DocumentCode :
238657
Title :
Preventing input type validation vulnerabilities using network based intrusion detection systems
Author :
Sunkari, Venkatramulu ; Guru Rao, C.V.
Author_Institution :
CSE, Kakatiya Inst. of Technol. & Sci., Warangal, India
fYear :
2014
fDate :
27-29 Nov. 2014
Firstpage :
702
Lastpage :
706
Abstract :
Web applications became most common medium in the internet and are easily accessible using browser software. Because of popularity and ease of use it gained the interest of attackers. Web applications attackers mostly use browsers as an attacking tool. Web applications are prone to all major vulnerabilities as normal software vulnerabilities. Among all, SQL Injections and XSS are most popular and frequently occurred attacks. Existing research works majorly concentrated on code verification with syntax analyzers and are deployed at the server. These techniques overheads the web applications performance because of online verification of SQL statements that are dynamically prepared by the applications and are combined deployed along with the web application at the server. Unfortunately, these techniques are bound to a programming language. Combined approaches such as IPAAS use syntax analyzers as well as HTTP Parameter type verification. Even though the technique overcomes the problem of code modification at client/server, it is also bound to a programming language. We propose a novel technique of HTTP Stateless and automated parameter pollution verification at network level, it is an independent of web application programming language, and can be directly applied on any web application. It doesn´t depend on syntax analyzers and is anomaly intrusion detection system, capable of detecting published (known) and un-published (unknown) vulnerabilities. It reduces the sanity checks at web application. The system evaluated on seven SQL/XSS allowed real time web applications with 2783 attack patterns of exploit-db and on all possible parameters. The system successfully prevented 92.96% SQL Injection attacks, 79.86% XSS attacks without impacting server operations.
Keywords :
Internet; SQL; computer crime; hypermedia; program verification; HTTP parameter type verification; HTTP stateless; IPAAS; Internet; SQL injection attacks; SQL statements; Web application attackers; Web application programming language; Web application vulnerabilities; Web applications performance; XSS; anomaly intrusion detection system; attack patterns; attacking tool; automated parameter pollution verification; browser software; client/server; code modification; code verification; input type validation vulnerabilities prevention; network based intrusion detection systems; network level; online verification; sanity checks; server operations; software vulnerabilities; syntax analyzers; unpublished vulnerabilities; Intrusion detection; Protocols; Servers; Software; Syntactics; Training; IPAAS; SQl injection Attack; Web application; XSS Attack;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Contemporary Computing and Informatics (IC3I), 2014 International Conference on
Conference_Location :
Mysore
Type :
conf
DOI :
10.1109/IC3I.2014.7019679
Filename :
7019679
Link To Document :
بازگشت