Mostrar el registro sencillo del ítem
Effective filter for common injection attacks in online web applications
dc.contributor.author | Ibarra-Fiallos, Santiago | |
dc.contributor.author | Bermejo-Higuera, Javier | |
dc.contributor.author | Intriago-Pazmiño, Monserrate | |
dc.contributor.author | Bermejo Higuera, Juan Ramón | |
dc.contributor.author | Sicilia, Juan Antonio | |
dc.contributor.author | Cubo Villalba, Javier | |
dc.date | 2021 | |
dc.date.accessioned | 2021-04-29T07:16:39Z | |
dc.date.available | 2021-04-29T07:16:39Z | |
dc.identifier.issn | 2169-3536 | |
dc.identifier.uri | https://reunir.unir.net/handle/123456789/11266 | |
dc.description.abstract | Injection attacks against web applications are still frequent, and organizations like OWASP places them within the Top Ten of security risks to web applications. The main goal of this work is to contribute to the community with the design of an effective protection of web applications against common injection attacks. Our proposal is a validation filter of input fields that is based on OWASP Stinger, a set of regular expressions, and a sanitization process. It validates both fundamental characters (letters, numbers, dot, dash, question marks, and exclamation point) and complex statements (JSON and XML files) for each field. The procedure of deploying the proposed filter is detailed, specifying the sections and contents of the configuration file. In addition, the infrastructure for running the tests is described, including the setting of an attack tool, and the implementation of a controller. The attack tool is used as a security scanner for common injection attacks, and the controller is developed for routing the requests in two steps; first a request is addressed to the filter, and if it is valid, it will redirect to the web application itself. The proposal filter has been tested on three public as well as on a real private web application. An accuracy of 98,4% and an average processing time of 50 ms are achieved, based on wich it is possible to conclude the proposed filter is highly reliable and does not require additional computational resources. | es_ES |
dc.language.iso | eng | es_ES |
dc.publisher | IEEE Access | es_ES |
dc.relation.ispartofseries | ;vol. 9 | |
dc.relation.uri | https://ieeexplore.ieee.org/document/9319139 | es_ES |
dc.rights | openAccess | es_ES |
dc.subject | information filters | es_ES |
dc.subject | proposals | es_ES |
dc.subject | servers | es_ES |
dc.subject | security | es_ES |
dc.subject | SQL injection | es_ES |
dc.subject | software | es_ES |
dc.subject | tools | es_ES |
dc.subject | information security | es_ES |
dc.subject | input validation | es_ES |
dc.subject | software security | es_ES |
dc.subject | regular expression | es_ES |
dc.subject | sanitization | es_ES |
dc.subject | JCR | es_ES |
dc.subject | Scopus | es_ES |
dc.title | Effective filter for common injection attacks in online web applications | es_ES |
dc.type | Articulo Revista Indexada | es_ES |
reunir.tag | ~ARI | es_ES |
dc.identifier.doi | https://doi.org/10.1109/ACCESS.2021.3050566 |
Ficheros en el ítem
Ficheros | Tamaño | Formato | Ver |
---|---|---|---|
No hay ficheros asociados a este ítem. |