首页> 外文期刊>Computers & Security >A deliberately insecure RDF-based Semantic Web application framework for teaching SPARQL/ SPARUL injection attacks and defense mechanisms
【24h】

A deliberately insecure RDF-based Semantic Web application framework for teaching SPARQL/ SPARUL injection attacks and defense mechanisms

机译:一种基于RDF的故意不安全的语义Web应用程序框架,用于教授SPARQL / SPARUL注入攻击和防御机制

获取原文
获取原文并翻译 | 示例

摘要

The Semantic Web uses the Resource Description Framework (RDF) and the Simple Protocol and Query/Update Languages (SPARQL/SPARUL) as standardized logical data representation and manipulation models allowing machines to directly interpret data on the Web. As Semantic Web applications grow increasingly popular, new and challenging security threats emerge. Semantic query languages owing to their flexible nature introduce new vulnerabilities if secure programming practices are not followed. This makes them prone to both existing attacks such as command injection as well as novel attacks, making it necessary for application developers to understand the security risks involved when developing and deploying semantic applications. In this research, we have analyzed and categorized the possible SPARQL/SPARUL injection attacks to which semantic applications are vulnerable. Moreover, we have developed a deliberately insecure RDF-based Semantic Web application, called SemWebGoat - inspired by the open source vulnerable web application, WebGoat - which offers a realistic teaching and learning environment for exploiting SPARQL/ SPARUL oriented injection vulnerabilities. With the aim of teaching both developers and web administrators the art of protecting their Semantic Web applications, we have implemented web application firewall (WAF) rules using the popular open-source firewall -ModSecurity - and extended some penetration testing tools to detect and mitigate SPARQL/ SPARUL injections. For the evaluation, we conducted a user study to determine the usability of SemWebGoat attack lessons as well as a detection rate and false alarm analysis of our proposed firewall rules based on OWASP top-ten attack dataset. The results of the user study conclude that web developers are not normally familiar with the injection vulnerabilities demonstrated. The positive test results of our ModSecurity rule set show that it a suitable defense mechanism for protecting vulnerable Semantic Web application against injection attacks.
机译:语义Web使用资源描述框架(RDF)和简单协议以及查询/更新语言(SPARQL / SPARUL)作为标准化的逻辑数据表示和操作模型,从而允许机器直接解释Web上的数据。随着语义Web应用程序越来越流行,出现了新的具有挑战性的安全威胁。如果不遵循安全的编程习惯,则由于语义查询语言的灵活性,会引入新的漏洞。这使得它们容易受到现有的攻击(例如命令注入)和新颖的攻击,从而使应用程序开发人员有必要了解开发和部署语义应用程序时涉及的安全风险。在这项研究中,我们对语义应用程序易受攻击的可能的SPARQL / SPARUL注入攻击进行了分析和分类。此外,我们开发了一种基于RDF的故意不安全的语义Web应用程序,即SemWebGoat-受开源易受攻击的Web应用程序WebGoat的启发-该应用程序为利用SPARQL / SPARUL的注入漏洞提供了现实的教学环境。为了向开发人员和Web管理员教授保护其语义Web应用程序的艺术,我们使用流行的开源防火墙-ModSecurity实现了Web应用程序防火墙(WAF)规则,并扩展了一些渗透测试工具以检测和缓解SPARQL / SPARUL注射。为了进行评估,我们进行了一项用户研究,以确定SemWebGoat攻击课程的可用性以及基于OWASP十大攻击数据集对提议的防火墙规则的检测率和错误警报分析。用户研究的结果表明,Web开发人员通常不熟悉所展示的注入漏洞。 ModSecurity规则集的积极测试结果表明,它是一种合适的防御机制,用于保护易受攻击的语义Web应用程序免受注入攻击。

著录项

  • 来源
    《Computers & Security》 |2016年第5期|63-82|共20页
  • 作者单位

    School of Electrical Engineering and Computer Science, National University of Sciences and Technology, Islamabad, Pakistan;

    School of Electrical Engineering and Computer Science, National University of Sciences and Technology, Islamabad, Pakistan ,Department of Software and Information Systems, University of North Carolina at Charlotte, Charlotte, NC, USA;

    School of Electrical Engineering and Computer Science, National University of Sciences and Technology, Islamabad, Pakistan;

  • 收录信息 美国《科学引文索引》(SCI);美国《工程索引》(EI);
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    Semantic web; SPARQL; SPARUL; Web application firewall; Vulnerable web applications;

    机译:语义网;SPARQL;SPARUL;Web应用防火墙;易受攻击的Web应用程序;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号