0% found this document useful (0 votes)
84 views5 pages

Kumar 2017

Uploaded by

harsha kulkarni
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
84 views5 pages

Kumar 2017

Uploaded by

harsha kulkarni
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

A Study on Web Application Security and Detecting

Security Vulnerabilities
Sandeep Kumar1, Renuka Mahajan2, Naresh Kumar3, Sunil Kumar Khatri 4
1,3,4
Amity Institute of Information Technology, Amity University Uttar Pradesh, Noida, India
2
Jaipuria Institute of Management, Noida, India
1
[email protected]., [email protected]
3
[email protected],[email protected] , [email protected]

Abstract — The world is exceedingly reliant on the Internet.


Nowadays, web security is biggest challenge in the corporate
world. It is considered as the principle framework for the
worldwide data society. Web applications are prone to security
attacks. Web security is securing a web application layer from
attacks by unauthorized users. A lot of the issues that occur over
a web application is mainly due to the improper input provided
by the client. This paper discusses the different aspects of web
security and it’s weakness. The main elements of web security
techniques such as the passwords, encryption, authentication and
integrity are also discussed in this paper. The anatomy of a web
application attack and the attack techniques are also covered in
details. This paper explores a number of methods for combatting
this class of threats and assesses why they have not proven more
successful. This paper proposes a better way for minimizing these
type of web vulnerabilities. It also provides the best security
mechanisms for the said attacks.

Keywords — Web Security Threats, SQL Injection, Cross Site


Scripting, Security Standards, Security Vulnerabilities.

I. INTRODUCTION
Fig. 1. Percentage of websites containing the vulnerabilities
Web security is an important aspect for web applications.
Today web security is a real concern related to the Internet. It II. LITERATURE REVIEW
is considered as the principle framework for the worldwide
The main issue in web security research is in enabling a user a
data society. Web applications provide a better interface for a
safe and trusted platform for communication with the web
client through a web page .The web page script gets executed
application. But some people continue to do business with
on client web browser.
insecure site. Some organizations or companies don’t want to
Web applications are a main base of attacks such as cross-site reveal the information about their own security holes. So, it’s
scripting, cookie-session theft, browser attack,self-propagating very hard task to get the reliable information about the state of
worms in web email and web sites. These types of attacks are web security today[1],[3][14],[18][21].
called 'injection attacks' which attacks by the use of malicious
There are two common important security vulnerabilities
code. Injection attacks have commanded the highest point of
today: SQL injection and cross-site scripting. These types of
web application vulnerability lists for a significant part of the
vulnerabilities directly affect web servers, application servers,
previous decade.
and web application environment. [13],[4],[5],[7],[20].
There are two most common security vulnerabilities today:
OWASP in this paper explores a number of Table 1: Reasons for
SQL injection and cross-site scripting [11], [12],[16],[21].A
Attacks[2] methods for detecting threats and assess why they
security evaluation of application defencecenter, which had
more than 250 e-commerce applications, online banking and have not proven more successful.A better mechanism for
minimizing such type of web vulnerabilities is proposed in this
the corporate sites came up with a statement that more than
paper. Currently, there are many privacy risks in web
85% of web applications are vulnerable to attacks [2] ,
applications. Today too many websites are hacked by
[10],[15],[22],[23].
anonymous people. They target website because of different
types of reasons. They are mentioned in table 1.

978-1-5090-3012-5/17/$31.00 ©2017 IEEE


2017 6th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions), Sep. 20-22, 2017,
AIIT, Amity University Uttar Pradesh, Noida, India

Attack Goal %
Stealing Sensitive Information 42%
Defacement 23%
Planning Malware 15%
Unknown 08%
Deceit 03%
Blackmail 02%
Link Spam 03%
Worm 01%
Phishing 01%
Information Warfare 01%

Fig. 1. OWASP focussed on identify some vulnerability for the broad array of the organization [2],[10],[11],[23],[19].

III. PROPOSED ARCHITECTURE AND FRAME FOR DETECTING SECURITY VULNERABILITIES

Fig. 2. Website In Vulnerability

The literature survey study of different vulnerabilities define have proposed a scheme through which we will attack any
that two common security vulnerabilities are SQL injection website with SQL injection whether it is prevented by any of
and XSS. Many technology and mechanism are proposed by current available mechanism.
different researchers to prevent the SQL and XSS
attack.During our research we have found out that SQL In our architecture we describe the all sessions.
injection attack and XSS attacks are still possible even after Client: The client of a web browser is effectively making
implementing preventing mechanism presently available in the client requests for pages from servers all over the web. In this
market,and so provide a preventive mechanism we have
proposed the architecture shown in figure 2. In this figurewe
452
2017 6th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions), Sep. 20-22, 2017,
AIIT, Amity University Uttar Pradesh, Noida, India

article client login to system normally,client sends request to This url will change the following SQL statement SELECT
server and gets response.This happens only in normal scenerio. e_info FROM E_Table WHERE E_ID = '' UNION .

Attacker:Attacker is a unauthorized user.Typicallythis kind c. Cross Site Scripting Attack(XSS)


of attacker would be a proficient programmer or engineer with Cross site scripting(XSS) is also serious problem of web
sufficient technical knowledge to understand the weak points application that can be used by an attacker .The attacker can
in a security system. In this article Attacker attacksthe website insert the malicious script in web application through any
through SQL injection and XSS.Uses of SQL injection and external resource.
XSS by the attacker is mentioned below.
The web browser executes the malicious code as a legitimate
a. SQL Injection Attack: code.For example:
The common use of SQL injection attack is to abuse web The hacker can modify the URL and execute the malicious
pages that allows users to input data into form fields for code in URL box.
database queries. Injection is an unintended command sent to http://xyz1.com/index23.asp?search=
an interpreter. Attackers can enter the modified SQL query for
user information. The queries directly communicate with The attacker can add modify statement to the URL and hijack
database for operations on data like data delete, create and the client to his domain.
change .The queries create link of the static part and value
intended for attack .For example: suppose there are two form 1. {get Element sByTagName(“formpage”[02].act io =}
field, one for entering the username and one for password, the 2. ">><script>document.location='
authentication is done as follows: http://www.xyz.com/bin1/cookies.cgi_?'
+document.cookies</script>”
1. String strr ="select count(*)"Form(user) Where uname='
" ?? "'& Password='" ? " ' "; 3. varmsg = '<b><em><p style="color: red
</p></b></em>';
2. SELECT * FROM users WHERE email = 'xx?@x?x.x?x' msg.addInfoMessage(msg);
AND password = md5('???') OR 1 = -1 ]');
The attacker uses this type of script code for cookie theft with
If user has to be allowed to enter apostrophe(') ,use replace the stolen cookie and it helps in accessing the users account.
functions of String class:
“string strrr = UserInput.Replace(" ? ", " ? ");” Server: A server is a program that uses HTTP to serve the
files that form web pages to users, in response to their requests,
b. Url Injection Attack which are forwarded by their system HTTP client. In this
article client sends request to server and gets a
Query url is also a way of attack which is a well crafted attack response.Attacker tracks the session id of user by sending
url . If we have a web page with the url. For example: if you http request to server (eg: GET/user/profie_session_id="xyz")
get an URL like using several malicious code.After this request, server will
http://xyz.&.in/word /abc/abc.html respond to the user's session_id (eg: _session_id="xyz").
Finally, attacker will attaches malicious script into a
Then it means, we do not have any vulnerable points in the
database(commands) and gets response for the query
page. But if the URL is like
accordingly.
http://xyz.s&.com/pro.php?u_id=’xxx’

then ‘u_id=xxx’ is a string type query for the url for can be IV. PROTECTION AGAINST SQL INJECTION
altered by an attacker. The attacker can then enter his query in ATTACKS
url which can give him access to the database, causing an Malicious attacks make web applications less secure because
attack. the intruder can harm the integrity of the database by applying
SELECT * FROM obj WHERE u_id=’xxx’. malicious queries.
‘u_id’ is parameter of this query and xxx is its value .It is fixed PreparedStatementpobj;
type of parameter but attacker can modify its value, which Pobj = con.prepareStatement("select * from std where userid =
makes it vulnerable. For Example:- ?");
http://localhost1/?E_Id=’xxx'; pobj.setString(01, ".?.");
String E_id= “DROP TABLE EmpTable”
The above mentioned query is simple way to curb application
Another type of attack is when the attacker uses a UNION attacks. This can be formed by applying simple changes into
query and merges the special crafted query with the original the server site code. Binding variables is one more way for
query used by the user. control SQL injection attacks and through binding variables
http://localhost/?EmpId=‘ UNION .
453
2017 6th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions), Sep. 20-22, 2017,
AIIT, Amity University Uttar Pradesh, Noida, India

we can improve web applications performance .The developer and have always been an inspiration for achieving greater
should use this type of variable in all SQL statements and also heights.
to Java language which provides better method called prepared
statement .Prepared statement also uses bind variables.To REFERENCES
defend against the SQL injection attacks, we should avoid
passing the input directly into SQL queries. Instead user [1] Tajpour,Atefeh, Maslin Masrom, Mohammad Zaman Heydari,
and Suhaimi Ibrahim. "SQL injection detection and prevention
should use parameterized statements or sanitized input filtered
tools assessment" In Computer Science andInformation
carefully. In order to sanitize the provided user input, it should Technology (ICCSIT), 2010 3rd IEEE International Conference
be bound to a parameter and input must be done through a on, vol. 9, pp. 518-522. IEEE,2010.
filtering or sanitizing method .The main purpose of this [2] Ali, S., Shahzad, S.K., and Javed, H., SQLIPA: An
method is that it adds a back slash('\') against all malicious Authentication Mechanism Against SQL Injection.European
code. Journal of Scientific Research, Vol. 38, No. 4, 2009, pp. 604-
611.
V. PROTECTION AGAINST CROSS-SITE SCRIPTING [3] Sadana, S. J. and Selam, N. “Analysis of Cross Site Scripting
ATTACKS Attack,” Proc. International Journal of Engineering Research and
Applications (IJERA), vol. 1, no 4, pp 1764-1773, 2011.
Nowadays cross-site scripting attacks occur because the [4] Kumar, R. “Mitigating the authentication vulnerabilities in Web
developers add some vulnerability to the code. Every applications through security requirements,” Information and
developer is responsible for attacks because developer should Communication Technologies (WICT), vol. 60, pp 651–663,
understand what kind of attacks are possible on web 2011.
application .Never trust user input because the user can insert [5] Avancini, A. and Ceccato, M. “Towards Security Testing with
any type of characters and always use filter metacharacters as Taint Analysis and Genetic Algorithms,” ICSE Workshop on
it reduce the XSS attacks. Developers should convert whats Software Engineering for Secure Systems, vol. 5, pp. 65–71,
written between any two tages, which are enclosed in '<' and 2010.
'>'. XSS holes can damage your application because the [6] Shar, L. S. Tan, H. B. K. and Briand, L. C. “Mining SQL
attackers will disclose these type of holes to the public and injection and cross site scripting vulnerabilities using hybrid
program analysis,” Proc. of Int. Conf. on Software Engineering
often everyone can see your personal information. Filtering
(ICSE '13) IEEE Press, pp 642- 651, 2013.
does not provide a proper solution for cross site scripting
[7] Li, Y. Wang, Z. and Guo, T. “Reflected XSS Vulnerability
attacks. But if developers use &#41; and &#40;, to &quot ; , '
Analysis,” International Research Journal of Computer Science
to &#39; and convert # and & to &#35;(#) and &amp; (&). and Information Systems (IRJCSIS),vol. 2, pp 25-33, 2013.
[8] Shar, L. K. and Tan, H. B. K. “Automated removal of cross site
VI. CONCLUSION
scripting vulnerabilities in web applications,” Inf. Softw.
Technol., vol. 54, pp 467–478, 2012.
This research paper provides a complete survey of current
[9] Yang Haixia And Nan Zhihong , “A Database Security Testing
research results under web application security. We have
Scheme Of Web Application” , 4th International Conference On
covered all properties of web application development, Computer Science And Education,2009 , IEEE, PP .953- 955.
understood the important security functions and properties that
[10] Meijunjin ,”An Approach For Sql Injection Vulnerability
secure web applications should use and divided existing works Detection” , 2009 Sixth International Conference On Information
into three major classes .we also discuss a few issues that still Technology :New Generations IEEE , PP 1411- 1414.
need to be considered. [11] Marashdih Abdalla Wasef, ZaabaZarulFitri Cross Site
ScriptingDetection Approaches in Web Application ,
To access a few out of the box features in web applications International Journal of Advanced Computer Science and
various programming concept and tools are taking place that Applications,Vol.7, No.10,pp 155-160, 2016
cause essential security aspects to our applications .Apart from [12] YongJoonPark ,JaeChul Park , “Web Application Intrusion
this security researchers applying required efforts to extend Detection System For Input Validation Attack” , Third 2008
security features to web applications by several tools and International Conference On Convergence And Hybrid
techniques. Information Technology ,IEEE, PP 498-504.
[13] AvanciniAndrea , Bruno Fondazione Kessler, “Security
Generally, our logics and crucial codes resides at client side Testing of Web Applications: A Research Plan”,IEEEICSE
that is our browser that exposes programmer concepts .Thus '12 , Proceedings of the 34th International Conference on
for attackers it becomes easy to intercept the logics and cause Software Engineering 2012, Zurich, Switzerland,pp. 1491-
total damage to the server-side state of the application. 1494.
[14] V. Prokhorenko, K.-K. R. Choo, and H. Ashman, “Web
ACKNOWLEDGEMENT application protection techniques: a taxonomy,” Journal of
Network and Computer Applications, vol. 60, pp. 95–112, 2016.
Authors express their deep sense of gratitude to the Founder [15] Sonam Panda, 1 Ramani S2,” Protection of Web Application
President of Amity University, Dr. Ashok K Chauhan for his against Sql Injection Attacks”, International Journal of Modern
keen interest in promoting research in the Amity University Engineering Research (IJMER)www.ijmer.com Vol.3, Issue.1,
Jan-Feb. 2013 pp-166-168 ISSN: 2249-6645.
454
2017 6th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions), Sep. 20-22, 2017,
AIIT, Amity University Uttar Pradesh, Noida, India

[16] S. W. Boyd, G. S. Kc, M. E. Locasto, A. D. Keromytis, and V. [21] Yousra Faisal Gad MahgoupElhakeem ,Bazara I. A. Barry,”
Prevelakis, “On the general applicability of instruction-set Developing a Security Model to Protect Websites from Cross-
randomization,” IEEE Transactions on Dependable and Secure site Scripting Attacks Using Zend Framework Application”,
Computing, vol. 7, no. 3, pp. 255–270, 2010. International Conference on Computing, Electrical and
[17] K. Elshazly, Y. Fouad, M. Saleh, and A. Sewisy, “A survey of Electronics Engineering (ICCEEE), August 2013, PP. 624-629
SQL injection attack detection and prevention,” Journal of [22] Atul S. Choudhary and M.L Dhore, “CIDT: Detection Of
Computer and Communications, vol. 2, no. 8, pp. 1–9, 2014. Malicious Code Injection Attacks On Web Application”,
[18] A. Azfar, K.-K. R. Choo, and L. Liu, “A study of ten popular International Journal Of Computing Applications Volume-52-
Android mobile VoIP applications: are the communications N0.2, August 2012, PP. 19- 25.
encrypted?” in Proceedings of the 47th Hawaii International [23] Avancini, A. and Ceccato, M. “Towards Security Testing with
Conference on System Sciences (HICSS ’14), pp. 4858–4867, Taint Analysis and Genetic Algorithms,” ICSE Workshop on
IEEE, Waikoloa, Hawaii, USA, January 2014. Software Engineering for Secure Systems, vol. 5, pp. 65–71,
[19] A. Azfar, K. K. R. Choo, and L. Liu, “Forensic taxonomy of 2010.
popular Android mHealth apps,” in Proceedings of the 21st
Americas Conference on Information Systems (AMCIS ’15),
San Juan, Puerto Rico, August 2015.
[20] A. Azfar, K. K. R. Choo, and L. Liu, “An android
communication app forensic taxonomy,” Journal of Forensic
Sciences, vol. 61, no. 5, pp. 1337–1350, 2016.

455

You might also like