scispace - formally typeset
Search or ask a question
Author

Young Su Jang

Bio: Young Su Jang is an academic researcher from Korea University. The author has contributed to research in topics: Web application & SQL injection. The author has an hindex of 1, co-authored 1 publications receiving 29 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: A novel scheme that automatically transforms web applications, rendering them safe against SQL injection attacks, which dynamically analyzes the developer-intended query result size for any input, and detects attacks by comparing this against the result of the actual query.

34 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: The current state of the art for securing web applications from major flaws such as injection and logic flaws, which are rated as the top most threats by different security consortiums are summarized.
Abstract: Context: Web applications are trusted by billions of users for performing day-to-day activities. Accessibility, availability and omnipresence of web applications have made them a prime target for attackers. A simple implementation flaw in the application could allow an attacker to steal sensitive information and perform adversary actions, and hence it is important to secure web applications from attacks. Defensive mechanisms for securing web applications from the flaws have received attention from both academia and industry.Objective: The objective of this literature review is to summarize the current state of the art for securing web applications from major flaws such as injection and logic flaws. Though different kinds of injection flaws exist, the scope is restricted to SQL Injection (SQLI) and Cross-site scripting (XSS), since they are rated as the top most threats by different security consortiums.Method: The relevant articles recently published are identified from well-known digital libraries, and a total of 86 primary studies are considered. A total of 17 articles related to SQLI, 35 related to XSS and 34 related to logic flaws are discussed.Results: The articles are categorized based on the phase of software development life cycle where the defense mechanism is put into place. Most of the articles focus on detecting the flaws and preventing the attacks against web applications.Conclusion: Even though various approaches are available for securing web applications from SQLI and XSS, they are still prevalent due to their impact and severity. Logic flaws are gaining attention of the researchers since they violate the business specifications of applications. There is no single solution to mitigate all the flaws. More research is needed in the area of fixing flaws in the source code of applications.

75 citations

Proceedings ArticleDOI
01 Oct 2015
TL;DR: Wang et al. as discussed by the authors introduced typical SQL injection attack and prevention technologies, which not only validate user input, but also use type-safe SQL parameters, which is effective against SQL injection vulnerabilities.
Abstract: SQL injection attack is one of the most serious security vulnerabilities in Web application system, most of these vulnerabilities are caused by lack of input validation and SQL parameters use. Typical SQL injection attack and prevention technologies are introduced in the paper. The detecting methods not only validate user input, but also use type-safe SQL parameters. SQL injection defense model is established according to the detection processes, which is effective against SQL injection vulnerabilities.

33 citations

Proceedings ArticleDOI
01 Sep 2017
TL;DR: This paper presents an application context pattern-driven corpus to train a supervised learning model trained with ML algorithms of Two-Class Support Vector Machine and Two- class Logistic Regression implemented on Microsoft Azure Machine Learning (MAML) studio to mitigate SQLIA.
Abstract: Emerging computing relies heavily on secure backend storage for the massive size of big data originating from the Internet of Things (IoT) smart devices to the Cloud-hosted web applications. Structured Query Language (SQL) Injection Attack (SQLIA) remains an intruder's exploit of choice to pilfer confidential data from the back-end database with damaging ramifications. The existing approaches were all before the new emerging computing in the context of the Internet big data mining and as such will lack the ability to cope with new signatures concealed in a large volume of web requests over time. Also, these existing approaches were strings lookup approaches aimed at on-premise application domain boundary, not applicable to roaming Cloud-hosted services' edge Software-Defined Network (SDN) to application endpoints with large web request hits. Using a Machine Learning (ML) approach provides scalable big data mining for SQLIA detection and prevention. Unfortunately, the absence of corpus to train a classifier is an issue well known in SQLIA research in applying Artificial Intelligence (AI) techniques. This paper presents an application context pattern-driven corpus to train a supervised learning model. The model is trained with ML algorithms of Two-Class Support Vector Machine (TC SVM) and Two-Class Logistic Regression (TC LR) implemented on Microsoft Azure Machine Learning (MAML) studio to mitigate SQLIA. This scheme presented here, then forms the subject of the empirical evaluation in Receiver Operating Characteristic (ROC) curve.

27 citations

Journal ArticleDOI
TL;DR: The proposed Knuth-Morris-Pratt string matching algorithm was used to match user’s input string with the stored pattern of the injection string in order to detect any malicious code and proved to be more effective in detecting and preventing SQL injection and XSS attacks.
Abstract: Structured Query Language (SQL) injection and cross-site scripting remain a major threat to data-driven web applications Instances where hackers obtain unrestricted access to back-end database of web applications so as to steal, edit, and destroy confidential data are increasing Therefore, measures must be put in place to curtail the growing threats of SQL injection and XSS attacks This study presents a technique for detecting and preventing these threats using Knuth-Morris-Pratt (KMP) string matching algorithm The algorithm was used to match user’s input string with the stored pattern of the injection string in order to detect any malicious code The implementation was carried out using PHP scripting language and Apache XAMPP Server The security level of the technique was measured using different test cases of SQL injection, cross-site scripting (XSS), and encoded injection attacks Results obtained revealed that the proposed technique was able to successfully detect and prevent the attacks, log the attack entry in the database, block the system using its mac address, and also generate a warning message Therefore, the proposed technique proved to be more effective in detecting and preventing SQL injection and XSS attacks

26 citations

Proceedings ArticleDOI
01 Jun 2015
TL;DR: A systematic mapping study is conducted to view and report the state-of-the-art of empirical work in existing research of web applications security vulnerabilities detection approaches and proposed solutions are mapped against.
Abstract: Number of security vulnerabilities in web application has grown with the tremendous growth of web application in last two decades. As the domain of Web Applications is maturing, large number of empirical studies has been reported in web applications to address the solution of vulnerable web application. However, before advancing towards finding new approaches of web applications security vulnerability detection, there is a need to analyze and synthesize existing evidence based studies in web applications area. To do this, we have planned to conduct a systematic mapping study to view and report the state-of-the-art of empirical work in existing research of web applications. In this paper, we aimed at providing a description of mapping study for synthesizing the reported empirical research in the area of web applications security vulnerabilities detection approaches. The proposed solutions are mapped against: (1) the software development stages for which the solution has been proposed and (2) the web application vulnerabilities mapping according to OWASP Top 10 security vulnerabilities. To do this, existing literature has been surveyed using a systematic mapping study by phrasing two research questions. In the mapping study, a total of 41 studies dating from 1994 to 2014 were evaluated and mapped against the aforementioned categories. The outcome of this mapping study is current state-of-the-art of empirical research in web application area, strength and weaknesses of existing empirical work, best practices and possible directions for future research.

26 citations