4.5 Article

Web Attack Detection Using the Input Validation Method: DPDA Theory

期刊

CMC-COMPUTERS MATERIALS & CONTINUA
卷 68, 期 3, 页码 3167-3184

出版社

TECH SCIENCE PRESS
DOI: 10.32604/cmc.2021.016099

关键词

Static; dynamic; detection; prevention; input validation; deterministic push down automata

资金

  1. Taif University [TURSP-2020/115]

向作者/读者索取更多资源

Proper input validation and sanitization are crucial in building web applications to prevent attackers from exploiting vulnerabilities. This paper introduces a new idea of using input validation for attack detection and prevention, supporting web security tests. By checking static code attributes and implementing a script whitelisting interception layer, SQL injection attacks and XSS attacks can be effectively detected and resolved.
A major issue while building web applications is proper input validation and sanitization. Attackers can quickly exploit errors and vulnerabilities that lead to malicious behavior in web application validation operations. Attackers are rapidly improving their capabilities and technologies and now focus on exploiting vulnerabilities in web applications and compromising confidentiality. Cross-site scripting (XSS) and SQL injection attack (SQLIA) are attacks in which a hacker sends malicious inputs (cheat codes) to confuse a web application, to access or disable the application's back-end without user awareness. In this paper, we explore the problem of detecting and removing bugs from both client-side and server-side code. A new idea that allows assault detection and prevention using the input validation mechanism is introduced. In addition, the project supports web security tests by providing easy-to-use and accurate models of vulnerability prediction and methods for validation. If these attributes imply a program statement that is vulnerable in an SQLIA, this can be evaluated and checked for a set of static code attributes. Additionally, we provide a script whitelisting interception layer built into the browser's JavaScript engine, where the SQLIA is eventually detected and the XSS attack resolved using the method of input validation and script whitelisting under pushdown automatons. This framework was tested under a scenario of an SQL attack and XSS. It is demonstrated to offer an extensive improvement over the current framework. The framework's main ability lies in the decrease of bogus positives. It has been demonstrated utilizing new methodologies, nevertheless giving unique access to sites dependent on the peculiarity score related to web demands. Our proposed input validation framework is shown to identify all anomalies and delivers better execution in contrast with the current program.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据