0% found this document useful (0 votes)
3 views7 pages

Detection Prevention of Website Vulnerabilities

The document discusses the detection and prevention of website vulnerabilities, focusing on common attacks such as SQL injection and cross-site scripting. It presents a proposed tool aimed at educating security analysts and developers on identifying and mitigating these vulnerabilities in web applications. The paper also reviews existing tools and their effectiveness in addressing web security issues, highlighting the need for continuous improvement in web application security practices.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views7 pages

Detection Prevention of Website Vulnerabilities

The document discusses the detection and prevention of website vulnerabilities, focusing on common attacks such as SQL injection and cross-site scripting. It presents a proposed tool aimed at educating security analysts and developers on identifying and mitigating these vulnerabilities in web applications. The paper also reviews existing tools and their effectiveness in addressing web security issues, highlighting the need for continuous improvement in web application security practices.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Proceedings of the 2nd International Conference on Communication and Electronics Systems (ICCES 2017)

IEEE Xplore Compliant - Part Number:CFP17AWO-ART, ISBN:978-1-5090-5013-0

Detection & prevention of website vulnerabilities:


Current Scenario and Future Trends
Himanshi Singh Mohit Dua
Department of Computer Science Assistant Professor, Department of Computer Science
NIT Kurukshetra NIT Kurukshetra
Kurukshetra, India Kurukshetra, India
[email protected] [email protected]

Abstract- Nowadays, web applications occupies larger part of our application. Whenever there is an interaction between client
life. Major exercises are appurtenant on the security of these and server, the actual attack starts wherever the application is
applications. Web application attacks like brute force, injection rendered, it gives attacker a chance to input malicious code or
have become normal since past few years. Many attacks work at commands through the browser. Later information is passed to
the real time. Mostly methods focus on prevention and detection
the server, whenever it reaches to the backend through the
of these attacks on the web applications. The main goal of the
presented work is different from the studies going on these days query leading to the SQL injection attack and sometimes it
on web application security. This work focus on the possible post back to the client-server browser, which is known as
attacks on websites whether SQL injection, cross site cross site scripting attack. These attacks gives the
scripting(XSS), etc. The proposed tool teaches the security unauthorized access to the user for system resources.
analysts and the student pursing in information security about Majorly, these attacks misconduct innocent user once the
how to check the web applications vulnerabilities. This work has malicious queries are retrieved and becomes the part of the
used XAMPP server for server and client environment. internet. To overcome these types of attacks we should stop
users to use internet, which is impossible in these days.
Keywords- Web application vulnerability, cross site scripting
Although internet has the capability to question the user if
attack, SQL injection attack, brute force attack, vampbug web
application tool activities are malicious. There is no access at back end to
retrieve the database neither there is any method to have
I. Introduction secure transactions online. So, the measure for these attacks is
Website security has become a huge topic these days. All the to recognize them at benign and asking developers to fix them.
activities are taking place on machines. With the help of In this research paper we have discussed the various ideas of
different browsers the client can access server database or various authors presented in this field past few years. Later we
another resources to exchange information. The websites have discussed about our tool which focus on teaching the
which gives huge online facilities like social networking, methodology of performing these attacks for information
banking, business transactions, and many more, has the higher security scholars and cooperate developers for securing their
responsibilities of securing the database online. They should websites from these attacks.
keep there servers up to date so that there are no loop holes The proposed tool focuses on all the OWASP top 10 listed
left behind in the developing state. The security analysts attacks. This gives the developers a strength about how they
should provide the developers the loose points on the web can fix those bugs by using queries for accessing back end
applications. information. The tool gives the security to developers that how
The statistics[24] of 2017 says that almost 30% of attacks are they can get their websites free from attackers.
made on web applications. 62% data has been involved in The researches around the tools developed in past few years.
[1]
hacking to accomplish vulnerabilities. 81% bug correlated Dwivedi etl., in their propose tool has discusses about the
apertures that bargaining chip fragile or embezzled passwords. perception of SQL injection which is a trivial problem for all
93% fiscally galvanized, perpetrated by established the web-based applications in past few days. They have
illegitimate bodies. 77% hauls out by botnets, not individuals. recapitulated up a array of proficiency existing for protecting
32% oppressed SQL Injection errors. data from SQL injections, that make changes in the program
The major attacks listed by OWASP in their 2015 survey, behavior of the website permitting the attacker to recapture
SQL injection attacks and XSS holds the top spots. The and tweak the database. SQLAS detect the vulnerabilities in
websites are more prone to these attacks. The injection attack the source code. [2]Jin etl., have developed a tool which
happens when one input is pass through the website and it is assesses the extent of vulnerability in android applications,
able to access the database and other resources of the web and enforce a tool to analyze PhoneGap apps collected from
the android vendors. The tool abate 478 applications as
vulnerable, with only 2.30% negatives. [3]Tajpour etl., have
discusses legion types of SQL attacks. The tool detects and
prevents SQL injection attacks. And, also compares the tool
with other existing tools. [4] Khochare etl., have proposes an
application firewall tool. This tool helps the web applications
to be protected from hackers. It analyzes the incoming request
978-1-5090-5013-0/17/$31.00 ©2017 IEEE 429
and outoing response. [5]Bau etl., proposes a tool for detecting vulnerabilities. [7]Rohilla etl., proposes a tool to show XSS
black box vulnerabilities in the web applications. They have vulnerabilities that how easy it is to inject malicious code in
also found the black box scanners for finding vulnerabilities. cookies.
[6]
Bhojak etl., proposes a vulnerability scanner that interpret
websites for exploitable SQL injection and XSS attack

Database
GUI Database Manager
Web Form

Finished Task
Trigger

Thread Controller Attacking Task

Workflow Controller
Worker Thread
Attacking Task

Worker Thread
Queue Controller
Attcking Module
Attacking Task

Worker Thread
Analysis Module
Attacking Task

Attacking Queue

Figure 1: Flow Chart of Present Architecture

II. Related Work programs like, efficiency, effectiveness, stability, flexibility,


In the first paper of discussion, [1]Dwivedi etl., have discusses performance.
[4]
about SQL injection attack, which is a normal problem for Khochare etl., proposes an application firewall tool for
website attacks these days. They have proposed a tool for protection of web applications from attakers. The proposed
prevention and detection of SQL injection attack, which is tool analyzes the incoming request to web applications and
SQLAS. They have discussed about various techniques for responses of those requests from web applications. There is a
protecting the database of websites from SQL injection attack. business logic module in the tool which has all database of
Their proposed tool SQLAS, detects the errors in the source incursion, apothegms and approaches for detection and
code which can be vulnerable in future. It gives the developer prevention of web applications. The tool secures web
a chance of eyeball the structure. Detection of vulnerabilities applications from SQL injection attacks, cross site scripting
is done by endorsing the queries of SQL which are based on (XSS) attack, buffer overflow attack, cookie poisoning,
XML apothegm with the description of the injection type forceful browsing and directory traversal attacks.
[5]
performed on them. If possible vulnerability is exposed in the Bau etl., have discusses about the black box vulnerabilities
nature type then a warning message appeared to the developer. in their article. They have made black box scanners for
It also provides the line number in which vulnerability has detecting vulnerabilities of black box. They have found that
detected. This helps the developer to make a code attack free black-box web application vulnerability scanners do expend
by making modifications in the SQL commands. They testing effort in fuzzy distribution to the vulnerability citizenry
concluded by expressing the robust feature of their tool as to in the wild.
[6]
tell the developers an error during the development time only. Bhojak etl., article tells about how accessible it is to find
[2]
Jin etl., studied the embryonic of risk imposed by HTML5 vulnerabilities and exploit them in many web applications.
mobile apps. In a research they have identified many unique The popular example of vulnerabilities is consider as input
channels which can be easily inject in the code such as, validation attacks. They have discussed that many developers
contacts, messages, barcode etc. they implemented the tool on are unaware of security in web applications. Due to which
PhoneGap aps from Google playstore to find the there is general dissension that prevail a large number of
vulnerabilities in those apps. 478 tools were used to find the vulnerable applications and web sites on the web. Their
vulnerabilities. A prototype was used named NoInjection as a research proposed the flow of web vulnerability scanner that
patch to phone gap framework in android. It filters the inspect web sites for naive SQL and XSS vulnerabilities.
[7]
vulnerabilities in code from the attack channel. Rohilla etl., in their study has conducted a survey on Cross
[3]
Tajpour etl., has presented the various type of SQL injection Site Scripting attack (XSS) with different real life worms to
attacks in their paper. Also, compares various type of tool for show how facile it is to attain the vulnerabilities of a web
detection and prevention of SQL injection attack, on the basis based application. The worms taken consider are actually
of their ability to stop SQL injection attack. Factors of affecting banking, social networking, healthcare, etc. These
comparison are deployment requirement and evaluation worms on web applications like stealing cookies details, credit

430
card number, passwords and data breaches, are serious effects effort accessible, now they just need to do is to conclude the
on the web applications. authentication task for validating any web application data.

III. PRESENT ARCHITECTURE


All the authors discussed above has used the architecture as
discussed above in figure 1.

IV. CORE TECHNOLOGIES


In this topic we discuss about the technologies used in the
studies paper. [1]Dwivedi etl., have discussed the SQL
injection for PHP web applications they have proposed a tool
for detection and prevention of SQL attack which will be
effectual for simple and composite data structures. This tool
makes it easy for implementation. During implementation all
the data will be at the secure place. These will be stored in
some XML data format and referred as XML-rules. So
whenever any script comes as an input from client , the server
checks it in XML sheet. The XML rules will be written and Figure 2: XML Rules
stored individually for each input. This makes the developer

Figure 3: Web Application Security in HTML5


[2]
Jin etl., have discussed various techniques of android phones
vulnerabilities. They have studied the potential of risk
imposed by HTML5 mobile applications. In their research
they have identified many unique channels which can be inject
in the code such as, contacts, messages, barcode etc. they
implemented the tool on PhoneGap aps from Google playstore
to find the vulnerabilities in those apps. 478 tools were used to
find the vulnerabilities. A prototype was used named
NoInjection as a plot to phone gap groundwork in android. It
filters the vulnerabilities in code from the attack channel.
[3]
Tajpour etl. , have discussed different types of SQL attacks
with the queries applied on it. They have described
vulnerabilities in three types such as, an attacker sending
malicious HTTP inquiry to web application, creating SQL
commands and acknowledging the SQL statements to
beaconed database.
They have also discussed the various SQL injection attack
types like blind injection, timing attack, inference and Figure 4: SQL Injection Login Flowchart
alternate encodings. In the end they have also discussed about
different tools of SQL injection attack detection and
prevention in comparison with their proposed tool.
[4]
Khochare etl., has proposed an access to inhibit web
applications and servers consists of different scheduling. It
aims at four factors, such as, auditing incoming and outgoing
request of web servers, identifying all the calls and feedback
response with firewall guidelines, policies, and the attack
431
[6]
definition currently at database, block the malicious calling Bhojak etl., have discussed the various SQL queries used
and feedback, and users become observant about the attack for web application attack. Like, bypassing command which is
that has been detected. “1=1--”, for accessing database of website. For XSS attack,
The tool prevents web application from malicious request the attacks are reflected and stored. The string used for the
from attackers and unauthorized access to web sites and web attack can be URL encoded such that content is scrawled for
servers. Before sending to final destination, firewall normal user on internet. The outbreak is considered lucrative
application filters the traffic. Also, examines each request and when victim visits the particular URL. The query for
response of web servers. accessing database is given as:
[5]
Bau etl., in their research has discussed the usage of tool by
writing URL of web application and also providing single user
[7]
credential for application. User need to specify option for the Rohilla etl., in their study has conducted a survey on Cross
page crawler for making maximization of page scanning. The Site Scripting attack (XSS) with different real life worms that
scanner allows crawl only mode so; user can verify that given show easiness to exploit the vulnerabilities of an application
credentials are working properly. After this user sets up the designed on web. The worms taken consider are actually
scanning profile that is used in the detection of the affecting banking, social networking, healthcare, etc. These
vulnerability. After profile selection all scanners can run worms on web applications like stealing cookies details, credit
automatically. Many of them provide user mode where user card number, passwords and data breaches, are serious effects
can put values for scanning. on the web applications. They have discussed various worms
on banking site, social networking site, etc.

Figure 5: URL Scanner

432
Figure 6: XSS Flow Chart

V. FUTURE WORK VI. Conclusion


Till now, all the present tools focus on particular Main goal of this paper is to carry out a survey on the web
vulnerabilities on website. Accuracy percentage of these tools application tools for detection and prevention of
is 77% approximately. vulnerabilities. Further, it also carries a comparative analysis
The proposed tool will show vulnerabilities in website. All of the survey and is thus concludes with that web application
the OWASP top 10 attacks will be covered in it. The tool will tool is recommended above other means of optimizations
focus on all the loopholes in the website regarding the cyber because it provides clarity and errors in case of particular
attacks and a report will be generated in a PDF manner for the attacks. The paper provides various results as per their tools
tester. The tester can also download the report and then working.
generalize all the vulnerabilities.
The graphics are used to show the estimated percentage of
loopholes in website, making easier for tester to understand. Acknowledgement

This research is supported by NIT, Kurukshetra. We are


thankful to university for their support and for providing
necessary guidance concerning project implementation.

433
TABLE 2: A COMPARATIVE ANALYSIS OF WEB APPLICATIONS INTO VARIOUS APPLICATION DOMAINS.

Sr.N Author’s Issue Area of Merits Demerits Tools used


o. name addressed application

1. Vandana SQL injection PHP web It provides developers a method It only consider PHP, MySQL,
Dwivedi attack application to detect and prevent their web PHP based XML
(2015) applications. applications.

2. Xing Jin HTML5based HTML-5 android Examines different channels used The tool abates PhoneGap
(2014) mobile applications for injecting code. To determine 478 applications
applications. the term of such a vulnerability in as vulnerable,
android applications. with only 2.30%
negativity.

3. Atefeh SQL Injection Web Application Comparison of tools is based on Tools are not SQL
Tajpour requirements of deploying and compared on the
(2012) common evaluation parameters. basis of
efficiency,
effectiveness,
stability, and
performance.
4. Nilesh Web Attacks Web Application The tool prevents web application Anomaly Firewalls
Khochare Firewalls from different types of attacks detection
(2012) like SQL injection, cross site module is not
scripting, buffer overflow, cookie discussed in the
poisoning, forceful browsing and paper
directory traversal.
5. Jason Bau Black Box Web Application The idea explains that black-box Low coverage JAVA
(2010) Vulnerabilities web application vulnerability result for
scanners executes, consumes SilverLight,
testing endeavor in fuzzy Flash and JAVA
distribution to the vulnerability applet
populace in native.

6. Priyank SQL Injection Web Application It shows easiness in discovering Detection is Not specified
Bhojak And XSS and escapades large number of considered as
(2015) Vulnerabilities vulnerabilities in web resultant.
applications.

7. Monika XSS Attacks Web Application Discussed serious effect of these Expanding JAVA
Rohilla worms on web applications like research on
(2016) stealing cookie details, credit card other web
number, password and data applications
breaches.

434
References
http://www.ngssoftware.com/papers/advanced_sql_injection.pdf
[1] Vandana Dwivedi, Himanshu Yadav and Anurag Jain,
[13] K. Spett , “Blind SQL Injection”,
“SQLAS: TOOL TO DETECT AND PREVENT ATTACKS IN
http://p17linuxzone.de/docs/pdf/Blind_SQL_Injection.pdf
PHP WEB APPLICATIONS” ,International Journal of Security,
[14] R. A. McClure and I. H. Kr¨uger, “Sql dom: compile time
Privacy and Trust Management (IJSPTM) Vol 4, No 1, February
checking of dynamic sql statements,” in Proceedings of the 27th
2015
international conference on Software engineering, ser. ICSE ’05,
[2] Xing Jin, Xunchao Hu, Kailiang Ying, Wenliang Du, Heng
2005, pp. 88–96.
Yin and Gautam Nagesh Peri “Code Injection Attacks on
[15] K. Kemalis and T. Tzouramanis, “Sql-ids: a specification
HTML5-based Mobile Apps: Characterization, Detection and
based approach for sql-injection detection,” in Proceedings of the
Mitigation”
2008 ACM symposium on Applied computing, ser. SAC ’08.
[3] Atefeh Tajpour , Suhaimi Ibrahim, Mohammad Sharifi ,
ACM, 2008, pp. 2153–2158.
“Web Application Security by SQL Injection DetectionTools”,
[16] D. Scott and R. Sharp, “Abstracting application-level web
IJCSIInternational Journal of Computer Science Issues, Vol. 9,
security,” in Proceedings of the 11th international conference on
Issue 2, No 3, March 2012 ISSN (Online): 1694-0814
World Wide Web, ser. WWW ’02, 2002, pp. 396–407.
www.IJCSI.org
[17] P.Grazie, “Phd sqlprevent thesis,” Ph.D. dissertation,
[4] Nilesh Khochare , Dr.B.B.Meshram , “Tool to Detect and
University of British Columbia(UBC) Vancouver, Canada, 2008.
Prevent Web Attacks “, ISSN: 2278 – 1323 International Journal
[18] M. Cova, D. Balzarotti, V. Felmetsger, and G. Vigna,
of Advanced Research in Computer Engineering & Technology
“Swaddler: An approach for the anomaly-based detection of state
Volume 1, Issue 4, June 2012
violations in web applications,” 2007.
[5] Jason Bau, Elie Bursztein, Divij Gupta, John Mitchell
[19] S. W. Boyd and A. D. Keromytis, “Sqlrand: Preventing sql
“StateoftheArt:AutomatedBlack-
injection attacks,” in In Proceedings of the 2nd Applied
BoxWebApplicationVulnerabilityTesting”
Cryptography and Network Security (ACNS) Conference, 2004,
[6] Priyank Bhojak, Kanu Patel, Vikram Agrawal, Vatsal Shah,
pp. 292–302.
“SQL Injection and XSS Vulnerability Detection in Web
[20] W. G. J. Halfond, A. Orso, and P. Manolios, “Using positive
Application “ Volume 5, Issue 12, December 2015 ISSN: 2277
tainting and syntax-aware evaluation to counter sql injection
128X International Journal of Advanced Research in Computer
attacks,” in Proceedings of the 14th ACM SIGSOFT international
Science and Software Engineering
symposium on Foundations of software engineering, ser.
[7] Monika Rohilla, Rakesh Kumar, Girdhar Gopal , “XSS
SIGSOFT ’06/FSE-14, 2006, pp. 175–185.
Attacks: Analysis, Prevention & Detection” Volume 6, Issue 6,
[21] V. Haldar, D. Chandra, and M. Franz, “Dynamic taint
June 2016 ISSN: 2277 128X International Journal of Advanced
propagation for java,” in Proceedings of the 21st Annual Computer
Research in Computer Science and Software Engineering
Security Applications Conference, ser. ACSAC ’05, 2005, pp.
[8] OWASP, “Top Ten Project
303–311.
http://www.owasp.org/index.php/Category:OWASP_Top_Ten_P
[22] G. Buehrer, B. W. Weide, and P. A. G. Sivilotti, “Using parse
roject
tree validation to prevent sql injection attacks,” in Proceedings of
[9] D. Stuttard, M. Pinto, “The Web Application Hacker's
the 5th international workshop on Software engineering and
Handbook: Discovering and Exploiting Security Flaws”, Wiley,
middleware, ser. SEM ’05, 2005, pp. 106–113.
2007
[23] Z. Su and G. Wassermann, “The essence of command
[10] PHP Security Consortium, “PHP Security Guide”,
injection attacks in web applications,” SIGPLAN Not., vol. 41, no.
http://phpsec.org/projects/guide/
1, pp. 372–382, Jan. 2006.
[11] “Ruby On Rails Security Guide”,
[24] Web Application Security Statistics Report, the Case for
http://guides.rubyonrails.org/security.html
DevSecOps by White Hat security, volume 12, 2017
[12] C. Anley, “Advanced SQL Injection In SQL Server
(https://info.whitehatsec.com/rs/675-YBI
Applications”,
674/images/WHS%202017%20Application%20Security%20Repor
t%20FINAL.pdf)

435

You might also like