MITIGATION OF WEB-BASED PROGRAM SECURITY VULNERABILITY EXPLOITATIONS

Over the last few years, web-based attacks have caused significant harm to users. Many of these attacks occur through the exploitations of common security vulnerabilities in web-based programs. Given that, mitigation of these attacks is extremely crucial to reduce some of the harmful consequences. W...

Full description

Bibliographic Details
Main Author: Shahriar, HOSSAIN
Other Authors: Queen's University (Kingston, Ont.). Theses (Queen's University (Kingston, Ont.))
Language:en
en
Published: 2011
Subjects:
Online Access:http://hdl.handle.net/1974/6892
id ndltd-LACETR-oai-collectionscanada.gc.ca-OKQ.1974-6892
record_format oai_dc
spelling ndltd-LACETR-oai-collectionscanada.gc.ca-OKQ.1974-68922013-12-20T03:40:29ZMITIGATION OF WEB-BASED PROGRAM SECURITY VULNERABILITY EXPLOITATIONSShahriar, HOSSAINSecurity vulnerabilityCross-site request forgeryPhishingContent sniffingParser-based analysisBrowser-based checkingCross-site scriptingTrustworthiness testingWeb-based programOver the last few years, web-based attacks have caused significant harm to users. Many of these attacks occur through the exploitations of common security vulnerabilities in web-based programs. Given that, mitigation of these attacks is extremely crucial to reduce some of the harmful consequences. Web-based applications contain vulnerabilities that can be exploited by attackers at a client-side (browser) without the victim’s (browser user’s) knowledge. This thesis is intended to mitigate some exploitations due to the presence of security vulnerabilities in web applications while performing seemingly benign functionalities at the client-side. For example, visiting a webpage might result in JavaScript code execution (cross-site scripting), downloading a file might lead to the execution of JavaScript code (content sniffing), clicking on a hyperlink might result in sending unwanted legitimate requests to a trusted website (cross-site request forgery), and filling out a seemingly legitimate form may eventually lead to stealing of credential information (phishing). Existing web-based attack detection approaches suffer from several limitations such as (i) modification of both server and client-side environments, (ii) exchange of sensitive information between the server and client, and (iii) lack of detection of some attack types. This thesis addresses these limitations by mitigating four security vulnerabilities in web applications: cross-site scripting, content sniffing, cross-site request forgery, and phishing. We mitigate the exploitations of these vulnerabilities by developing automatic attack detection approaches at both server and client-sides. We develop server-side attack detection frameworks to detect attack symptoms within response pages before sending them to the client. The approaches are designed based on the assumption that the server-side program source is available for analysis, but we are not allowed to alter the program code and the runtime environments. Moreover, we develop client-side attack detection frameworks so that some level of protection is present when the source code of server websites (either trusted or untrusted) is not available. Our proposed solutions explore several techniques such as response page parsing and file content analysis, browser-level checking of requests and responses, and finite state machine-based behavior monitoring. The thesis evaluates the proposed attack detection approaches with real-world vulnerable programs. The evaluation results indicate that our approaches are effective and perform better than the related work. We also contribute to the development of benchmark suites for evaluating attack detection techniques.Thesis (Ph.D, Computing) -- Queen's University, 2011-11-29 09:44:24.465Queen's University (Kingston, Ont.). Theses (Queen's University (Kingston, Ont.))2011-11-29 09:44:24.4652011-11-30T18:39:56Z2011-11-30T18:39:56Z2011-11-30Thesishttp://hdl.handle.net/1974/6892enenCanadian thesesThis publication is made available by the authority of the copyright owner solely for the purpose of private study and research and may not be copied or reproduced except as permitted by the copyright laws without written authority from the copyright owner.
collection NDLTD
language en
en
sources NDLTD
topic Security vulnerability
Cross-site request forgery
Phishing
Content sniffing
Parser-based analysis
Browser-based checking
Cross-site scripting
Trustworthiness testing
Web-based program
spellingShingle Security vulnerability
Cross-site request forgery
Phishing
Content sniffing
Parser-based analysis
Browser-based checking
Cross-site scripting
Trustworthiness testing
Web-based program
Shahriar, HOSSAIN
MITIGATION OF WEB-BASED PROGRAM SECURITY VULNERABILITY EXPLOITATIONS
description Over the last few years, web-based attacks have caused significant harm to users. Many of these attacks occur through the exploitations of common security vulnerabilities in web-based programs. Given that, mitigation of these attacks is extremely crucial to reduce some of the harmful consequences. Web-based applications contain vulnerabilities that can be exploited by attackers at a client-side (browser) without the victim’s (browser user’s) knowledge. This thesis is intended to mitigate some exploitations due to the presence of security vulnerabilities in web applications while performing seemingly benign functionalities at the client-side. For example, visiting a webpage might result in JavaScript code execution (cross-site scripting), downloading a file might lead to the execution of JavaScript code (content sniffing), clicking on a hyperlink might result in sending unwanted legitimate requests to a trusted website (cross-site request forgery), and filling out a seemingly legitimate form may eventually lead to stealing of credential information (phishing). Existing web-based attack detection approaches suffer from several limitations such as (i) modification of both server and client-side environments, (ii) exchange of sensitive information between the server and client, and (iii) lack of detection of some attack types. This thesis addresses these limitations by mitigating four security vulnerabilities in web applications: cross-site scripting, content sniffing, cross-site request forgery, and phishing. We mitigate the exploitations of these vulnerabilities by developing automatic attack detection approaches at both server and client-sides. We develop server-side attack detection frameworks to detect attack symptoms within response pages before sending them to the client. The approaches are designed based on the assumption that the server-side program source is available for analysis, but we are not allowed to alter the program code and the runtime environments. Moreover, we develop client-side attack detection frameworks so that some level of protection is present when the source code of server websites (either trusted or untrusted) is not available. Our proposed solutions explore several techniques such as response page parsing and file content analysis, browser-level checking of requests and responses, and finite state machine-based behavior monitoring. The thesis evaluates the proposed attack detection approaches with real-world vulnerable programs. The evaluation results indicate that our approaches are effective and perform better than the related work. We also contribute to the development of benchmark suites for evaluating attack detection techniques. === Thesis (Ph.D, Computing) -- Queen's University, 2011-11-29 09:44:24.465
author2 Queen's University (Kingston, Ont.). Theses (Queen's University (Kingston, Ont.))
author_facet Queen's University (Kingston, Ont.). Theses (Queen's University (Kingston, Ont.))
Shahriar, HOSSAIN
author Shahriar, HOSSAIN
author_sort Shahriar, HOSSAIN
title MITIGATION OF WEB-BASED PROGRAM SECURITY VULNERABILITY EXPLOITATIONS
title_short MITIGATION OF WEB-BASED PROGRAM SECURITY VULNERABILITY EXPLOITATIONS
title_full MITIGATION OF WEB-BASED PROGRAM SECURITY VULNERABILITY EXPLOITATIONS
title_fullStr MITIGATION OF WEB-BASED PROGRAM SECURITY VULNERABILITY EXPLOITATIONS
title_full_unstemmed MITIGATION OF WEB-BASED PROGRAM SECURITY VULNERABILITY EXPLOITATIONS
title_sort mitigation of web-based program security vulnerability exploitations
publishDate 2011
url http://hdl.handle.net/1974/6892
work_keys_str_mv AT shahriarhossain mitigationofwebbasedprogramsecurityvulnerabilityexploitations
_version_ 1716621366679044096