NoSQL Injection Attack Detection in Web Applications Using RESTful Service


Citar

Texto integral

Acesso aberto Acesso aberto
Acesso é fechado Acesso está concedido
Acesso é fechado Somente assinantes

Resumo

Despite the extensive research of using web services for security purposes, there is a big challenge towards finding a no radical solution for NoSQL injection attack. This paper presents an independent RESTful web service in a layered approach to detect NoSQL injection attacks in web applications. The proposed method is named DNIARS. DNIARS depends on comparing the generated patterns from NoSQL statement structure in static code state and dynamic state. Accordingly, the DNIARS can respond to the web application with the possibility of NoSQL injection attack. The proposed DNIARS was implemented in PHP plain code and can be considered as an independent framework that has the ability for responding to different requests formats like JSON, XML. To evaluate its performance, DNIARS was tested using the most common testing tools for RESTful web service. According to the results, DNIARS can work in real environments where the error rate did not exceed 1%.

Sobre autores

Ahmed Eassa

Faculty of Computers and Information, Mansoura University; Management Information Systems Department, Faculty of Management, MTI University

Autor responsável pela correspondência
Email: ahmed.mti@outlook.com
Egito, Mansoura; Cairo

Mohamed Elhoseny

Faculty of Computers and Information, Mansoura University

Email: ahmed.mti@outlook.com
Egito, Mansoura

Hazem El-Bakry

Faculty of Computers and Information, Mansoura University

Email: ahmed.mti@outlook.com
Egito, Mansoura

Ahmed Salama

Computer and Information Systems Department, Sadat Academy for Management Sciences; Information Systems Department, Faculty of Computing and Information Technology, University of Jeddah

Email: ahmed.mti@outlook.com
Egito, Cairo; Jeddah

Arquivos suplementares

Arquivos suplementares
Ação
1. JATS XML

Declaração de direitos autorais © Pleiades Publishing, Ltd., 2019