An algorithm for detecting SQL injection vulnerability using black-box testing

被引:2
作者
Muhammad Saidu Aliero
Imran Ghani
Kashif Naseer Qureshi
Mohd Fo’ad Rohani
机构
[1] Monash University,School of Information Technology
[2] Indiana University of Pennsylvania,Department of Computer Science
[3] Bahria University,Faculty of Computing
[4] Universiti Teknologi,undefined
来源
Journal of Ambient Intelligence and Humanized Computing | 2020年 / 11卷
关键词
Black box testing; SQL injection; SQL injection vulnerability; SQL injection attack; SQLI vulnerability scanner;
D O I
暂无
中图分类号
学科分类号
摘要
SQL Injection Attack (SQLIA) is one of the most severe attack that can be used against web database-driven applications. Attackers use SQLIA to obtain unauthorized access and perform unauthorized data modifications due to initial improper input validation by the web application developer. Various studies have shown that, on average, 64% of web applications worldwide are vulnerable to SQLIA due to improper input. To mitigate the devastating problem of SQLIA, this research proposes an automatic black box testing for SQL Injection Vulnerability (SQLIV). This acts to automate an SQLIV assessment in SQLIA. In addition, recent studies have shown that there is a need for improving the effectiveness of existing SQLIVS in order to reduce the cost of manual inspection of vulnerabilities and the risk of being attacked due to inaccurate false negative and false positive results. This research focuses on improving the effectiveness of SQLIVS by proposing an object-oriented approach in its development in order to help and minimize the incidence of false positive and false negative results, as well as to provide room for improving a proposed scanner by potential researchers. To test and validate the accuracy of research work, three vulnerable web applications were developed. Each possesses a different type of vulnerabilities and an experimental evaluation was used to validate the proposed scanner. In addition, an analytical evaluation is used to compare the proposed scanner with the existing academic scanners. The result of the experimental analysis shows significant improvement by achieving high accuracy compared to existing studies. Similarly, the analytical evaluations showed that the proposed scanner is capable of analyzing attacked page response using four different techniques.
引用
收藏
页码:249 / 266
页数:17
相关论文
共 41 条
[1]  
Aliero MS(2015)Review on SQL injection protection methods and tools Jurnal Teknologi 77 49-66
[2]  
Ghani I(2016)Security framework for RESTful mobile cloud computing Web services J Ambient Intell Hum Comput 7 649-659
[3]  
Zainudden S(2015)Assessing and comparing vulnerability detection tools for web services: Benchmarking approach and examples IEEE Trans Serv Comput 8 269-283
[4]  
Khan MM(2013)Preventing SQL injection attack based on machine learning Int J Adv Comput Technol 5 967-974
[5]  
Bello M(2015)Design and implementation of website information disclosure assessment system PloS One 10 e0117180-761
[6]  
AlShahwan F(2005)A testing framework for Web application security assessment Comput Netw 48 739-760
[7]  
Faisal M(2016)A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing J Ambient Intell Hum Comput 7 731-145
[8]  
Ansa G(2010)Soft computing in intrusion detection: the state of the art J Ambient Intell Hum Comput 1 133-373
[9]  
Antunes N(2015)Generating attacks in SysML activity diagrams by detecting attack surfaces J Ambient Intell Hum Comput 6 361-12
[10]  
Vieira M(2018)Towards a more reliable and scalable architecture for smart home environments J Ambient Intell Hum Comput 2018 1-528