Skip to main content
Erschienen in: Programming and Computer Software 6/2018

01.11.2018

NoSQL Injection Attack Detection in Web Applications Using RESTful Service

verfasst von: Ahmed M. Eassa, Mohamed Elhoseny, Hazem M. El-Bakry, Ahmed S. Salama

Erschienen in: Programming and Computer Software | Ausgabe 6/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Despite the extensive research of using web services for security purposes, there is a big challenge towards finding a no radical solution for NoSQL injection attack. This paper presents an independent RESTful web service in a layered approach to detect NoSQL injection attacks in web applications. The proposed method is named DNIARS. DNIARS depends on comparing the generated patterns from NoSQL statement structure in static code state and dynamic state. Accordingly, the DNIARS can respond to the web application with the possibility of NoSQL injection attack. The proposed DNIARS was implemented in PHP plain code and can be considered as an independent framework that has the ability for responding to different requests formats like JSON, XML. To evaluate its performance, DNIARS was tested using the most common testing tools for RESTful web service. According to the results, DNIARS can work in real environments where the error rate did not exceed 1%.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Arcuri, A., RESTful API automated test case generation, Proc. 2017 IEEE Int. Conf. on Software Quality, Reliability and Security (QRS), Prague, 2017, pp. 9–20. Arcuri, A., RESTful API automated test case generation, Proc. 2017 IEEE Int. Conf. on Software Quality, Reliability and Security (QRS), Prague, 2017, pp. 9–20.
2.
Zurück zum Zitat Pautasso, C., RESTful API Design: Best Practices in API Design with RESTs, API-Univ., 2016. Pautasso, C., RESTful API Design: Best Practices in API Design with RESTs, API-Univ., 2016.
3.
Zurück zum Zitat Zafar, R., Yafi, E., Zuhairi, M.F., and Dao, H., Big data: the NoSQL and RDBMS review, Proc. 2016 Int. Conf. on Information and Communication Technology (ICICTM), Kuala Lumpur, 2016, pp. 120–126. Zafar, R., Yafi, E., Zuhairi, M.F., and Dao, H., Big data: the NoSQL and RDBMS review, Proc. 2016 Int. Conf. on Information and Communication Technology (ICICTM), Kuala Lumpur, 2016, pp. 120–126.
4.
Zurück zum Zitat Eassa, A.M., Al-Tarawneh, O.H., El-Bakry, H.M., and Salama, A.S., NoSQL racket: a testing tool for detecting NoSQL injection attacks in web applicationss, Int. J. Adv. Comput. Sci. Appl., 2017, vol. 8, no. 11, pp. 614–622. Eassa, A.M., Al-Tarawneh, O.H., El-Bakry, H.M., and Salama, A.S., NoSQL racket: a testing tool for detecting NoSQL injection attacks in web applicationss, Int. J. Adv. Comput. Sci. Appl., 2017, vol. 8, no. 11, pp. 614–622.
5.
Zurück zum Zitat Okman, L., Gal-Oz, N., Gonen, Y., Gudes, E., and Abramov, J., Security issues in NoSQL databasess, Proc. 10th IEEE Int. Conf. on Trust, Security Privacy Comput. Commun. (TrustCom), Hogn Kong, 2011, pp. 541–547. Okman, L., Gal-Oz, N., Gonen, Y., Gudes, E., and Abramov, J., Security issues in NoSQL databasess, Proc. 10th IEEE Int. Conf. on Trust, Security Privacy Comput. Commun. (TrustCom), Hogn Kong, 2011, pp. 541–547.
6.
Zurück zum Zitat Cory, N., Travis, L., Reenu, I., and Gary, H., NoSQL vs RDBMS – why there is room for boths, Proc. SAIS 2013, Savannah, March 8–9, 2013. Cory, N., Travis, L., Reenu, I., and Gary, H., NoSQL vs RDBMS – why there is room for boths, Proc. SAIS 2013, Savannah, March 8–9, 2013.
7.
Zurück zum Zitat Schram, A. and Anderson, K.M., MySQL to NoSQL: data modelling challenges in supporting scalabilitys, Proc. 3rd Annu. Conf. on Systems, Programming, and Applications: Software for Humanity SPLASH’12, Tucson, 2012, pp. 191–202. Schram, A. and Anderson, K.M., MySQL to NoSQL: data modelling challenges in supporting scalabilitys, Proc. 3rd Annu. Conf. on Systems, Programming, and Applications: Software for Humanity SPLASH’12, Tucson, 2012, pp. 191–202.
8.
Zurück zum Zitat Kaur, D. and Kaur, P., Empirical analysis of web attackss, Proc. Comput. Sci., 2016, vol. 78, pp. 298–306.CrossRef Kaur, D. and Kaur, P., Empirical analysis of web attackss, Proc. Comput. Sci., 2016, vol. 78, pp. 298–306.CrossRef
9.
Zurück zum Zitat Prokhorenko, V., Kim-Kwang Raymond Choo, and Ashman, H., Web application protection techniques: a taxonomy, J. Network Comput. Appl., 2016, vol. 60, pp. 95–112.CrossRef Prokhorenko, V., Kim-Kwang Raymond Choo, and Ashman, H., Web application protection techniques: a taxonomy, J. Network Comput. Appl., 2016, vol. 60, pp. 95–112.CrossRef
10.
Zurück zum Zitat Rababah, O.M., Al Hwaitat, A.K., Al Manaseer, S., Fakhouri, H.N., and Halaseh, R., Web threats detection and prevention frameworks, Commun. Network, 2016, vol. 8, no. 3, pp. 170–178.CrossRef Rababah, O.M., Al Hwaitat, A.K., Al Manaseer, S., Fakhouri, H.N., and Halaseh, R., Web threats detection and prevention frameworks, Commun. Network, 2016, vol. 8, no. 3, pp. 170–178.CrossRef
11.
Zurück zum Zitat Tajpour, A., Ibrahim, S., and Sharifi, M., Web application security by SQL injection DetectionTools, Int. J. Comput. Sci., 2012, vol. 9, issue 2, no 3, pp. 332–339. Tajpour, A., Ibrahim, S., and Sharifi, M., Web application security by SQL injection DetectionTools, Int. J. Comput. Sci., 2012, vol. 9, issue 2, no 3, pp. 332–339.
12.
Zurück zum Zitat Bherde, G.P. and Pund, M.A., Recent attack prevention techniques in web service applications, Proc. 2016 Int. Conf. on Automatic Control and Dynamic Optimization Techniques (ICACDOT), Pune, 2016, pp. 1174–1180. Bherde, G.P. and Pund, M.A., Recent attack prevention techniques in web service applications, Proc. 2016 Int. Conf. on Automatic Control and Dynamic Optimization Techniques (ICACDOT), Pune, 2016, pp. 1174–1180.
13.
Zurück zum Zitat Shanmughaneethi, S.V. Emilin Shyni, S.C., and Swamynathan, S., SBSQLID: securing web applications with service based SQL injection detections, Proc. Int. Conf. on Advances in Computing, Control, and Telecommunication Technologies, Trivandrum, Kerala, 2009, pp. 702–704. Shanmughaneethi, S.V. Emilin Shyni, S.C., and Swamynathan, S., SBSQLID: securing web applications with service based SQL injection detections, Proc. Int. Conf. on Advances in Computing, Control, and Telecommunication Technologies, Trivandrum, Kerala, 2009, pp. 702–704.
14.
Zurück zum Zitat Jan, S., Panichella, A., Arcuri, A., and Briand, L., Automatic generation of tests to exploit XML injection vulnerabilities in web applications, IEEE Trans. Software Eng., 2017, no. 99. Jan, S., Panichella, A., Arcuri, A., and Briand, L., Automatic generation of tests to exploit XML injection vulnerabilities in web applications, IEEE Trans. Software Eng., 2017, no. 99.
15.
Zurück zum Zitat Shrivastava, R., Bhattacharyji, J., and Soni, R., SQL injection attacks in database using web service: detection and prevention – reviews, Asian J. Comput. Sci. Inf. Technol., 2012, vol. 2, no. 6, pp. 162–165. Shrivastava, R., Bhattacharyji, J., and Soni, R., SQL injection attacks in database using web service: detection and prevention – reviews, Asian J. Comput. Sci. Inf. Technol., 2012, vol. 2, no. 6, pp. 162–165.
16.
Zurück zum Zitat Mouli, V.R. and Jevitha, K.P., Web services attacks and security – a systematic literature reviews, Proc. Comput. Sci., 2016, vol. 93, pp. 870–877.CrossRef Mouli, V.R. and Jevitha, K.P., Web services attacks and security – a systematic literature reviews, Proc. Comput. Sci., 2016, vol. 93, pp. 870–877.CrossRef
17.
Zurück zum Zitat NoSQL does not have to mean no security: data security and compliance best practices for NoSQL data systems, IBM Corporation, 2016. http://whitepapers. theregister.co.uk/paper/view/4306/nosql-does-not-have-to-mean-no-security.pdf. Accessed March, 1 2018. NoSQL does not have to mean no security: data security and compliance best practices for NoSQL data systems, IBM Corporation, 2016. http://​whitepapers.​ theregister.co.uk/paper/view/4306/nosql-does-not-have-to-mean-no-security.pdf. Accessed March, 1 2018.
18.
Zurück zum Zitat Lane, A., Securing big data: security recommendations for hadoop and NoSQL environments, Securosis L.L.C., 2012, pp. 4–6. Lane, A., Securing big data: security recommendations for hadoop and NoSQL environments, Securosis L.L.C., 2012, pp. 4–6.
19.
Zurück zum Zitat Amreen and Dadapeer, A survey on robust security mechanism for NoSQL databases, Int. J. Innov. Res. Comput. Commun. Eng., 2016, vol. 4, no. 4, pp. 7662–7666. Amreen and Dadapeer, A survey on robust security mechanism for NoSQL databases, Int. J. Innov. Res. Comput. Commun. Eng., 2016, vol. 4, no. 4, pp. 7662–7666.
20.
Zurück zum Zitat Ron, A., Shulman-Peleg, A., and Bronshtein, E., No SQL, no injection? Examining NoSQL securitys, Proc. 36th IEEE Symp. on Security and Privacy, San Jose, 2015, vol. 1. Ron, A., Shulman-Peleg, A., and Bronshtein, E., No SQL, no injection? Examining NoSQL securitys, Proc. 36th IEEE Symp. on Security and Privacy, San Jose, 2015, vol. 1.
21.
Zurück zum Zitat Gupta, N. and Agrawal, R., NoSQL security, in Advances in Computers, Elsevier, 2018. Gupta, N. and Agrawal, R., NoSQL security, in Advances in Computers, Elsevier, 2018.
22.
Zurück zum Zitat Hou, B., Qian, K., Li, L., Shi, Y., Tao, L., and Liu, J., MongoDB NoSQL injection analysis and detection, Proc. 3rd IEEE Int. Conf. on Cyber Security and Cloud Computing (CSCloud), Beijing, 2016, pp. 75–78. Hou, B., Qian, K., Li, L., Shi, Y., Tao, L., and Liu, J., MongoDB NoSQL injection analysis and detection, Proc. 3rd IEEE Int. Conf. on Cyber Security and Cloud Computing (CSCloud), Beijing, 2016, pp. 75–78.
23.
Zurück zum Zitat Priyadharshini, S. and Rajmohan, R., Analysis on database security model against NOSQL injection, Int. J. Sci. Res. Comput. Sci., Eng. Inf. Technol., 2017, vol. 2, no. 2, pp. 168–171. Priyadharshini, S. and Rajmohan, R., Analysis on database security model against NOSQL injection, Int. J. Sci. Res. Comput. Sci., Eng. Inf. Technol., 2017, vol. 2, no. 2, pp. 168–171.
24.
Zurück zum Zitat Sahafizadeh, E. and Nematbakhsh, M.A., A survey on security issues in big data and NoSQLs, ACSIJ J., 2015, vol. 4, issue 4, no.16, pp. 68–72. Sahafizadeh, E. and Nematbakhsh, M.A., A survey on security issues in big data and NoSQLs, ACSIJ J., 2015, vol. 4, issue 4, no.16, pp. 68–72.
25.
Zurück zum Zitat Son, S. and McKinley, K.S., Diglossia: detecting code injection attacks with precision and efficiencys, Proc. 20th ACM Conf. on Computer and Communications Security (CCS), Berlin, 2013, pp. 1181–1192. Son, S. and McKinley, K.S., Diglossia: detecting code injection attacks with precision and efficiencys, Proc. 20th ACM Conf. on Computer and Communications Security (CCS), Berlin, 2013, pp. 1181–1192.
26.
Zurück zum Zitat Eassa, F.E., Zaki, M., Eassa, A.M., and Aljehani, T., IMATT: an integrated multi-agent testing tool for the security of agent-based web applicationss, World J. Comput. Appl. Technol., 2012, vol. 1, no. 2, pp. 19–28. Eassa, F.E., Zaki, M., Eassa, A.M., and Aljehani, T., IMATT: an integrated multi-agent testing tool for the security of agent-based web applicationss, World J. Comput. Appl. Technol., 2012, vol. 1, no. 2, pp. 19–28.
27.
Zurück zum Zitat OWASP Top 10, web application security risks report. http://www.owasp.org. Accessed March 1, 2018. OWASP Top 10, web application security risks report. http://​www.​owasp.​org.​ Accessed March 1, 2018.
28.
Zurück zum Zitat CWE/SANS Top 25 Most Dangerous Software Errors. http://cwe.mitre.org/top25/. Accessed March 1, 2018. CWE/SANS Top 25 Most Dangerous Software Errors. http://​cwe.​mitre.​org/​top25/​.​ Accessed March 1, 2018.
29.
Zurück zum Zitat Kabakus, A.T. and Kara, R., A performance evaluation of in-memory databasess, J. King Saud Univ. – Comput. Inf. Sci., 2017, vol. 29, no. 4, pp. 520–525. Kabakus, A.T. and Kara, R., A performance evaluation of in-memory databasess, J. King Saud Univ. – Comput. Inf. Sci., 2017, vol. 29, no. 4, pp. 520–525.
30.
Zurück zum Zitat Shahriar, H. and Haddad, H.M., Security vulnerabilities of NoSQL and SQL databases for MOOC applicationss, Int. J. Digital Society, 2017, vol. 8, no. 1. Shahriar, H. and Haddad, H.M., Security vulnerabilities of NoSQL and SQL databases for MOOC applicationss, Int. J. Digital Society, 2017, vol. 8, no. 1.
31.
Zurück zum Zitat Elhoseny, M., Abdelaziz, A., Salama, A.S., Riad, A.M., Muhammad, K., and Sangaiah, A.K., A hybrid model of Internet of Things and cloud computing to manage big data in health services applicationss, Future Generat. Comput. Syst., 2018, vol. 86, pp. 1383–1394.CrossRef Elhoseny, M., Abdelaziz, A., Salama, A.S., Riad, A.M., Muhammad, K., and Sangaiah, A.K., A hybrid model of Internet of Things and cloud computing to manage big data in health services applicationss, Future Generat. Comput. Syst., 2018, vol. 86, pp. 1383–1394.CrossRef
32.
Zurück zum Zitat Abdelaziz, A., Elhoseny, M., Salama, A.S., and Riad, A.M., A machine learning model for improving healthcare services on cloud computing environments, Measurement, 2018, vol. 119, pp. 117–128.CrossRef Abdelaziz, A., Elhoseny, M., Salama, A.S., and Riad, A.M., A machine learning model for improving healthcare services on cloud computing environments, Measurement, 2018, vol. 119, pp. 117–128.CrossRef
33.
Zurück zum Zitat The DB-Engines Ranking. https://db-engines.com/en /ranking_trend. Accessed March 1, 2018. The DB-Engines Ranking. https://​db-engines.​com/​en /ranking_trend. Accessed March 1, 2018.
34.
Zurück zum Zitat Wilde, E. and Pautasso, C., REST: from Research to Practicec, New York: Springer-Verlag, 2017, pp. 35–55. Wilde, E. and Pautasso, C., REST: from Research to Practicec, New York: Springer-Verlag, 2017, pp. 35–55.
35.
Zurück zum Zitat Elhoseny, M., Yuan, X., ElMinir, H.K., and Riad, A.M., An energy efficient encryption method for secure dynamic WSNs, Security Commun. Networks, Wiley, 2016, vol. 9, no. 13, pp. 2024–2031. Elhoseny, M., Yuan, X., ElMinir, H.K., and Riad, A.M., An energy efficient encryption method for secure dynamic WSNs, Security Commun. Networks, Wiley, 2016, vol. 9, no. 13, pp. 2024–2031.
36.
Zurück zum Zitat Elhoseny, M., Elminir, H., Riad, A., and Yuan, X., A secure data routing schema for WSN using elliptic curve cryptography and homomorphic encryptions, J. King Saud Univ. – Comput. Inf. Sci., Elsevier, 2016, vol. 28, no. 3, pp. 262–275. Elhoseny, M., Elminir, H., Riad, A., and Yuan, X., A secure data routing schema for WSN using elliptic curve cryptography and homomorphic encryptions, J. King Saud Univ. – Comput. Inf. Sci., Elsevier, 2016, vol. 28, no. 3, pp. 262–275.
37.
Zurück zum Zitat Riad, A.M., El-Minir, H.K., and Elhoseny, M., Secure routing in wireless sensor networks: a state of the arts, Int. J. Comput. Appl., 2013, vol. 67, no. 7. Riad, A.M., El-Minir, H.K., and Elhoseny, M., Secure routing in wireless sensor networks: a state of the arts, Int. J. Comput. Appl., 2013, vol. 67, no. 7.
38.
Zurück zum Zitat Elhoseny, M., Hosny, A., Hassanien, A.E., Muhammad, K., and Kumar Sangaiah, A., Secure automated forensic investigation for sustainable critical infrastructures compliant with green computing requirements, IEEE Trans. Sust. Comput., 2017, no. 99. Elhoseny, M., Hosny, A., Hassanien, A.E., Muhammad, K., and Kumar Sangaiah, A., Secure automated forensic investigation for sustainable critical infrastructures compliant with green computing requirements, IEEE Trans. Sust. Comput., 2017, no. 99.
39.
Zurück zum Zitat Khari, M., Vaishali. S., and Kumar, M., Comprehensive study of web application attacks and classification, Proc. 3rd Int. Conf. on Computing for Sustainable Global Development (INDIACom), New Delhi, 2016, pp. 2159–2164. Khari, M., Vaishali. S., and Kumar, M., Comprehensive study of web application attacks and classification, Proc. 3rd Int. Conf. on Computing for Sustainable Global Development (INDIACom), New Delhi, 2016, pp. 2159–2164.
40.
Zurück zum Zitat Selvakumar, G. and Kaviya, B. J., A survey on RESTful web services composition, Proc. Int. Conf. on Computer Communication and Informatics (ICCCI), Coimbatore, 2016, pp. 1–4. Selvakumar, G. and Kaviya, B. J., A survey on RESTful web services composition, Proc. Int. Conf. on Computer Communication and Informatics (ICCCI), Coimbatore, 2016, pp. 1–4.
Metadaten
Titel
NoSQL Injection Attack Detection in Web Applications Using RESTful Service
verfasst von
Ahmed M. Eassa
Mohamed Elhoseny
Hazem M. El-Bakry
Ahmed S. Salama
Publikationsdatum
01.11.2018
Verlag
Pleiades Publishing
Erschienen in
Programming and Computer Software / Ausgabe 6/2018
Print ISSN: 0361-7688
Elektronische ISSN: 1608-3261
DOI
https://doi.org/10.1134/S036176881901002X

Weitere Artikel der Ausgabe 6/2018

Programming and Computer Software 6/2018 Zur Ausgabe