Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Defending Against Web Application Attacks: Approaches, Challenges and Implications

Published: 01 March 2019 Publication History

Abstract

Some of the most dangerous web attacks, such as Cross-Site Scripting and sql injection, exploit vulnerabilities in web applications that may accept and process data of uncertain origin without proper validation or filtering, allowing the injection and execution of dynamic or domain-specific language code. These attacks have been constantly topping the lists of various security bulletin providers despite the numerous countermeasures that have been proposed over the past 15 years. In this paper, we provide an analysis on various defense mechanisms against web code injection attacks. We propose a model that highlights the key weaknesses enabling these attacks, and that provides a common perspective for studying the available defenses. We then categorize and analyze a set of 41 previously proposed defenses based on their accuracy, performance, deployment, security, and availability characteristics. Detection accuracy is of particular importance, as our findings show that many defense mechanisms have been tested in a poor manner. In addition, we observe that some mechanisms can be bypassed by attackers with knowledge of how the mechanisms work. Finally, we discuss the results of our analysis, with emphasis on factors that may hinder the widespread adoption of defenses in practice.

Cited By

View all
  • (2024)Web Application Security: A Pragmatic ExposéDigital Threats: Research and Practice10.1145/36443945:2(1-9)Online publication date: 7-Feb-2024
  • (2024)NAISSComputers and Security10.1016/j.cose.2024.103797140:COnline publication date: 1-May-2024
  • (2024)Analysis of SQL injection attacks in the cloud and in WEB applicationsSecurity and Privacy10.1002/spy2.3707:3Online publication date: 18-Apr-2024
  • Show More Cited By
  1. Defending Against Web Application Attacks: Approaches, Challenges and Implications

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image IEEE Transactions on Dependable and Secure Computing
    IEEE Transactions on Dependable and Secure Computing  Volume 16, Issue 2
    March 2019
    185 pages

    Publisher

    IEEE Computer Society Press

    Washington, DC, United States

    Publication History

    Published: 01 March 2019

    Qualifiers

    • Research-article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 01 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Web Application Security: A Pragmatic ExposéDigital Threats: Research and Practice10.1145/36443945:2(1-9)Online publication date: 7-Feb-2024
    • (2024)NAISSComputers and Security10.1016/j.cose.2024.103797140:COnline publication date: 1-May-2024
    • (2024)Analysis of SQL injection attacks in the cloud and in WEB applicationsSecurity and Privacy10.1002/spy2.3707:3Online publication date: 18-Apr-2024
    • (2019)Mime Artist: Bypassing Whitelisting for the Web with JavaScript Mimicry AttacksComputer Security – ESORICS 201910.1007/978-3-030-29962-0_27(565-585)Online publication date: 23-Sep-2019

    View Options

    View options

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media