Mostrar el registro sencillo del ítem

dc.contributor.authorIbarra-Fiallos, Santiago
dc.contributor.authorBermejo-Higuera, Javier
dc.contributor.authorIntriago-Pazmiño, Monserrate
dc.contributor.authorBermejo Higuera, Juan Ramón
dc.contributor.authorSicilia, Juan Antonio
dc.contributor.authorCubo Villalba, Javier
dc.date2021
dc.date.accessioned2021-04-29T07:16:39Z
dc.date.available2021-04-29T07:16:39Z
dc.identifier.issn2169-3536
dc.identifier.urihttps://reunir.unir.net/handle/123456789/11266
dc.description.abstractInjection attacks against web applications are still frequent, and organizations like OWASP places them within the Top Ten of security risks to web applications. The main goal of this work is to contribute to the community with the design of an effective protection of web applications against common injection attacks. Our proposal is a validation filter of input fields that is based on OWASP Stinger, a set of regular expressions, and a sanitization process. It validates both fundamental characters (letters, numbers, dot, dash, question marks, and exclamation point) and complex statements (JSON and XML files) for each field. The procedure of deploying the proposed filter is detailed, specifying the sections and contents of the configuration file. In addition, the infrastructure for running the tests is described, including the setting of an attack tool, and the implementation of a controller. The attack tool is used as a security scanner for common injection attacks, and the controller is developed for routing the requests in two steps; first a request is addressed to the filter, and if it is valid, it will redirect to the web application itself. The proposal filter has been tested on three public as well as on a real private web application. An accuracy of 98,4% and an average processing time of 50 ms are achieved, based on wich it is possible to conclude the proposed filter is highly reliable and does not require additional computational resources.es_ES
dc.language.isoenges_ES
dc.publisherIEEE Accesses_ES
dc.relation.ispartofseries;vol. 9
dc.relation.urihttps://ieeexplore.ieee.org/document/9319139es_ES
dc.rightsopenAccesses_ES
dc.subjectinformation filterses_ES
dc.subjectproposalses_ES
dc.subjectserverses_ES
dc.subjectsecurityes_ES
dc.subjectSQL injectiones_ES
dc.subjectsoftwarees_ES
dc.subjecttoolses_ES
dc.subjectinformation securityes_ES
dc.subjectinput validationes_ES
dc.subjectsoftware securityes_ES
dc.subjectregular expressiones_ES
dc.subjectsanitizationes_ES
dc.subjectJCRes_ES
dc.subjectScopuses_ES
dc.titleEffective filter for common injection attacks in online web applicationses_ES
dc.typeArticulo Revista Indexadaes_ES
reunir.tag~ARIes_ES
dc.identifier.doihttps://doi.org/10.1109/ACCESS.2021.3050566


Ficheros en el ítem

FicherosTamañoFormatoVer

No hay ficheros asociados a este ítem.

Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem