An algorithm for detecting SQL injection vulnerability using black-box testing

被引:36
作者
Aliero, Muhammad Saidu [1 ]
Ghani, Imran [2 ]
Qureshi, Kashif Naseer [3 ]
Rohani, Mohd Fo'ad [4 ]
机构
[1] Monash Univ, Sch Informat Technol, Subang Jaya, Malaysia
[2] Indiana Univ Penn, Indiana, PA USA
[3] Bahria Univ, Dept Comp Sci, Islamabad, Pakistan
[4] Univ Teknol, Fac Comp, Johor Baharu, Malaysia
关键词
Black box testing; SQL injection; SQL injection vulnerability; SQL injection attack; SQLI vulnerability scanner; FRAMEWORK;
D O I
10.1007/s12652-019-01235-z
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
SQL Injection Attack (SQLIA) is one of the most severe attack that can be used against web database-driven applications. Attackers use SQLIA to obtain unauthorized access and perform unauthorized data modifications due to initial improper input validation by the web application developer. Various studies have shown that, on average, 64% of web applications worldwide are vulnerable to SQLIA due to improper input. To mitigate the devastating problem of SQLIA, this research proposes an automatic black box testing for SQL Injection Vulnerability (SQLIV). This acts to automate an SQLIV assessment in SQLIA. In addition, recent studies have shown that there is a need for improving the effectiveness of existing SQLIVS in order to reduce the cost of manual inspection of vulnerabilities and the risk of being attacked due to inaccurate false negative and false positive results. This research focuses on improving the effectiveness of SQLIVS by proposing an object-oriented approach in its development in order to help and minimize the incidence of false positive and false negative results, as well as to provide room for improving a proposed scanner by potential researchers. To test and validate the accuracy of research work, three vulnerable web applications were developed. Each possesses a different type of vulnerabilities and an experimental evaluation was used to validate the proposed scanner. In addition, an analytical evaluation is used to compare the proposed scanner with the existing academic scanners. The result of the experimental analysis shows significant improvement by achieving high accuracy compared to existing studies. Similarly, the analytical evaluations showed that the proposed scanner is capable of analyzing attacked page response using four different techniques.
引用
收藏
页码:249 / 266
页数:18
相关论文
共 44 条
  • [1] Acunetix, 2013, ACC VULN SCANN
  • [2] Agosta G, 2012, INF TECHN NEW GEN IT
  • [3] Aliero MS, 2015, J TEKNOL, V77, P49
  • [4] Security framework for RESTful mobile cloud computing Web services
    AlShahwan, Feda
    Faisal, Maha
    Ansa, Godwin
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2016, 7 (05) : 649 - 659
  • [5] [Anonymous], 2010, HEURISTICBASED APPRO
  • [6] [Anonymous], SQL INJECTION VULNER
  • [7] [Anonymous], P 2009 ACM S APPL CO
  • [8] [Anonymous], 2013, International Journal of Advancements in Computing Technology, DOI DOI 10.4156/IJACT.VOL5.ISSUE9.115
  • [9] Antunes N, 2012, SOFTW REL ENG ISSRE
  • [10] Antunes N, 2011, SERV COMP SCC 2011 I