1. Identification de vulnérabilités web et génération de scénarios d'attaque.
- Author
-
Akrout, Rim, Alata, Eric, Kaâniche, Mohamed, and Nicomette, Vincent
- Abstract
Web applications have become increasingly exposed to malicious attacks that could affect essential properties such as confidentiality, integrity or availability of information systems. To cope with these threats, it is necessary to develop efficient security protection mechanisms and testing techniques (firewall, intrusion detection system, Web scanner, etc.). This paper presents a new methodology, based on Web pages clustering techniques, that is aimed at identifying the vulnerabilities of a Web application following a black box analysis of the target application. Each identified vulnerability is actually exploited to ensure that the identified vulnerability does not correspond to a false positive. The proposed approach can also highlight different potential attack scenarios including the exploitation of several successive vulnerabilities, taking into account explicitly the dependencies between these vulnerabilities. We have focused in particular on code injection vulnerabilities, such as SQL injections. The proposed method led to the development of a new Web vulnerability scanner and has been validated experimentally based on various vulnerable applications. This methodology has been implemented and has been validated experimentally on several examples of vulnerable applications. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF