is enabled 1 3.1

12 | P a g e
www.ijacsa.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 5, No. 10, 2014

C. Awareness
10 In case the institution does not have specialist or experts in
information security, the I.T. specialist must have the basic
knowledge in web security in particular. Web application
5 developer should educate themselves with latest threats in web
technology. Several online resources and organizations exist
0 nowadays that frequently update their websites with the recent
I8 I7 I6 I5 I4 I3 I2 I1 knowledge or statistics of threats, attacks, or vulnerabilities in
Total 1 1 4 3 3 3 5 9 web technology. OWASP, WASP are examples for such non-
profit organizations. 56% of total responses were not aware of
embedding security methods in coding in-house applications.
This high figure reflects the fact of obscurity of security
principles among many programmers and system analysts
Fig. 5. Informational risk vulnerabilities when coding software. This has to be thought in early stages
of computer curriculums of programming subjects in colleges
V. DISCUSSION and institutes.
It was obvious from the analysis section early presented in 1) Equipments
Table I regarding the distribution of vulnerabilities in the Special security devices such as firewalls and anti-virus
targeted institutions that most institutions have some weakness form the first defense line of security. Establishing DMZ
in their web security. There is also big disparity among the within network equipment also plays crucial role in guarding
four levels of vulnerabilities, i.e. some have big number of and saving the enterprise assets. 90 % of response indicated
High-level vulnerabilities while having small number of having sophisticated security technology and tools such as
Informational-level vulnerabilities, and vise versa. This raises firewalls and anti -virus, only 30 % indicated having
some questions: why this phenomenon occurs? What are the penetration tools for self diagnosing and testing such as
factors that affect enforcement of security in these Sniffer (networking tool) or Acunetix (security tool).
institutions? To answer these questions, a survey was prepared
and distributed to the I.T. managers in the institutions. The D. Management Support
main affecting factors raised in the survey are: budget, The hypothesis in this item states that the upper
expertise, tools, policies, management support, equipments, management in institutions may not give security of
and awareness. Statistical outcome of each factor is as follow: information a priority when the decision reaches to allocate
A. Budget budget for devices or training in security technology. The case
is opposite in financial organizations, such as banks, where the
This factor reflects the fact that the lack of enough budgets upper management appreciates the safety of their monetary
may affect possessing cutting-edge technology. This assets. This awareness related to upper management should be
hypothesis is important to investigate since there is difference shifted to scholars and managers in education sector to protect
in budgets between private and governmental institutions. All their records and files that may hold vital information such as
governmental institutes in the survey indicated that the budget students grade, ongoing researches, or classified data. This
supported for I.T. is generous, but among the private hypothesis found to be true 57% of total responses indicated
universities 30% declared that they don’t have enough budgets that upper management is not aware the importance of this
dedicated to apply security techniques. On the other hand, issue.
governmental institutes has slower routine process due to the
long documentary cycle in the government for purchasing E. Policies
makes the ordered technology sometimes become obsolete by Deploying security policies enhance overall security in any
the time it arrive, but it is faster in private universities which organization. 78% of total participants indicate deploying
don’t follow this routine. security policies. With further investigation, it was found that
B. Expertise many of security policies were concentrated only on forcing
password changes. In fact, the concept of security policies is
This hypothesis reflects the fact whether the lack of more than this portion. The document in [16] details major
expertise specialist in network security form a deficiency. security policy standards for information systems technology.
Almost all organizations have I.T. department, but few has a
section, unit, or at least specialists in information security. VI. RECOMMENDATIONS
With the diversity and complexity of security problems from
The methods and techniques to protect the web
application layer to physical layer, it becomes essential to
applications can vary from administrational to technical, from
have specialists with profound experience in digital security to
prevention to protection, from coding-level to monitoring-
manage and solve diverse and emerging security issues. Thus,
level. In this section, suggested ideas are presented to make
the existing of threats or vulnerability in a system may give a
deploying web technology in education more secure:
clue of non-awareness in dealing with it. In private
universities, 40% indicated not having security specialist, A. Administrational
while 50% in governmental institutes indicated not having We propose establishing a central authority for the higher
security specialist. education institutions to ensure the safety of digital

13 | P a g e
www.ijacsa.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 5, No. 10, 2014

information that has the authority and power to impose can do this task even built by some operating systems.
security standards on web technology and its applications Moreover, system administrator has to make regular
among higher education institutes and research centers. Since configuration management test to check for commonly used
the information held by these destinations are critical and its application and administrative URLs, and to check for old,
integrity is para important, such as the academic level of backup or unreferenced files. System administrator has also to
students (marks, grades, GPA), or could be of nation security perform regular session management by establishing how
interest (military and intelligence research), or technology sessions are handled in the application, check session tokens
competence (between companies or research centers) …etc, for cookies flags ...etc.
therefore, it is very important that this authority monitors the
web security of their affiliated organizations. This authority is D. Protection
supposed to have the right not to provide license to institutions If an attack launched and discovered, it is possible to take
without passing the security standards of its digital some actions to stop the impact of it. The Denial of Service
information. Also, it has the right to revoke the accreditation attack, for example, can be stopped by testing for anti-
of a university that found to have security breaches in their automation and test for account lockout. Also, system
digital systems. This principle is actually very much adopted administrator should test the proper authorization are done in
in the financial sector. For example, we can notice how the proper way. It is important to test for path traversal, test for
central banks in many countries monitor the monetary and bypassing authorization schema.
interest rates in banks to preserve the stability of economy of
E. Construction
the country. In state of Kuwait, as in this research took place,
the potential organization to take this role is the PUC, which Many threats can be eliminated in early stages when
has the authority to give the licenses to open new private developing the application. SQL injection, for example, is a
colleges and universities in the country, while MOHE can take threat that caused by improper coding which allows taking
same role for governmental and research institutes that their input from user that can later be exploited to masquerade in
budgets are directly funded by the government. Other the database. Also, test for stored Cross Site Scripting (XSS).
countries also have similar organizational authorities with this Many of security problems can be solved from the root if
regard. Assuring quality and accreditation organizations such proper security mechanism were embedded in web
as Accreditation Board for Engineering and Technology applications to ensure that no potential vulnerabilities exist
(ABET) could put digital security assurance among its within the application. Robust program verification in early
evaluation factors to grant accreditation to its evaluated stage against a vector of security vulnerabilities that can
institutions. expose them can dramatically reduce potential attacks.

B. Technical VII. CONCLUSION


Among important issues for any system administrator is to Testing web applications for security vulnerabilities
perform the following tests that are solely related to security something that needs be taken seriously. There are neat tools
of their web technology: and interesting ways to take Web application hiccup, crash or
otherwise give out information one should not be able to see.
1) Test Web Messages or regular basis On the other hand, there are tools and ways to expose these
2) Test for Web Storage SQL injection. vulnerabilities. The results of this study reveal a set of
3) Check SSL versions, Algorithms, Key length. vulnerabilities in web applications that are commonly found in
4) Check for Digital Certificate Validity (Duration, educational systems. These vulnerabilities range in risk from
Signature). high, medium, low to informational threats. It also exposes the
5) Test for user enumeration. degree of security technologies in protecting the web
6) Test for authentication bypass. applications against a set of known threats. We studied the
7) Check if data which should be encrypted. possible reasons behind weakness of security in academic
8) Check for wrong algorithms usage depending on organizations. We suggested some defend techniques as
counterattack. The main lesson to address is that educational
context.
systems holds sensitive digital data and information that is
C. Prevention seductive for intruders, and therefore, have to revise their
System administrators can do some precaution methods to web-based applications against certain vulnerabilities and
prevent possible attacks by closing points of potential exploits. potential risks.
One of the primitive and essential tasks for any system ACKNOWLEDGMENT
administrator is to update their system software's on regular
basis. This includes updating the operating system for This research paper was funded by the Research
advanced editions or any patches and service-pack provided Department at PAAET based on contract number BE-12-07.
by the vendor, also, updating their servers and application REFERENCES
software's, drivers. Yet, the administrator has the [1] Acunetix. Auditing your web site security with Acunetix web
responsibility to gather information about the site under vulnerability scanner. Retrieved March 15, 2013, from website:
control to manually explore the sites to find any holes or bugs http://www.acunetix.com/.
especially for special kind of spider or crawl for missed [2] Cao, M., Xing, T., & Wang, C.. Implementation of web security &
content or hidden source of threat. There are many tools that identity scheme based on session & online table. Proceeding of the 4th
ICCSE '09, pp.1278-1283, 2009.

14 | P a g e
www.ijacsa.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 5, No. 10, 2014

[3] S. Chong, J. Liu, A. C. Myers, X. Qi, K. Vikram, L. Zheng, and X. Internet Computing, IEEE Publication, 6 (6), 38-45, 2002.
Zheng, "Secure web applications via automatic partitioning," in SOSP [11] J. Seo, H. Kim, S.Cho, & S. Cha . Web server attack categorization
'07: Proceedings of the 21st ACM SIGOPS symposium on operating based on root causes and their locations, Proceedings of ITCC’04, 1, 90-
system principles, 2007, pp31-44 96. doi: 10.1109/ITCC.2004.1286431, 2004
[4] Dai, S. & Du,Y. (2009). Design and implementation of dynamic web [12] Vieira, Antunes, & Madeira, Using web seurity scanners to detect
security and defense mechanism Based on NDIS intermediate driver, vulunerabilies in web services . In IEEE/IFIP International conference
Proceeding of APCIP ‘09,1, 506 –509. Conference on Dependable Systems & /networks, 2009,DSN'09,
[5] Gartner, www.gartner.com ESOTRIL (2009)
[6] Glisson, W. & Welland, R. Web development evolution: the [13] WASC, Classes of attacks, Retrieved from
assimilation of Web engineering security, Proceeding of Third Latin website:http://www.webappsec.org/projects/threat/classes_of_attacks.ht
American Web conference, 5 pp. 2005, doi: 10.1109/LAWEB.2005.48 ml
[7] Grier, C., Tang, S. & King, S.T., (2008). Secure web browsing with the [14] Xiaowei Li & Yuan Xue, " A Survey on Web application Security",
OP web browser, Proceeding of IEEE Symposium on Security and ACM Transactions on Computing Surveys, Vol. V, No. N, November,
Privacy, 402-416. doi 1109/SP.2008.19 2013
[8] Livshits, B., & Lam, M. Finding security vulnerabilities in Java [15] Zhou, X., Zhang, Y., & Orlowska, E. (Eds.). Web technologies and
applications with static analysis, Proceedings of the 14th conference on applications, Proceedings of 5th Asia-Pacific Web Conference, Lecture
USENIX Security Symposium, 14, Retrieved 2009 from website Notes in Computer Science, Springer. 2003
http://www.portal.acm.org/, 2005. [16] Technical Security Standard for Information Technology,
[9] OWASP. Open Web Application Security Project . Retrieved from http://www.iwar.org.uk/comsec/resources/standards/canada/tssit97e.pdf,
http://www.owasp.org/ index.php/ OWASP_Top_Ten_Project. Canadian federal government , 1997
[10] Scott, D. & Sharp, R.. Developing secure web applications, Journal of

15 | P a g e
www.ijacsa.thesai.org

You might also like