Web applications do represent one of the main targets of cyber attacks. Detection systems such as Web Application Firewalls (WAFs) can help detect web application attacks and allow IT teams to respond rapidly. However, this approach is usually far from optimal, implying that a vulnerability has been exploited and that the attacker has already compromised the vulnerable application. It is, therefore, crucial to detect web application vulnerabilities before an attacker is able to exploit them. One of the most valuable techniques to detect input handling vulnerabilities relies on the use of Web Application Vulnerability Scanners (WAVS), i.e., tools that send malicious payloads against the web application to detect vulnerabilities. Indeed, these tools should be assessed to evaluate their effectiveness. This is usually achieved by testing them against benchmarking platforms, i.e., web applications with both vulnerable and non-vulnerable test cases. One of the most widely deployed benchmarking platforms is WAVSEP, a web application with a lot of relevant vulnerable test cases. Unfortunately, the application has not been updated since 2014 and thus has a few intrinsic limitations. In particular, it does not offer relevant vulnerability classes, nor does it include non-vulnerable test cases, which prove fundamental in evaluating whether or not a web scanner generates a high number of false positives. The scope of this work is to propose a reinforced WAVSEP platform that addresses the problems mentioned above. We integrated 72 new cases in the existing vulnerability classes and created two new vulnerability classes while adding 40 non-vulnerable test cases. Finally, we tested web scanners against both the original WAVSEP and the reinforced one. As the reinforced platform covers a wider set o vulnerability test cases, web scanners were able to detect fewer vulnerabilities by confirming the effectiveness of our platform.

Reinforced WAVSEP: a Benchmarking Platform for Web Application Vulnerability Scanners / Urbano, L.; Perrone, G.; Romano, S. P.. - (2022), pp. 1-6. (Intervento presentato al convegno 2022 IEEE International Conference on Electrical, Computer, and Energy Technologies, ICECET 2022 tenutosi a cze nel 2022) [10.1109/ICECET55527.2022.9872956].

Reinforced WAVSEP: a Benchmarking Platform for Web Application Vulnerability Scanners

Perrone G.;Romano S. P.
2022

Abstract

Web applications do represent one of the main targets of cyber attacks. Detection systems such as Web Application Firewalls (WAFs) can help detect web application attacks and allow IT teams to respond rapidly. However, this approach is usually far from optimal, implying that a vulnerability has been exploited and that the attacker has already compromised the vulnerable application. It is, therefore, crucial to detect web application vulnerabilities before an attacker is able to exploit them. One of the most valuable techniques to detect input handling vulnerabilities relies on the use of Web Application Vulnerability Scanners (WAVS), i.e., tools that send malicious payloads against the web application to detect vulnerabilities. Indeed, these tools should be assessed to evaluate their effectiveness. This is usually achieved by testing them against benchmarking platforms, i.e., web applications with both vulnerable and non-vulnerable test cases. One of the most widely deployed benchmarking platforms is WAVSEP, a web application with a lot of relevant vulnerable test cases. Unfortunately, the application has not been updated since 2014 and thus has a few intrinsic limitations. In particular, it does not offer relevant vulnerability classes, nor does it include non-vulnerable test cases, which prove fundamental in evaluating whether or not a web scanner generates a high number of false positives. The scope of this work is to propose a reinforced WAVSEP platform that addresses the problems mentioned above. We integrated 72 new cases in the existing vulnerability classes and created two new vulnerability classes while adding 40 non-vulnerable test cases. Finally, we tested web scanners against both the original WAVSEP and the reinforced one. As the reinforced platform covers a wider set o vulnerability test cases, web scanners were able to detect fewer vulnerabilities by confirming the effectiveness of our platform.
2022
978-1-6654-7087-2
Reinforced WAVSEP: a Benchmarking Platform for Web Application Vulnerability Scanners / Urbano, L.; Perrone, G.; Romano, S. P.. - (2022), pp. 1-6. (Intervento presentato al convegno 2022 IEEE International Conference on Electrical, Computer, and Energy Technologies, ICECET 2022 tenutosi a cze nel 2022) [10.1109/ICECET55527.2022.9872956].
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11588/914544
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 2
  • ???jsp.display-item.citation.isi??? ND
social impact