GMSA: Gathering Multiple Signatures Approach to Defend Against Code Injection Attacks

被引:7
作者
Alnabulsi, Hussein [1 ]
Islam, Rafiqul [1 ]
Talukder, Majharul [2 ]
机构
[1] Charles Sturt Univ, Sch Comp & Math, Albury, NSW 2640, Australia
[2] Univ Canberra, Sch Management, Canberra, ACT 2600, Australia
关键词
Code injection attack (CIA); SQL injection attack; cross-site script (XSS) attack; shell injection attack; file inclusion attack (RFI; LFI);
D O I
10.1109/ACCESS.2018.2884201
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Code injection attacks (CIAs) exploit security vulnerabilities and computer bugs that are caused by processing invalid codes. CIA is a problem which hackers attempt to introduce to any new method, their objective being to bypass the protection system. In this paper, we present a tool called GMSA, developed to detect a variety of CIAs, for example, cross-site scripting (XSS) attack, SQL injection attack, shell injection attack (command injection attack), and file inclusion attack. The latter consists of local file inclusion and remote file inclusion. Our empirical analysis reveals that compared with existing research, gathering multiple signatures approach (GMSA) executes a precision performance (accuracy of the proposed algorithm is 99.45%). The false positive rate (FPR) of GMSA is 0.59%, which is low compared with what other research has reported. The low FPR is the most important factor. Ideally, the defense algorithm should balance between the FPR and true positive rate (TPR) because with existing methodologies, security experts can defend against a broad range of CIAs with uncomplicated security software. Typical protection methods yield a high FPR. Our method results in high TPR while minimizing the resources needed to address the false positive. GMSA can detect four types of CIA. This is more comprehensive than other research techniques that are restricted to only two major types of CIA, namely, SQL injection and XSS attacks.
引用
收藏
页码:77829 / 77840
页数:12
相关论文
共 26 条
[1]  
Alazab A., INT J COMPUT APPL, V154, P1
[2]  
Alnabulsi H., 2018, ADV INTELL SYST COMP, P281, DOI [10.1007/978-3-319-67071-3_35, DOI 10.1007/978-3-319-67071-3_35]
[3]  
Alnabulsi Hussein., 2014, Computer Science and Engineering (APWC on CSE), 2014 Asia-Pacific World Congress on, P1
[4]  
[Anonymous], XSS FILT EV CHEAT SH
[5]  
Binbin Qu, 2013, 2013 IEEE 4th International Conference on Software Engineering and Service Science (ICSESS), P89, DOI 10.1109/ICSESS.2013.6615262
[6]  
Choudhary Atul S., 2012, International Journal of Computer Applications, V52, DOI DOI 10.5120/8174-1493
[7]   Vulnerability & Attack Injection for Web Applications [J].
Fonseca, Jose ;
Vieiraz, Marco ;
Madeira, Henrique .
2009 IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS & NETWORKS (DSN 2009), 2009, :93-+
[8]  
Gimenez C. T., HTTP DATASET CSIC 20
[9]   Reservoir Computing Meets Smart Grids: Attack Detection Using Delayed Feedback Networks [J].
Hamedani, Kian ;
Liu, Lingjia ;
Atat, Rachad ;
Wu, Jinsong ;
Yi, Yang .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (02) :734-743
[10]  
IBM Security, IBM SEC NETW INTR PR