Behind an Application Firewall, Are We Safe from SQL Injection Attacks?

Dennis Appelt, Duy Cu Nguyen, L. Briand
{"title":"Behind an Application Firewall, Are We Safe from SQL Injection Attacks?","authors":"Dennis Appelt, Duy Cu Nguyen, L. Briand","doi":"10.1109/ICST.2015.7102581","DOIUrl":null,"url":null,"abstract":"Web application firewalls are an indispensable layer to protect online systems from attacks. However, the fast pace at which new kinds of attacks appear and their sophistication require that firewalls be updated and tested regularly as otherwise they will be circumvented. In this paper, we focus our research on web application firewalls and SQL injection attacks. We present a machine learning-based testing approach to detect holes in firewalls that let SQL injection attacks bypass. At the beginning, the approach can automatically generate diverse attack payloads, which can be seeded into inputs of web- based applications, and then submit them to a system that is protected by a firewall. Incrementally learning from the tests that are blocked or passed by the firewall, our approach can then select tests that exhibit characteristics associated with bypassing the firewall and mutate them to efficiently generate new bypassing attacks. In the race against cyber attacks, time is vital. Being able to learn and anticipate more attacks that can circumvent a firewall in a timely manner is very important in order to quickly fix or fine-tune the firewall. We developed a tool that implements the approach and evaluated it on ModSecurity, a widely used application firewall. The results we obtained suggest a good performance and efficiency in detecting holes in the firewall that could let SQLi attacks go undetected.","PeriodicalId":401414,"journal":{"name":"2015 IEEE 8th International Conference on Software Testing, Verification and Validation (ICST)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"40","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 IEEE 8th International Conference on Software Testing, Verification and Validation (ICST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICST.2015.7102581","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 40

Abstract

Web application firewalls are an indispensable layer to protect online systems from attacks. However, the fast pace at which new kinds of attacks appear and their sophistication require that firewalls be updated and tested regularly as otherwise they will be circumvented. In this paper, we focus our research on web application firewalls and SQL injection attacks. We present a machine learning-based testing approach to detect holes in firewalls that let SQL injection attacks bypass. At the beginning, the approach can automatically generate diverse attack payloads, which can be seeded into inputs of web- based applications, and then submit them to a system that is protected by a firewall. Incrementally learning from the tests that are blocked or passed by the firewall, our approach can then select tests that exhibit characteristics associated with bypassing the firewall and mutate them to efficiently generate new bypassing attacks. In the race against cyber attacks, time is vital. Being able to learn and anticipate more attacks that can circumvent a firewall in a timely manner is very important in order to quickly fix or fine-tune the firewall. We developed a tool that implements the approach and evaluated it on ModSecurity, a widely used application firewall. The results we obtained suggest a good performance and efficiency in detecting holes in the firewall that could let SQLi attacks go undetected.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
在应用程序防火墙后面,我们是否安全免受SQL注入攻击?
Web应用程序防火墙是保护在线系统免受攻击的不可或缺的一层。然而,新类型攻击出现的速度之快及其复杂性要求防火墙定期更新和测试,否则它们将被绕过。本文主要对web应用防火墙和SQL注入攻击进行了研究。我们提出了一种基于机器学习的测试方法来检测防火墙中让SQL注入攻击绕过的漏洞。首先,该方法可以自动生成各种攻击有效载荷,这些有效载荷可以被播种到基于web的应用程序的输入中,然后提交给受防火墙保护的系统。从被防火墙阻止或通过的测试中逐步学习,我们的方法可以选择表现出与绕过防火墙相关特征的测试,并对它们进行变异,以有效地生成新的绕过攻击。在对抗网络攻击的竞赛中,时间至关重要。为了快速修复或微调防火墙,能够及时了解和预测更多可以绕过防火墙的攻击是非常重要的。我们开发了一个实现该方法的工具,并在ModSecurity(一种广泛使用的应用防火墙)上对其进行了评估。我们获得的结果表明,在检测防火墙漏洞方面具有良好的性能和效率,这些漏洞可能使SQLi攻击无法被检测到。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
QuickChecking Static Analysis Properties A Case Study on the Efficiency of Model-Based Testing at the European Space Agency Supporting the Transition to an Agile Test Matrix Behind an Application Firewall, Are We Safe from SQL Injection Attacks? Show Me New Counterexamples: A Path-Based Approach
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1