Assessing the Impact of Firewalls and Database Proxies on SQL Injection Testing
نویسندگان
چکیده
This paper examines the effects and potential benefits of utilising Web Application Firewalls (WAFs) and database proxies in SQL injection testing of web applications and services. We propose testing the WAF itself to refine and evaluate its security rules and prioritise fixing vulnerabilities that are not protected by the WAF. We also propose using database proxies as oracles for black-box security testing instead of relying only on the output of the application under test. The paper also presents a case study of our proposed approaches on two sets of web services. The results indicate that testing through WAFs can be used to prioritise vulnerabilities and that an oracle that uses a database proxy finds more vulnerabilities with fewer tries than an oracle that relies only on the output of the application.
منابع مشابه
Testing for Tautology based SQL Injection Attack using Runtime Monitors
Today, all commercial and business applications (ecommerce, banking, blogs, web mail, etc.,) are built as webbased database applications. Increasing prominence and usage of these applications has made them more susceptible to attacks because they store huge amount of sensitive user information. Traditional security mechanisms like network firewalls, intrusion detection systems, and use of encry...
متن کاملChapter 2 Literature Survey 2.1 Introduction
Web application security is a major concern in today’s era for various organizations and banking sectors. Most of the organizations and banking sectors who use internet to provide web based services that protect their sensitive data using firewalls and few access control mechanisms. However, still the organizations data are revealed by internet hackers by some means of purposefully designed SQL...
متن کاملOverview of Intrusion Detection Techniques in Database
Data is one of the most valuable assets in today's world and is used in the everyday life of every person and organization. This data stores in a database in order to restore and maintain its efficiently. Since there is a database that can be exploited by SQL injection attacks, internal threats, and unknown threats, there are always concerns about the loss or alteration of data by unauthorized ...
متن کاملThe SQL Injection and Signature Evasion
Network firewalls, IPS, and even some dedicated Web application firewall technologies attempt to identify SQL injection via traditional signature-based protections. Signature protections attempt to identify and block SQL injection-related text patterns within Web traffic flows. Unfortunately, real world experience has proven that reliance upon signatures alone is not enough to defeat SQL Inject...
متن کاملMutating database queries
A set of mutation operators for SQL queries that retrieve information from a database is developed and tested against a set of queries drawn from the NIST SQL Conformance Test Suite. The mutation operators cover a wide spectrum of SQL features, including the handling of null values. Additional experiments are performed to explore whether the cost of executing mutants can be reduced using select...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013