Open Access Open Access  Restricted Access Subscription Access

Deployement of Data Analytics in Defending Web Attacks

K. Thirumoorthy

Abstract


The approach consists of analyzing the web application source code for input validation vulnerabilities for XSS attacks. We explore the use of a combination of methods to detect this type of vulnerabilities: static analysis and data mining. Static analysis in source code, but tends to report much non-vulnerability due to its undecidability. This problem is particularly difficult with languages such as PHP that are weakly typed and not formally specified. Therefore, we complement a form of static analysis, with the use of data mining to predict the existence of false positives. To predict the existence of false positives we introduce the novel idea of assessing if the vulnerabilities detected are false positives using data mining and use a combination of data mining algorithm to find the top-ranking classifiers to flag every vulnerability as false positive or not.

 


Full Text:

PDF

References


WAP tool website. http://awap.sourceforge.net/.

J. Antunes, N. F. Neves, M. Correia, P. Verissimo, and R. Neves.Vulnerability removal with attack injection. IEEE Transactions on Software Engineering, 36(3):357–370, 2010.

E. Arisholm, L. C. Briand, and E. B. Johannessen. A systematic and comprehensive investigation of methods to build and evaluate fault Prediction models. Journal of Systems and Software, 83(1):2–17, 2010.

R. Banabic and G. Candea. Fast black-box testing of system recovery Code. In Proceedings of the 7th ACM European Conference on Computer Systems, pages 281–294, 2012.

L. C. Briand, J. Wüst, J. W. Daly, and D. Victor Porter. Exploring the Relationships between design measures and software quality in object oriented Systems. Journal of Systems and Software, 51(3):245–273, 2000.


Refbacks

  • There are currently no refbacks.