期刊文献+

模型驱动的Web应用SQL注入渗透测试 被引量:5

Model-driven penetration test of the SQL injection in Web applications
下载PDF
导出
摘要 针对结构化查询语言(SQL)注入渗透测试用例不充分造成测试漏报的问题,对基于形式化建模生成渗透测试用例问题进行了研究,提出了以下方法:将SQL注入漏洞渗透测试用例生成分为两步:第1步建立渗透测试用例的形式化模型,以用例模型更全面、有规律地描述当前各种SQL注入攻击的方法模式,指导生成更多种类的用例输入;第2步提出若干新的SQL注入漏洞渗透测试用例覆盖度准则,将用例模型实例化、生成覆盖更多样式的用例输入。实验表明,用上述方法生成的用例,优于当前其它研究中使用的随机枚举用例,可更有效地测出隐藏于Web应用不足防御措施之后的SQL注入漏洞,从而降低渗透测试结果的漏报。 To resolve the problem of how to generate adequate test cases to reduce the false negative in penetration testing for the SQL (structured query language ) injection vulnerability, this paper proposes a novel model-driven penetra- tion test case generation method. This method divides the penetration test case generation for the SQL injection vul- nerability into two steps : 1 ) Building the model of penetration test case, which reveals the regularity of current SQL injection attacks to expound what test case should be used and describes them in a formal way; and 2) Instantiating the penetration test case model according to a series of coverage criteria proposed in the study to generate the test case covering more attack patterns. The experiment shows that compared with randomly enumerated test cases used in the current related work, the test cases generated by the proposed method can more effectively find the SQL in- jection vulnerability hidden behind the inadequate defense mechanism, which reduces the false negative and im- proves the test accuracy.
出处 《高技术通讯》 CAS CSCD 北大核心 2012年第11期1161-1168,共8页 Chinese High Technology Letters
基金 863计划(2009AA012152)和天津市自然科学基金重点(12JCZDJC20800)资助项目.
关键词 WEB 渗透测试 结构化查询语言(SQL)注入 攻击建模 安全漏洞 用例 Web, penetration testing, structured query language (SQL) injection, attack model, vulnerabili-ty, test case
  • 相关文献

参考文献13

  • 1Bau J,Bursztein E, Gupta D,et al. State of the art: au-tomated black-box web application vulnerability testing.In: Proceedings of the 2010 IEEE Symposium on Securityand Privacy, Oakland, USA, 2010. 332-345.
  • 2Doup'e A, Cova M, Vigna Gi. Why johnny can’t pen-test: an analysis of black-box web vulnerability scanners.In: Proceedings of the 7th GI International Conference onDetection of Intrusions and Malware and Vulnerability As-sessment ,Bonn, Germany, 2010. 111-131.
  • 3Antunes J,Neves N,Correia M,et al. Vulnerability dis-covery with attack injection. IEEE Transactions on Soft-ware Engineering, 2010,36(3). :357-369.
  • 4Halford W, Choudhary S, Orso A. Improving penetrationtesting through static and dynamic analysis. In: Proceed-ings of the 2nd IEEE International Conference on SoftwareTesting, Verification and Validation, West Sussex, UK,2011.195-214.
  • 5Antunes N, Laranjeiro N, Vieira M, et al. Effective de-tection of SQL/XPath injection vulnerabilities in webservices. In: Proceedings of the IEEE International Con-ference on Services Computing, Bangalore, India, 2009.260-267.
  • 6Fong E,Gaucher R,Okun V, et al. Building a test suitefor web application scanners. In: Proceedings of AnnualHawaii International Conference on System Sciences, Ha-waii, USA, 2008. 479486.
  • 7Byers D, Shahmehri N. Unified modeling of attacks, vul-nerabilities and security activities. In: Proceedings of2010 ICSE Workshop on Software Engineering for SecureSystems, New York, USA, 2010. 3642.
  • 8Wang J, Phan R C,John N, et al. Augmented attack treemodeling of SQL injection attacks. In: Proceedings of the2nd IEEE International Conference on Information Man-agement and Engineering, Chengdu, China,2010. 182-186.
  • 9Marback A, Do H, He K, et al. Security test generationusing threat trees. In: Proceedings of ICSE Workshop onAutomation of Software Test, Vancouver, Canada, 2009.62-69.
  • 10Kiezun A, Guo P, Jayaraman K, et al. Automatic crea-tion of SQL injection and Cross-Site Scripting attacks. In:Proceedings of the 31st International Conference on Soft-ware Engineering, Vancouver, Canada, 2009. 199-209.

同被引文献59

引证文献5

二级引证文献30

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部