An Innovative Security Strategy using Reactive Web Application Honeypot

05/11/2021
by   Rajat Gupta, et al.
0

Nowadays, web applications have become most prevalent in the industry, and the critical data of most organizations stored using web apps. Hence, web applications a much bigger target for diverse cyber-attacks, which varies from database injections-SQL injection, PHP object injection, template injection, XML external entity injection, unsanitized input attacks- Cross-Site Scripting(XSS), and many more. As mitigation for them, among many proposed solutions, web application honeypots are a much sophisticated and powerful protection mechanism. In this paper, we propose a low interaction, adaptive, and dynamic web application honeypot that imitates the vulnerabilities through HTTP events. The honeypot is built with SNARE and TANNER; SNARE creates the attack surface and sends the requests to TANNER, which evaluates them and decides how SNARE should respond to the requests. TANNER is an analysis and classification tool, which analyzes and evaluates HTTP requests served by SNARE and to compose the response, it is powered by emulators, which are engines used for the emulation of vulnerabilities.

READ FULL TEXT

page 2

page 4

research
06/22/2020

You shall not pass: Mitigating SQL Injection Attacks on Legacy Web Applications

SQL injection (SQLi) attacks pose a significant threat to the security o...
research
08/03/2023

From Prompt Injections to SQL Injection Attacks: How Protected is Your LLM-Integrated Web Application?

Large Language Models (LLMs) have found widespread applications in vario...
research
05/07/2020

Database Traffic Interception for Graybox Detection of Stored and Context-Sensitive XSS

XSS is a security vulnerability that permits injecting malicious code in...
research
11/07/2017

Detection of Wordpress Content Injection Vulnerability

The popularity of content management software (CMS) is growing vastly to...
research
11/21/2018

Malicious Web Request Detection Using Character-level CNN

Web parameter injection attacks are common and powerful. In this kind of...
research
06/12/2022

Evolutionary Multi-Task Injection Testing on Web Application Firewalls

Web application firewall (WAF) plays an integral role nowadays to protec...
research
04/02/2020

CORSICA: Cross-Origin Web Service Identification

Vulnerabilities in private networks are difficult to detect for attacker...

Please sign up or login with your details

Forgot password? Click here to reset