Behind an application firewall, are we safe from SQL injection attacks?

Dennis Appelt, Cu D. Nguyen, Lionel Briand

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Web application firewalls are an indispensable layer to protect online systems from attacks. However, the fast pace at which new kinds of attacks appear and their sophistication require that firewalls be updated and tested regularly as otherwise they will be circumvented. In this paper, we focus our research on web application firewalls and SQL injection attacks. We present a machine learning-based testing approach to detect holes in firewalls that let SQL injection attacks bypass. At the beginning, the approach can automatically generate diverse attack payloads, which can be seeded into inputs of web- based applications, and then submit them to a system that is protected by a firewall. Incrementally learning from the tests that are blocked or passed by the firewall, our approach can then select tests that exhibit characteristics associated with bypassing the firewall and mutate them to efficiently generate new bypassing attacks. In the race against cyber attacks, time is vital. Being able to learn and anticipate more attacks that can circumvent a firewall in a timely manner is very important in order to quickly fix or fine-tune the firewall. We developed a tool that implements the approach and evaluated it on ModSecurity, a widely used application firewall. The results we obtained suggest a good performance and efficiency in detecting holes in the firewall that could let SQLi attacks go undetected.

Original languageEnglish
Title of host publication2015 IEEE 8th International Conference on Software Testing, Verification and Validation, ICST 2015 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781479971251
DOIs
Publication statusPublished - 5 May 2015
Externally publishedYes
Event8th IEEE International Conference on Software Testing, Verification and Validation, ICST 2015 - Graz, Austria
Duration: 13 Apr 201517 Apr 2015

Publication series

Name2015 IEEE 8th International Conference on Software Testing, Verification and Validation, ICST 2015 - Proceedings

Conference

Conference8th IEEE International Conference on Software Testing, Verification and Validation, ICST 2015
Country/TerritoryAustria
CityGraz
Period13/04/1517/04/15

Fingerprint

Dive into the research topics of 'Behind an application firewall, are we safe from SQL injection attacks?'. Together they form a unique fingerprint.

Cite this