0% found this document useful (0 votes)
5 views20 pages

Research_Into_the_Security_Threat_of_Web_Application

Uploaded by

douha2830
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views20 pages

Research_Into_the_Security_Threat_of_Web_Application

Uploaded by

douha2830
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20

Research Into the Security Threat

of Web Application

Yanling Zhang∗ and Ting Zhang

School of Information Engineering, Jiaozuo University, China


E-mail: [email protected]

Corresponding Author

Received 27 May 2022; Accepted 28 June 2022;


Publication 27 August 2022

Abstract
In order to effectively analyze the security threat of web application, the
security threat model of web application is established. Firstly, the main
problems with web application are summarized. Secondly, the main security
threat of web application are analyzed, and the corresponding optimization
model is constructed. An algorithm based on the improved Butterfly Opti-
mization Algorithm (BOA) security threat optimization model is designed.
Finally, a SQL injection loophole is selected for example research, and the
security threat path of web application is obtained. The results show IBOA
has the advantages of high optimization accuracy, global optimization and
stable solution, and average accuracy rate is 99.1% and the average recall
rate is 99.1%, which shows that the model has better classification effect,
therefore it has the best performance.

Keywords: Security threat, web application, improved butterfly algorithm,


optimization model, SQL injection loophole.

Journal of Web Engineering, Vol. 21 5, 1707–1726.


doi: 10.13052/jwe1540-9589.21514
© 2022 River Publishers
1708 Y. Zhang and T. Zhang

1 Introduction
With the acceleration of China’s economic development and social informa-
tization process, the Internet has become an indispensable part of people’s
work and life. In order to adapt to social development, establish their own
good image, expand social influence and improve work efficiency, more and
more government agencies, banks, enterprises and institutions have estab-
lished their own portal websites. However, because websites are usually
in a relatively open environment, such as the Internet, the complexity and
diversity of various web application systems lead to a large amount of
vulnerabilities to the system. Trojan horse and other viruses and malicious
code are rampant on the Internet. Hackers invade and tamper with website
security from time to time, and even some acts of tampering with websites
directly escalate into political events, seriously endangering national security
and people’s interests. Therefore, network security threats are becoming more
and more serious. Therefore, it is necessary to ponder over how to protect
network security and how to ensure the security of web application programs
and provide users with fast and stable services [1, 2]. There are many
factors affecting network security, mainly including the impact of viruses
and network systems, the limitations of firewalls and the impact of users’
daily operations.
Web application is a program that can be accessed through the web.
The biggest advantage of the program is that users can easily access it.
What users need is to have a browser, and there is no need to install other
software. Compared with the traditional software engineering practice, the
system based on Web application pays more attention to users, which makes
it difficult to model web application with interactive behaviors. Therefore, in
order to ensure the correctness and security of the system, web application
development needs system modeling. System security specifically refers to
the correctness, mutual exclusion and deadlock free of the system, which is
used to explain that “bad things will never happen”. Due to the interaction
between web application program and browser, it is very important to ensure
its reliability and security through verification and validation technology
[3–5]. In the web browser cache, users can not only interact with the web
page, but also interact with the web browser itself through the buttons in the
web browser, such as back, forward, refresh or rewrite the URL address. They
can also interact with Web databases through browsers. The user will not be
prompted if the page loses its position. User’s operation on the browser and
web page will affect the establishment of the whole web page navigation
model. This interaction behavior may have a negative impact on the security
Research Into the Security Threat of Web Application 1709

of web application programs. A complete web application programming


can correctly provide the functions users want in terms of requirements.
However, when the web application program actually runs in the actual
environment, it may be far from the needs of users. From the perspective of
software verification, in order to ensure the correctness and security of system
functions, system modeling should include the interaction details between
users and web system, web and browser as a whole, and be specified in the
design specification [6, 7]. The improved butterfly optimization algorithm is
designed to optimize the security threat model of web application, which can
obtain the high analysis precision and efficiency.

2 Current Problems with Web Application Program


2.1 Difficult Isolation of Web Running Environment
In the past, it was unlikely that text files would steal e-mail in the traditional
mode of the personal computer era, but it was common on the web. In the
browser world, documents and code are intertwined in the same HTML
file, and completely unrelated applications can only be partially isolated at
most. In addition to following a few flexible browser level security control
frameworks, various interactions between different websites are implicitly
acquiesced. So in fact, all web applications have paid a heavy price for
uninvited malicious cross domain access. Finally, they can only reluctantly
separate the code and displayed data by some clumsy methods. All web
applications have failed in this matter, but sooner or later. Many content
related security problems, such as cross site scripting or cross domain request
forgery, are common in the web field, but they are rarely encountered in the
architecture of dedicated clients.

2.2 Lack of Unified Security Mechanism in Browser


The web does not have a general holistic security model at all. In the browser
field, “homology policy” mechanism can be regarded as the core security
paradigm of this kind, but in fact, this mechanism with many problems is
only a small subset of cross domain interaction. As a result, there are many
such piecemeal adjustments, but no one can shoulder the responsibility of
browser security. Due to the lack of correctness, it is impossible to judge
when a single application ends and when a new application starts. In such a
dilemma, what exactly is an attack? It is difficult for us to control whether we
need to load or cancel permission or complete a security related task [8, 9].
1710 Y. Zhang and T. Zhang

2.3 There Are Problems in Collaboration of Cross Browser


Interaction
When multiple browsers attempt to interact with each other, there are a series
of very serious vulnerabilities that are difficult to blame on which specific
piece of code. It’s impossible to find out which specific products are the
culprits: they’re just doing their job responsibly [10, 11]. The only problem
is that they don’t have a public specification that all browsers should follow.
Another closely related problem is that even though the security mechanisms
of browsers appear to be very similar, they are actually incompatible, which
rarely happened before the advent of the web. If the security models of
different browsers are different, a web application development specification
may be reasonable for one browser, but it may not be applicable to the
other and will be misleading. Program developers often don’t realize these
problems unless they happen to use the affected browser. Even so, they often
don’t realize it until they step on a mine [12, 13].

2.4 The Boundary Between Client and Server is Blurred


The origin of the web fully conforms to the conventional “client-server”
framework, however the functional boundary between user and server feed-
back is quickly blurred. The key problem applies java script tool that
represents execution of the application logic of the HTTP server in the
browser (that is, the “client”). But the security problem needs the client to
be responsible, which is evidently impractical. In conventional “user-server”
system, APIs are generally distinct. It is very easy to assess performance of
server without considering the client, and vice versa. In addition, in each
component, it is easy to isolate a small functional interval and determine
what operations will be performed in this interval. However, the new model
of the web and the common application APIs on the web are both vague and
temporary, so it is completely impossible to rationally infer the security of a
system through the previous analysis methods.
Web application system is composed of operating system and web appli-
cation program. Many programmers do not know how to develop secure
applications. They are not trained in secure coding. Their experience may
be developing stand-alone applications or enterprise web applications that
do not take into account the catastrophic consequences that can occur when
security vulnerabilities are exploited.
First, there are three hidden dangers in providing security services to
the public in most web applications: first, the security services should not
Research Into the Security Threat of Web Application 1711

be provided to the public. Second, the server puts the data that should be
private into the area of public access, resulting in the disclosure of sensitive
information. Third, the server trusted the data from untrusted data sources,
resulting in being attacked [14].
Many web server administrators have never looked at their servers from
another perspective and have not checked the security risks of the servers,
such as using port scanners for system risk analysis. If they had done so, they
wouldn’t have run so many services on their own systems, which didn’t need
to run on the machines that officially provide web services, or they didn’t
need to be open to the public. In addition, they did not modify the banner
information of the application program providing services to the outside, so
that the attacker can easily obtain the relevant version information of the
application program provided by the web server, and find the corresponding
attack method and attack program according to the information. Many web
application programs are vulnerable to attacks through server, programme,
and inner code. The attacks directly bypass the security measures of the sur-
rounding firewall. There are some problems in web application security, such
as improper entry, unavailable estimate regulate, unavailable description and
risk management, buffer overflow, injection attack, exception error handling,
denial of service attack, unsafe allocation management and so on. The four
main attacks are as follows:

2.4.1 Injection attack


At present, there are more and more network applications based on database.
At the same time, software used to search SQL injection points can be seen
everywhere on the network. Attackers only require some theory basis to use
professional software to search attacked objects. The increase of attack targets
and attackers makes the SQL injection attack expand in recent years.
(1) Dos and DDOS attack DOS is the abbreviation of “denial of service”,
which can intentionally attack weakness of network protocol or directly
consume resource of attacked object based on barbaric method, in order
to ensure computer or network be not to offer general services, or avoid
collapse of system. Primitive DoS attacks must be achieved based on a lot
of bandwidth resources; however individual “intruder” generally does not
meet these requirements. However in the later stage, the attacker invented a
distributed attack method, i.e., applied professional software to obtain some
network bandwidth to launch a lot of attack needs on same object simultane-
ously, which is DDoS (distributed denial of service) attack. In short, DDoS
1712 Y. Zhang and T. Zhang

attacks are a collection of DoS attacks centrally controlled and launched by


“intruders”, which has difficulty in being oposed. Dos and DDoS can attack
network, the server will be paralysis and availability of system will be decline.

2.4.2 Cross site attack (XSS attack)


If the browser does not receive a script, it will send it to the application for
cross validation. If it does not receive a script, it will send it to the application
for cross validation. The attacker uses the website program to filter the user’s
input insufficiently, and inputs the HTML code that can be displayed on the
page and affect other users, so as to steal the user’s data, use the user’s identity
to make some action, or carry out virus infringement on the visitor, or turn
the user to a malicious website.

2.4.3 Trojan horse on the website


It refers to uploading a Trojan horse program to a website, then generating
an online horse with a Trojan horse generator, uploading it to the space, and
adding code to make the Trojan horse run when opening the web page! As the
disseminator of the virus, its purpose is to download the Trojan horse to the
user’s local area and further execute it. When the Trojan horse is executed,
it means that more Trojan horses will be downloaded and further executed,
entering a vicious cycle, so that the user’s computer will be attacked and
controlled.
The Trojan horse virus causes the user image to be damaged: the attacker
inserts a piece of code into the normal page (usually the home page of the
website). When the surfer opens the page, the code is executed, and then
downloads and runs the server-side program of a Trojan horse, so as to control
the host of the surfer.
In a word, they are difficult to be discovered or even verified by other
users, because they are difficult to be attacked by other users. Web application
attack can bypass the protection of firewall and intrusion detection products,
and enterprise users cannot find the existing web security problems.

3 Web Vulnerability Threat Model


The main purpose of penetration test is to evaluate the security of the website.
It can use a special vulnerability scanning tool to check the security status of
the website. Professional technicians with rich experience in network attack
can also be employed to play the role of “hacker”. It can simulate attacks
on websites from intranet, extranet and different network segments, so as
Research Into the Security Threat of Web Application 1713

to simulate illegal operations within the enterprise and external attacks that
know nothing about the internal status of the enterprise. However, the effect
of this security testing method depends too much on the ability of tools and
technicians, and is usually distributed throughout the enterprise in a discrete
status to penetrate the website, which cannot fully simulate the process of
hacker attack. A vulnerability may have certain preconditions before it can
be found. Therefore, this “separate” status is easy to unilaterally estimate the
vulnerability threat, thus hiding the existence of the vulnerability. Therefore,
we need to model various types of Web vulnerabilities to find the greatest
threat to the website [15].
The impact of attack graph as a model of attack conditions, processes
and results in penetration testing This paper will design Vulnerability Threats
Testing Model (V T T M ) according to the basic idea of attack graph, and find
the biggest threat of the website comprehensively and accurately by solving
the model. The attack graph takes the form of directed graph. The vertex
represents the security status of the website. The conversion from edge to
edge contains various conditions. According to the basic idea of attack graph,
this paper will establish a V T T M model for the web vulnerability testing
process of the website, which will be represented by weighted directed
graph. Generally, the steps of establishing deletion model are: establishing
status conversion diagram → combine → optimize → determine the optimal
function and constraints.
The V T T M model has five basic elements: website security status S,
initial status S0 , purpose status St , security status conversion γ and value cost
ratio σ. V T T M model can be expressed by quintet (S0 , S,St , γ, σ), and its
basic thought S is to use a large number of test samples to test each security
status, and after the conversion condition is met, conduct status conversion.
If the target status can be reached in the end, it indicates that the website has
vulnerabilities corresponding to S0 and St .
Each status in s contains the following elements:
(1) User permission: current user level ID. It is usually represented by
enumeration, including guest (anonymous), IUSR-xxxx (Internet access
user), normal (public), administrator, etc.
(2) Target: specify the target to be tested, which can be single or multiple
servers. Status conversion does not involve target migration. This ele-
ment can be omitted.
(3) Vulnerability: exploitable vulnerability obtained through status
conversion.
1714 Y. Zhang and T. Zhang

(4) Ability: the harm that can be done to the website or the attack that can be
carried out under the current status, such as session spoofing, password
eavesdropping, Trojan horse implantation and SQL injection.
γij means to convert the website security status Sj to after applying the test
sample to Si , and such conversion is expressed by < Si , Sj >, where Si
refers to the test condition, and Sj refers to the test result. Test cases should
be atomic. That is, the smallest test unit in the test link can obtain a single
effect by a single means. In model V T T M , γij refers to directed edge, which
can assign value to each edge. Here, the weight can be expressed by the
binary (C, V ), whereC refers to the cost of implementing the test sample.
It is the comprehensive value of execution cycle, the possibility of being
recorded by IDs or IIS and overcoming system resources: V refers to the cost
of implementing the test sample. The above two elements are set according
to the tester’s own needs and experience.
The process of vulnerability testing can be regarded as a status conversion
process T P (called test path in this paper) based on test conditions, which is
represented by linear status sequence [16]:

T P = {S0 , S 1 , . . . , Sn , . . . , Sm | Sn ∈ S0 , s1 ∈ S, s1 ∈ Sm , 0 ≤ i ≤ |S|}
(1)
The key factor to reach the target status in V T T M is to reasonably and
fully design the test sample that can cover all the function modules in the
website program.
After establishment, traverse the status conversion diagram to obtain all
test paths from the initial status to the target status. Generally, there are
depth first traversal and width first traversal. In model V T T M , use deep
traverse first. And during the traverse, the path from s0 to s1 is the linear
status order. Then determine the optimal sequence according to the needs,
and exploit the vulnerabilities according to the optimal sequence will achieve
the maximum benefits. The optimal standard is determined by the needs of
the tester. For example, without considering the cost, only considering the
value, the optimal function is:
X
max vij (2)

If the value is not considered and only the cost is considered, the optimal
function is: X
min cij (3)
Research Into the Security Threat of Web Application 1715
Vij
If both are considered, the value cost ratio Pij = Cij can be introduced,
and the optimal function is:
X
min Pij (4)
The conversion conditions of each status in the model can be regarded as
constraints, which are mainly reflected in test condition S’s internal elements
of “vulnerability” and “capability”.
In the establishment of the V T T M model of Web loophole, all types
of vulnerability threats need to be considered. Determine the initial status
and target status respectively. Create their own sub status conversion dia-
grams, and then merge them into a global status conversion diagram. In
order to reduce the complexity of calculating the optimal test sequence, the
global status conversion diagram must be optimized. Optimization follows
the following principles:
(1) When merging status nodes, each element of the node must be consis-
tent. Otherwise, it cannot be merged.
(2) There is status node with conditional dependency, i.e., the two nodes
Si and Sj that can be expressed by ordered pair < Si , Sj > cannot be
merged.
(3) According to the actual situation of the website, check whether the
conversion conditions of each status are true. If not, remove the
conversion.
(4) Add necessary paths to different sub status conversion diagrams,
because the test process should be comprehensive and dynamic, and will
not be confined to a specific link. Testers may find the conditions for
this vulnerability through other defects of the web program, so that the
security status conversion can be transferred with preconditions.
(5) If there is a loop in the optimized status conversion diagram, the status
conversion in the loop may be atomic, so it is necessary to re analyze
and add new status nodes to avoid generating a loop.

4 Solution Algorithm of the Web Application Threat


Model
In order to solve the threat model of web application, we need to choose
an effective optimization algorithm. Butterfly optimization algorithm (BOA)
is a heuristic global optimization algorithm formally proposed by Sankalap
Arora and Satvir Singh in 2019 to simulate butterfly foraging behavior. BOA
1716 Y. Zhang and T. Zhang

algorithm has the advantages of simple implementation, few parameters and


novel ideas. It is suitable for solving high-dimensional function optimization
problems. Compared with other active optimization algorithms proposed in
recent years, the optimization performance is better and less affected by
the change of dimension, so it has great research potential However, there
are some problems such as slow convergence speed and low optimization
accuracy for complex functions.
Aiming at the shortcomings of BOA algorithm, this paper proposes a
Butterfly Optimization Algorithm based on Differential Mutation and Adap-
tive weight, (DMABOA). Firstly, in the global search stage, the nonlinear
inertia weight is introduced to adaptively adjust the detection range and
search granularity of the algorithm in different evolutionary periods. At the
same time, the global formula is further improved by adding F-distribution
adaptive random mutation, which improves the activity of the population and
expands the global search range of the algorithm. In the local search stage of
the algorithm, the TM strategy has a strong ability to judge the local number
part of the jump and the extreme disturbance value, while the TM strategy
accelerates the convergence speed of the algorithm [17, 18].
In the BOA algorithm, each butterfly will emit a certain concentration
of fragrance. At the same time, they can also sense the fragrance of other
butterflies and move towards the butterfly that emits a stronger fragrance.
Butterfly’s fragrance concentration formula is as follows [19]:
f = c · Ia (5)
Where, f refers to the fragrance concentration, I refers to the stimulation
degree, which is related to the adaptability; a is the power exponent, 0 ≤ a ≤
1, c is the sensing status, 0 ≤ c ≤ 1. In the BOA algorithm, a = 0.1, and the
initial value of c is 0.01.
The process of the basic BOA algorithm is as shown below:
Step 1: Initialize the parameters: the group size N , conversion probability
p, dimensional dim, the Butterfly’s fragrant sensing status c and power
exponent a, iteration times Niter and the initial position of Butterfly x = (x1 ,
x2 , . . . , xdim ).
Step 2: Calculate the fitness value of the objective function of each butterfly
and find the current optimal value. The stimulation intensity of each butterfly
is determined by the fitness value, and the fragrance concentration emitted by
butterfly is calculated.
Research Into the Security Threat of Web Application 1717

Step 3: Generate a uniformly distributed random number Rand, which is used


to decide whether butterfly performs global search or local search.
Step 4: When rand < p, conduct global search, butterfly individual moves to
the global optimal solution, and the global search formula is [20]:
Xit+1 = Xit + (r2 · g ∗ − Xit ) · f (6)

In the formula, Xit+1 refers to the solution vector of Butterfly i at iteration


t, and r is a random number evenly distributed among [0,1], g∗ refers to the
global optimal solution at present.
Step 5: When rand ≥ p, carry out local search, butterfly carries out local walk,
and the local search formula is:
Xit+1 = Xit + (r2 · Xjt − Xkt ) · f (7)

In the formula, Xit , Xjt , Xkt refers to the solution vector of the Butterfly
i, j, k at generation t, among which Xjt and Xkt are the position vectors of two
individuals randomly selected in the t generation population.
Step 6: Judge whether the algorithm operation meets the end conditions. If so,
record the current optimal solution and its target value. If not, update the
sensory form C of fragrance concentration according to Equation (8) and
return to step 2 to continue the next round of iteration.
0.025
c(t + 1) = c(t) + (8)
c(t) · Niter
In the formula, t is the current iteration times, and Niter is the maximum
iteration times.
In iterative evolutionary algorithms, inertia weight can be used to adjust
and control the global survey and local mining ability of the algorithm.
Aiming at the disadvantages of slow convergence speed and low optimization
accuracy of the basic butterfly algorithm for complex functions, this paper
introduces adaptive inertia weight in the global search stage, which decreases
nonlinearly with the increase of evolutionary algebra. The inertia weight
function is proposed as follows:
!
1 α · tα α · tβ
ω= · α + β (9)
(t + 1)(α+β)3 Niter Niter
1718 Y. Zhang and T. Zhang

Where, α and β are weight coefficients, and α = 3 and β = 5. According


to the analysis of the above formula, the value of inertial weight of ω is within
[0, 1]. The value decreases with the increase of the number of iterations,
that is, in the early stage of evolution, the weight value is large, the global
search ability of the algorithm is strong, and the detection range is large,
which is conducive to the algorithm to jump out of the local optimum, and
the weight value decreases with the increase of the number of iterations.
At this time, Butterfly performs fine mining near the optimal value, which
improves the optimization accuracy and accelerates the convergence speed of
the algorithm. The decreasing trend of continuous deceleration in the later
stage also improves the mining ability, balances a certain search ability, and
maintains appropriate population activity and the ability to jump away from
local extreme points. The improved global location update formula is [21]:

Xit+1 = ω · Xit + (r2 · g ∗ − Xit ) · f (10)

The key factor in the global optimization algorithm is the activity of


basic BOA. In order to improve the activity of butterfly population, adaptive
random variation is introduced into the global formula. In the global search
of the algorithm, the update of the next generation butterfly location is not
only determined by the current butterfly location and the global optimal
butterfly location, but also participated by the random butterfly location in
the contemporary population, which increases the diversity of the butterfly
population and improves the search ability of the algorithm in the global
stage. The adaptive random variation formula is as follows:

Ra = ε · (Xjt − Xkt ) (11)


 
Niter − t
ε = ε0 + f pdf () · (1 − ε0 ) · (12)
π · Niter

In formula (11), Xjt and Xkt are the random solutions within the current
group. ε is the mutation factor, and its calculation formula is as shown in for-
mula (12), among which ε0 is the initial mutation factor. After a large number
of tests, when ε0 is 0.1, the algorithm has the best improvement effect. f pdf ()
is a random number that obeys the F distribution. The F distribution function
presents an asymmetric peak shape, which first increases rapidly and then
decreases slowly, which helps butterfly individuals adaptively converge to
the position of the global optimal solution with the increase of the number of
iterations. The formula combining the number of iterations and F distribution
Research Into the Security Threat of Web Application 1719

is as follows [22]:
( µ+1 −1)
Γ µ+λ
 
2 µ µ t 2
F = · · · 1+
Γ µ2 Γ λ2 λ λ Niter
  (− µ+1 )
µ t 2
· 1+ · 1+ (13)
λ Niter
In the formula, λ and µ are the degrees of freedom with non-
interchangeable positions. After repeated tests, when λ = 3 and µ = 4,
the algorithm has the strongest ability in global search and the fastest
convergence speed. The global search formula is as follows:

Xit+1 = ω · Xit + (r2 · g ∗ − Xit + Ra) · f (14)

Targeted Mutation (TM) strategy is an improvement of differential muta-


tion strategy. Introducing TM tool into local optimal stage of BOA can well
adjust the balance between randomness and certainty of difference vector,
therefore problems of low optimal efficiency and slow running speed due to
large randomness in local search stage can be prevented.
The key for BOA to obtain high-quality global optimal solution is whether
the algorithm can get rid of local extremum. If only TM strategy is added,
it will not only accelerate the convergence speed, but also increase the
possibility of the algorithm falling into local optimal solution. To reduce
this risk, the improved BOA algorithm uses the decision coefficient based on
the directional difference strategy ξ to choose between the current butterfly
location and the global optimal butterfly location of the current generation.
If the decision random number is greater than the decision coefficient, the
random walk is implemented according to current butterfly position; If the
decision random number is less than or equal to the coefficient, the random
walk is carried out based on the global optimal butterfly position of the
current generation. TM policy model is expressed by:
If rand > ξ
Xit+1 = Xit + (r2 · Xjt − Xkt ) · f (15)
Otherwise,
Xit+1 = η · g ∗ + θ · (Xjt − Xkt ) · f (16)
Where θ is the golden ratio coefficient, r is a random number distributed
evenly in [0, 1], g ∗ is the global optimal solution at present. It can make
1720 Y. Zhang and T. Zhang

the new solution move towards the optimal solution and accelerate the con-
vergence speed. It is verified from a large number of experiments that when
ξ = 0.9, the algorithm has the strongest local search ability and is easier to
jump out of local extremum; η is the disturbing factor. It is to prevent the
algorithm from falling into local extremum due to the introduction of the
current optimal value, further improve the optimization performance of the
algorithm and find the global optimal solution. The calculation formula of η
is as follows:

η = 1 + gamrnd() · tan(π · (rand − 0.5)) (17)

In the formula, gamrnd() is Gamma random number, and rand is the


jump of random number value gamrnd() helps the algorithm avoid local
optimal value, and makes the value of disturbance factor η more flexible and
diverse.

5 Example Analysis
To validate effectiveness of constructed web application threat model, a
V V T M model is established with SQL injection vulnerability as the research
object. The target status is to get the webshell of the website. The five
elements of the model are described above, and the corresponding status
conversion diagram is illustratedPin Figure 1.
d(i, j, k) refers to the max Pij corresponding to the path from node
Si to node Sj , and the maximum node on this path is Sk . Thus, it can be
defined that:
0, i = j, k = 0




−∞, < si , sj >∈ γ

d(i, j, k) = (18)


 max{d(i, j, k − 1), d(i, k, k − 1)


+d(i, j, k − 1), < si , sj >∈ γ, k ≥ 0
294506 pieces of data were used in the experiment, including XSS, SQL
injection, LFI, command execution, directory traversal, RFI and normal
traffic sample data. The data distribution is shown in Figure 2.
The parameter setting of IBOA is as follows: N = 45, dim =
10/50/1000 and Niter = 50. In order to verify the effectiveness of this
algorithm, the same model is solved by using PSA and GA. The analysis
results are shown in Table 1.
Research Into the Security Threat of Web Application 1721

Figure 1 Status conversion diagram of SQL injection vulnerability threat.

Figure 2 Simulation analysis data distribution.

Table 1 Comparison of optimization result


dim = 10 dim = 50 dim = 50
Bad Optimal Average Bad Optimal Average Bad Optimal Average
Algorithm Solution Solution Value Solution Solution Value Solution Solution Value
IBOA 6.56 7.12 6.84 7.22 8.15 7.69 7.43 8.57 8.00
PSA 5.24 6.33 5.79 6.43 7.03 6.73 6.65 7.24 6.95
GA 4.88 5.05 4.97 5.47 6.27 5.87 5.53 6.46 5.99

It can be seen from Table 1 that for different dimensions, IBOA obtains
the largest optimal value among the three algorithms, so IBOA can obtain
the optimal path. As the dimension decreases, the optimal values obtained by
different methods tend to converge. Therefore, IBOA has the advantages of
high optimization accuracy, global optimization and stable solution.
1722 Y. Zhang and T. Zhang

Table 2 Classification results of optimization model


Times Accuracy Rate/% Recall Rate/%
1 99.2 99.1
2 99.4 99.2
3 99.2 99.2
4 99.2 99.4
5 99.3 99.2
Average 99.2 99.2

The final optimization model is obtained through training. Finally, when


the model parameters are fixed, 20% of data is used as test collection and 80%
of data is used as the training collection. Experimental results are obtained by
repeated execution for many times, which are illustrated in Table 2.
Through the observation of the results of many experiments, the average
accuracy rate is 99.1% and the average recall rate is 99.1%, which shows
that the model has better classification effect. The proposed model can obtain
the better analysis results, and the correct analysis results can provide the
effective measures for ensuring security of Web application.

6 Conclusion
Anomaly detection of web application is a new direction of anomaly detec-
tion. At present, the research on anomaly detection of web application is in its
infancy. This paper discusses the method of vulnerability threat model based
on Web. According to the basic idea of attack graph, the V V T M model is
established by taking sol injection attack as an example. The dynamic pro-
gramming algorithm is used to solve this problem, and the safety evaluation
is carried out. Compared with the traditional anomaly detection, it also has
the problem of too high false alarm, as well as the challenges of effective
utilization of load information, protection of users’ privacy, response to data
encryption and so on. This research constructs an improved BOA algorithm,
which avoids the ability of individuals to jump out of local optimal solution,
speeds up the convergence speed, improves the optimization accuracy, has
good optimization stability when the dimension changes, and improves the
optimization level of web application threat model. Through performance
comparison analysis between IBOA and PSA and GA, the better performance
of IBOA has been verified.
Research Into the Security Threat of Web Application 1723

References
[1] Zohreh S. Gatmiry, Ashkan Hafezalkotob, Morteza Khakzar bafruei,
Roya Soltani, Food web conservation vs. strategic threats: A security
game approach, Ecological Modelling, 442, 2021, 109426.
[2] Simon Applebaum, Tarek Gaber, Ali Ahme, Signature-based and
Machine-Learning-based Web Application Firewalls: A Short Survey,
Procedia Computer Science, 189, 2021, 359–367.
[3] Giuseppe Cascavilla, Damian A. Tamburri, Willem-Jan Van Den
Heuvel, Cybercrime threat intelligence: A systematic multi-vocal litera-
ture review, Computers & Security, 105, 2021, 102258.
[4] Andrea Tundis, Samuel Ruppert, Max Mühlhäuser, A Feature-driven
Method for Automating the Assessment of OSINT Cyber Threat
Sources, Computers & Security, 113, 2022, 102576.
[5] Massimiliano Rak, Giovanni Salzillo, Daniele Granata, ESSecA: An
automated expert system for threat modelling and penetration testing
for IoT ecosystems, Computers and Electrical Engineering, 99, 2022,
107721.
[6] Bin Zhao, Yi Ren, Diankui Gao, Lizhi Xu, Yuanyuan Zhang, Energy uti-
lization efficiency evaluation model of refining unit Based on Contourlet
neural network optimized by improved grey optimization algorithm,
Energy, 185, 2019, 1032–1044.
[7] Adem Tekerek, A novel architecture for web-based attack detection
using convolutional neural network, Computers & Security, 100, 2021,
102096.
[8] Stefano Calzavara, Hugo Jonker, Benjamin Krumnow, Alvise Rabitti,
Measuring Web Session Security at Scale, Computers & Security, 111,
2021, 102472
[9] Adem Tekerek, A novel architecture for web-based attack detection
using convolutional neural network, Computers & Security, 100, 2021,
102096.
[10] Bin Zhao, Yi Ren, Diankui Gao, Lizhi Xu, Performance ratio prediction
of photovoltaic pumping system based on grey clustering and second
curvelet neural network, Energy, 171, 2019, 360–371.
[11] Göksel Uçtu, Mustafa Alkan, İbrahim Alper Doğru, Murat Dörterler,
A suggested testbed to evaluate multicast network and threat prevention
performance of Next Generation Firewalls, Future Generation Computer
Systems, 124, 2021, 56–67.
[12] Waleed Bin Shahi, Baber Aslam Haider, Abbas Hammad AfzalSaad,
Bin Khalid, A deep learning assisted personalized deception system for
1724 Y. Zhang and T. Zhang

countering web application attacks, Journal of Information Security and


Applications, 67, 2022, 103169.
[13] Chadni Islam, M. Ali Babar, Roland Croft, Helge Janicke, SmartValida-
tor: A framework for automatic identification and classification of cyber
threat data, Journal of Network and Computer Applications, 202, 2022,
103370.
[14] Sang Min Han, Chanyoung Lee, Poong Hyun Seong, Estimating the
frequency of cyber threats to nuclear power plants based on operat-
ing experience analysis, International Journal of Critical Infrastructure
Protection, 37, 2022, 100523.
[15] Sang Min Han, Chanyoung Lee, Poong Hyun Seong, Estimating the
frequency of cyber threats to nuclear power plants based on operat-
ing experience analysis, International Journal of Critical Infrastructure
Protection, 37, 2022, 100523.
[16] Renya Nath, NHiran V Nath, Critical analysis of the layered and system-
atic approaches for understanding IoT security threats and challenges,
Computers and Electrical Engineering, 100, 2022, 1079997.
[17] Frank L. Greitzer, James D. Lee, Justin Purl, Abbas K. Zaidi, Design and
Implementation of a Comprehensive Insider Threat Ontology, Procedia
Computer Science, 153, 2019, 361–369.
[18] Arnau Erol, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese,
Insider-threat detection: Lessons from deploying the CITD tool in
three multinational organisations, Journal of Information Security and
Applications, 67, 2022, 103167.
[19] Ha Thanh Le, Lwin Khin Shar, Domenico Bianculli, Lionel Claude
Briand, Cu Duy Nguyen, Automated reverse engineering of role-based
access control policies of web applications, Journal of Systems and
Software, 184, 2022, 111109.
[20] Wen Long, Ming Xu, Jianjun Jiao, Tiebin Wu, Mingzhu Tang, Shao-
hong Cai, A velocity-based butterfly optimization algorithm for high-
dimensional optimization and feature selection, Expert Systems with
Applications, 201, 2022, 117217.
[21] Anurag Tiwari, Amrita Chaturvedi, A hybrid feature selection approach
based on information theory and dynamic butterfly optimization algo-
rithm for data classification, Expert Systems with Applications, 196,
2022, 116621.
[22] Zohre Sadeghian, Ebrahim Akbari, Hossein Nematzadeh, A hybrid
feature selection method based on information theory and binary but-
terfly optimization algorithm, Engineering Applications of Artificial
Intelligence, 97, 2021, 104079.
Research Into the Security Threat of Web Application 1725

Biographies

Yanling Zhang was born in Jiaozuo City, Henan Province, China, she
obtained a master’s degree in computer application technology from the
Information Engineering University of the People’s Liberation Army in 2006.
She is currently an associate professor at the School of Information Engi-
neering, Jiaozuo University, Henan Province. Her research interests include
big data, machine learning and other technologies is applied research in
various fields of society. Since 2017, she has presided over or participated
in 4 provincial and ministerial projects, presided over the completion of 16
municipal and departmental projects, and participated in 10 projects; received
funding for many times; published 1 academic monograph; and completed
10 utility model patents as the first inventor 2 invention patents; 10 papers
published; 13 achievement awards.
1726 Y. Zhang and T. Zhang

Ting Zhang was born in Jiaozuo City, Henan Province, China, She received
the B.S. degree in computer science and technology from Anyang Normal
University in 2015 and the M.S. degree in computer application technology
from Kunming University of science and technology in 2018. She is currently
a assistant at the School of Information Engineering, Jiaozuo University,
China. Her research interests include Data Mining and Cloud Computing.
She has published a paper, participated in writing a SCI paper and has been
published, participated in three invention patents, and participated in writing
two core papers.

You might also like