Visible to the public Evaluation of Web Security Mechanisms Using Vulnerability amp; Attack Injection

TitleEvaluation of Web Security Mechanisms Using Vulnerability amp; Attack Injection
Publication TypeJournal Article
Year of Publication2014
AuthorsFonseca, J., Vieira, M., Madeira, H.
JournalDependable and Secure Computing, IEEE Transactions on
Volume11
Pagination440-453
Date PublishedSept
ISSN1545-5971
Keywordsattack injection methodology, Databases, Educational institutions, fault diagnosis, fault injection, Input variables, Internet, Internet applications, intrusion detection system, Probes, review and evaluation, security, security of data, Software, software fault tolerance, SQL, SQL Injection attacks, TV, VAIT, vulnerability injection methodology, vulnerability-&-attack injector tool, Web application security mechanism evaluation
Abstract

In this paper we propose a methodology and a prototype tool to evaluate web application security mechanisms. The methodology is based on the idea that injecting realistic vulnerabilities in a web application and attacking them automatically can be used to support the assessment of existing security mechanisms and tools in custom setup scenarios. To provide true to life results, the proposed vulnerability and attack injection methodology relies on the study of a large number of vulnerabilities in real web applications. In addition to the generic methodology, the paper describes the implementation of the Vulnerability & Attack Injector Tool (VAIT) that allows the automation of the entire process. We used this tool to run a set of experiments that demonstrate the feasibility and the effectiveness of the proposed methodology. The experiments include the evaluation of coverage and false positives of an intrusion detection system for SQL Injection attacks and the assessment of the effectiveness of two top commercial web application vulnerability scanners. Results show that the injection of vulnerabilities and attacks is indeed an effective way to evaluate security mechanisms and to point out not only their weaknesses but also ways for their improvement.

URLhttps://ieeexplore.ieee.org/document/6629992
DOI10.1109/TDSC.2013.45
Citation Key6629992