Intrusion Detection For Web Application: An Analysis
Intrusion Detection For Web Application: An Analysis
net/publication/237149746
CITATION READS
1 581
1 author:
Palanivel Kuppusamy
Pondicherry University
43 PUBLICATIONS 106 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Palanivel Kuppusamy on 27 January 2015.
Abstract— Web applications are becoming the dominant way to provide access to online services and also a valuable target for security
attacks. As the use of web applications for critical services has increased, the sophistication of attacks against these applications has
grown as well. To protect web applications several intrusion detection systems have been proposed. In this paper, several techniques
which are meant for detection of web application related attacks and their advantages and disadvantages are presented. Furthermore, the
common web application attacks which are vulnerable to the web application are discussed. Finally, this study concludes with an analysis
of challenges to overcome for the detection of web application attack that still remain to be resolved.
—————————— ——————————
1 INTRODUCTION
IJSER
plication has attracted the attention of malicious hackers to The SQL Injection attack is abusing Web pages which allow
exploit and access to sensitive information which might lead users to enter text in form fields which are used for database
to enormous gain. The security of web-based applications queries. Hackers can enter a disguised SQL query, which
should be addressed by means of careful design and thorough changes the nature of the query. Hence the queries can be
security testing. Unfortunately, this is often not the case. For used to access the connected database and change or delete its
this reason, security conscious development methodologies data.
should be complemented by an intrusion detection infrastruc-
ture that is able to identify the attacks and provide early warn-
ing about suspicious activity. Intrusion detection is the process
of monitoring events occurring in a system and reporting
them accurately to the proper authority when the suspicious
activity occurs. There are two main types of intrusion detec-
tion methods. The one is anomaly detection which is based on
finding deviations from normal user behavior are considered
intrusive. The next one is misuse detection, it characterized as
a’ pattern’ or ‘signature’ that IDS looks for. Pattern or signa-
ture might be a static string or a set sequence of actions.
The Intrusion detection system provides the following:
• Monitoring and analyzing of user and system activity.
• Auditing of system configurations and vulnerabilities.
• Assessing the integrity of the files and critical system. Fig (1): SQL Injection Attack
• Statistical analysis of activity patterns.
• Abnormal activity analysis.
• Operating system audit. 2.2 Cross Site Scripting
IJSER © 2013
http://www.ijser.org
International Journal of Scientific & Engineering Research, Volume 4, Issue 5, May-2013 1825
ISSN 2229-5518
IJSER
• Passive session hijacking.
Active session hijacking involves hijacking an already au- Fig (4): CSRF Attack Scenario
thenticated session. The original user has logged in his ac-
count profile and then the attacker steals the cookies to hijack
the active session and then disconnect the original user from 2.6 Sophisticated HTTP attacks
the server.
In passive session hijacking, attackers does not hijack ac- Sophisticated HTTP attacks are among the most popular hack-
tive session instead they capture the login credentials while ing techniques. Hacker’s mainly target HTTP requests and
the original user is trying to establish a new connection with manipulates or modifies the requests to cause the requisite
the server and the attacker is sitting silently on the same net- damage. The attacks are usually performed using HTTP port
work and recording the login credentials. 80 or other HTTP communication.
Sophisticated HTTP attacks result in easy access into the
web server for the hacker, allowing him to cause immense
damage. Hackers can delete information, steal data, or add
info. They can cause interminable harm to a website. If a web-
site gets affected, it can result in serious damage to its online
business, spoil the website’s image, or cause the financial loss
to the business.
IJSER © 2013
http://www.ijser.org
International Journal of Scientific & Engineering Research, Volume 4, Issue 5, May-2013 1826
ISSN 2229-5518
3.5 TRIPWIRE
4 RELATED WORKS
Many researchers have introduced various techniques to de-
fend against various attacks.
Fig (5): stack based buffer overflow attack
3 TOOLS FOR IDS C. Kruegel and G. Vigna [6], presented an intrusion detection
system that uses a number of different anomaly detection
3.1 SNORT techniques to detect attacks against web servers and web
based application. The system correlates the server side pro-
Snort is open source intrusion detection and prevention sys- grams referenced by client queries with the parameter con-
tem excels at traffic analysis and packet logging on IP net- tained in the queries. The system derives automatically the
IJSER
work. Combining the benefits of signature, protocol and parameter profiles associated with web application data.
anomaly based inspection. Through protocol analysis, various
pre-processors, snort detects a large number of worms, port M. Cova, D. Balzarotti, V. Felmetsger, and G. Vigna [1], they
scans, vulnerability exploiting attempts and other suspicious present Swaddler, a novel approach to anomaly based detec-
behavior. Snort uses a rule based language to describe traffic tion of attacks against web application. Swaddler analyzes the
that it should collect or pass and a modular detection engine. internal state of web application and learns the relationship
between the applications critical execution points and the ap-
3.2 OSSEC plication internal state. Swaddler is able to identify the attacks
that attempt to bring an application an inconsistent anomalous
OSSEC is an open source Host based Intrusion Detection sys- state such as a violation of the intended workflow of web ap-
tem that performs log analysis, policy monitoring, root kit plication
detection, file integrity checking, real time alerting and active
response. Because of its powerful log analysis engine, ISPs, G. Vigna, W.K. Robertson, V. Kher, and R.A. Kemmerer [8],
several universities and data centers are running OSSEC to presented WebSTAT, an intrusion detection system that ana-
monitor and analyze their firewall, web server and authentica- lyzes web requests looking for malicious behavior and it pro-
tion logs. vides a sophisticated language to describe multi-step attack in
terms of the states and transaction. It operates on multiple
3.3 SQUIL event streams and it is able to correlate both network and op-
erating system level events with entries contained in the serv-
SQUIL’s main component is an intuitive GUI that provides er logs.
access to real-time events, session data and raw packet cap-
tures. It facilitates the practice of network security monitoring M. Auxilia, D. Tamilselvan [2], proposed a negative security
and event driven analysis. model based on misuse of web application is used. This nega-
tive security model provides a web application firewall engine
3.4 OSSIM with a rule set, to ensure censorious protection across every
web architecture. WAF’s are deployed to establish an increase
OSSIM is an open source Security Information and Event external security layer to detect and prevent attacks before
Management comprising a collection of tools designed to as- they reach web applications.
sist network administrators in computer security, intrusion
detection and prevention system. It also provides a strong cor- G. Vigna, F. Valeur, D. Balzarotti, W.K. Robertson, C. Kruegel,
relation engine with low, mid and high level visualization in- and E. Kirda [7], proposed the system composed of a web
terfaces as well as reporting and incident managing tools. based anomaly detection system, a reverse HTTP proxy and a
anomaly database detection system. The serially composing a
web based anomaly detector and a SQL query anomaly detec-
IJSER © 2013
http://www.ijser.org
International Journal of Scientific & Engineering Research, Volume 4, Issue 5, May-2013 1827
ISSN 2229-5518
Juan Jose Garcia Adeva, Juan Manuel Pikatza Atxa [3], Intru-
sion detection software component based on text mining tech-
niques attempts to detect either unauthorized access or misus-
ing a web application and by using text categorization, it is
capable of learning the characteristics of both normal and ma-
licious user behavior from log entries generated by web appli-
cation server and therefore the detection of misuse in a web
application is achieved.
IJSER
Viktoria Felmetsger, Ludovico Cavedon, Christopher Kruegel,
Giovanni Vigna [5], proposed a novel approach to identifica-
tion of class of application logic vulnerabilities, in the context
of web application is presented. And this approach uses a
composition of dynamic analysis and symbolic model check-
ing to identify invariants that are a part of the intended pro-
gram specification but are not enforced on all paths in the
code of a web application.
IJSER © 2013
http://www.ijser.org
International Journal of Scientific & Engineering Research, Volume 4, Issue 5, May-2013 1828
ISSN 2229-5518
Sl.
Title Advantage Disadvantage Attack class
No
Header data of GET request are
Support detection of new attacks Buffer overflow, Direc-
Anomaly Detection of Web not taken into account its rely
1 and cannot be evaded by at- tory traversal, cross
on web access logs, attacks that
based attacks tempting to hide malicious code site scripting, Input
compromise the security of the
inside a string. validation & Code Red
web server.
Swaddler : An approach for Detect the attacks that cannot be
the anomaly detection of identified by examining the ex- Workflows violation
2 Vulnerable to mimicry attack.
state violations in web ap- ternal flow of request and re- attacks.
plication sponse.
The expressiveness of the lan- Web crawler, Pattern
A stateful Intrusion Detec- guage allows the attack modeler matching, Cookie
Vulnerable to denial of service
3 tion system for Word Wide to describe timing relationship Stealing, Buffer over-
attacks.
Web Servers and this approach is one to detect flow, Document root
IJSER
more complex attacks. escape.
Provided a rule set for detecting
the attacks , HTTP attacks, SQL
Anomaly detection using Does not provide a unique rule
HTTP traffic can be monitored in injection, Cross site
4 Negative security model in for detection of all attacks.
real time in order to detect and scripting.
web Application.
prevent attacks from reaching
web applications.
Reducing errors in the When the attack is detected it
anomaly based detection of does not block anomalous re- SQL injection, Com-
web based attacks through quest immediately but its at- mand injections, In-
Vulnerable to distributed DOS
5 tempt to serve them through a
the combined analysis of attack. formation tampering,
web server with restricted access
web requests and SQL que- to sensitive information thereby Cross site scripting.
ries. reducing the false positive.
The causal mapping can identify
Double Guard : Detecting the attack even in normal net- Cross site scripting attack is Privilege escalation,
work traffic, 100 % detection possible, Vulnerable to mimicry Hijack future session
6 Intrusions in multi-tier web
accuracy with 0 % & 0.6% false attack, Not designed to mitigate attack, Injection attack,
application
positive for static and dynamic DDOS attacks. Direct DB attack
web page.
Log information generated by
Intrusion detection in web The system cannot detect the
the system does not need any
new attack; Focus only on ac-
7 application using text min- particular format, Does not re- Access control.
cess control, The false positive
ing quire any explicit programming
is high.
for machine learning.
Toward Automated detec- They focused on the fact that
Application logic vul-
many invariants that relate to Vulnerabilities identification is
8 tion of logic vulnerabilities nerabilities (authoriza-
import concepts of web applica- limited.
in web applications tion)
tions were not identified
A multi model approach to The reduced number of false Relies on web access logs, Buffer overflow, Direc-
positives, able to detect a high The direct instrumentation of tory traversal, cross
9 the detection of web based
percentage of attacks with a very web servers introduces un- site scripting, Code
attacks
limited number of false positives. wanted delay. Red, Input validation.
SQL injection, Com-
An Efficient Black box tech- Effective in detecting a broad
A false negative may occur due mand injection, Path
range of attacks on application
10 nique for defeating web to parsing error, policy error or traversals, crosses site
written in multiple languages,
application Attacks incompleteness. scripting.
Low overheads.
IJSER © 2013
http://www.ijser.org
International Journal of Scientific & Engineering Research, Volume 4, Issue 5, May-2013 1829
ISSN 2229-5518
REFERENCES
IJSER
[1] M. Cova, D. Balzarotti, V. Felmetsger, and G. Vigna, “Swaddler: An
Approach for the Anomaly-Based Detection of State Violations in Web
Applications,” Proc. Int’l Symp. Recent Advances in Intrusion Detection
(RAID ’07), 2007.
.
[2] M. Auxilia, D.Tamilselvan, “Anomaly Detection Using Negative Secu-
rity Model in Web Application,”IEEE 2010.
[3] Juan Jose Garcia Adeva, Juan Manuel Pikatza Atxa,” Intrusion Detec-
tion in web applications using text mining,” Journal of Artificial Intelli-
gence - Elsevier 2006.
[9] Meixing Le, Angelos Starou, Bret ByungHoon Kang,” Double Guard:
Detecting Intrusions in Multitier Web Applications,” IEEE Transactions
IJSER © 2013
http://www.ijser.org