RAT: Reinforcement-Learning-Driven and Adaptive Testing for Vulnerability Discovery in Web Application Firewalls

被引:11
作者
Amouei, Mohammadhossein [1 ]
Rezvani, Mohsen [1 ]
Fateh, Mansoor [1 ]
机构
[1] Shahrood Univ Technol, Fac Comp Engn, Shahrud 36155316, Iran
关键词
Testing; Payloads; Security; Radio access technologies; Databases; Password; Browsers; Security testing; injection attack; adaptive testing; web application firewall (WAF); test case clustering;
D O I
10.1109/TDSC.2021.3095417
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the increasing sophistication of web attacks, Web Application Firewalls (WAFs) have to be tested and updated regularly to resist the relentless flow of web attacks. In practice, using a brute-force attack to discover vulnerabilities is infeasible due to the wide variety of attack patterns. Thus, various black-box testing techniques have been proposed in the literature. However, these techniques suffer from low efficiency. This article presents Reinforcement-Learning-Driven and Adaptive Testing (RAT), an automated black-box testing strategy to discover injection vulnerabilities in WAFs. In particular, we focus on SQL injection and Cross-site Scripting, which have been among the top ten vulnerabilities over the past decade. More specifically, RAT clusters similar attack samples together. It then utilizes a reinforcement learning technique combined with a novel adaptive search algorithm to discover almost all bypassing attack patterns efficiently. We compare RAT with three state-of-the-art me&thods considering their objectives. The experiments show that RAT performs 33.53 and 63.16 percent on average better than its counterparts in discovering the most possible bypassing payloads and reducing the number of attempts before finding the first bypassing payload when testing well-configured WAFs, respectively.
引用
收藏
页码:3371 / 3386
页数:16
相关论文
共 40 条
[1]  
[Anonymous], 2015, 2015 IEEE 8 INT C SO
[2]  
[Anonymous], 2018, 2018 4 INT C OPT APP
[3]  
[Anonymous], 2017, INT J ADV RES COMPUT
[4]   A Machine-Learning-Driven Evolutionary Approach for Testing Web Application Firewalls [J].
Appelt, Dennis ;
Nguyen, Cu D. ;
Panichella, Annibale ;
Briand, Lionel C. .
IEEE TRANSACTIONS ON RELIABILITY, 2018, 67 (03) :733-757
[5]   Security Testing of Web Applications: a Search Based Approach for Cross-Site Scripting Vulnerabilities [J].
Avancini, Andrea ;
Ceccato, Mariano .
11TH IEEE INTERNATIONAL WORKING CONFERENCE ON SOURCE CODE ANALYSIS AND MANIPULATION (SCAM 2011), 2011, :85-94
[6]   Attack Pattern-Based Combinatorial Testing with Constraints for Web Security Testing [J].
Bozic, Josip ;
Garn, Bernhard ;
Kapsalis, Ioannis ;
Simos, Dimitris E. ;
Winkler, Severin ;
Wotawa, Franz .
2015 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY (QRS 2015), 2015, :207-212
[7]  
Chandrasekar K., 2017, SYMANTEC, V22, P77
[8]  
Chen D, 2017, AAAI C ART INT
[9]  
Choi S.-S. C., 2010, Journal of Systemics, Cybernetics and Informatics, V8, P43, DOI DOI 10.13053/CYS-20-3-2457
[10]   WAF-A-MoLE: Evading Web Application Firewalls through Adversarial Machine Learning [J].
Demetrio, Luca ;
Valenza, Andrea ;
Costa, Gabriele ;
Lagorio, Giovanni .
PROCEEDINGS OF THE 35TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING (SAC'20), 2020, :1745-1752