TEXT-MINING AND PATTERN-MATCHING BASED PREDICTION MODELS FOR DETECTING VULNERABLE FILES IN WEB APPLICATIONS

被引:0
作者
Gupta, Mukesh Kumar [1 ]
Govil, Mahesh Chandra [1 ]
Singh, Girdhari [1 ]
机构
[1] Malaviya Natl Inst Technol, Dept Comp Sci & Engn, Jaipur, Rajasthan, India
来源
JOURNAL OF WEB ENGINEERING | 2018年 / 17卷 / 1-2期
关键词
Cross-Site Scripting vulnerability; Web Security; Vulnerability Detection; Machine Learning; SITE SCRIPTING XSS; APPLICATION VULNERABILITIES;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The proliferation of technology has empowered the web applications. At the same time, the presences of Cross-Site Scripting (XSS) vulnerabilities in web applications have become a major concern for all. Despite the many current detection and prevention approaches, attackers are exploiting XSS vulnerabilities continuously and causing significant harm to the web users. In this paper, we formulate the detection of XSS vulnerabilities as a prediction model based classification problem. A novel approach based on text-mining and pattern-matching techniques is proposed to extract a set of features from source code files. The extracted features are used to build prediction models, which can discriminate the vulnerable code files from the benign ones. The efficiency of the developed models is evaluated on a publicly available labeled dataset that contains 9408 PHP labeled (i.e. safe, unsafe) source code files. The experimental results depict the superiority of the proposed approach over existing ones.
引用
收藏
页码:28 / 44
页数:17
相关论文
共 26 条
  • [1] Agosta G., 2012, Proceedings of the 2012 Ninth International Conference on Information Technology: New Generations (ITNG), P189, DOI 10.1109/ITNG.2012.167
  • [2] Using complexity, coupling, and cohesion metrics as early indicators of vulnerabilities
    Chowdhury, Istehad
    Zulkernine, Mohammad
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2011, 57 (03) : 294 - 313
  • [3] Dahse Johannes, STATIC SOURCE CODE V
  • [4] Securing web applications from injection and logic vulnerabilities: Approaches and challenges
    Deepa, G.
    Thilagam, P. Santhi
    [J]. INFORMATION AND SOFTWARE TECHNOLOGY, 2016, 74 : 160 - 180
  • [5] DELAITRE Aurelien, PHP VULNERABILITIES
  • [6] Frank Eibe, WEKA DATA MINING TOO
  • [7] XSS-SAFE: A Server-Side Approach to Detect and Mitigate Cross-Site Scripting (XSS) Attacks in Java']JavaScript Code
    Gupta, Shashank
    Gupta, B. B.
    [J]. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2016, 41 (03) : 897 - 920
  • [8] Hovsepyan A., 2012, Proceedings of the 4th International Workshop on Security Measurements and Metrics. MetriSec'12, P7
  • [9] Huang Yao-Wen, 2004, WWW '04: Proceedings of the 13th international conference on World Wide Web, ACM, New York, NY, USA, P40, DOI DOI 10.1145/988672.988679
  • [10] Current state of research on cross-site scripting (XSS) - A systematic literature review
    Hydara, Isatou
    Sultan, Abu Bakar Md.
    Zulzalil, Hazura
    Admodisastro, Novia
    [J]. INFORMATION AND SOFTWARE TECHNOLOGY, 2015, 58 : 170 - 186