Abstract
According to Internet Live Stats, it is evident that organizations and developers are underestimating security issues on their system. In this paper, we propose a protective and extensible solution for automatically detecting both the Web application vulnerabilities and malicious Web shells. Based on the original THAPS, we proposed E-THAPS that has a new detecting mechanism, improved SQLi, XSS and vulnerable functions detecting capabilities. For malicious Web shell detection, taint analysis and pattern matching methods are selected as the main approach. The broad experiment that we performed showed our outstanding results in comparison with other solutions for detecting the Web application vulnerabilities and malicious Web shells.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Kals, S., Kirda, E., Kruegel, C., Jovanovich, N.: SecuBat: a web vulnerability scanner. In: 15th International Conference on World Wide Web, pp. 247–256 (2006)
Jensen, T., Pedersen, H., Olesen, M.C., Hansen, R.R.: THAPS: automated vulnerability scanning of PHP applications. In: Jøsang, A., Carlsson, B. (eds.) NordSec 2012. LNCS, vol. 7617, pp. 31–46. Springer, Heidelberg (2012)
Dahse, J.: RIPS - a static source code analyser for vulnerabilities in PHP scripts. In: Seminar Work at Chair for Network and Data Security (2010)
Sasi, R.: Web backdoors - attack, evasion and detection. In: C0C0N Sec Conference (2011)
Nguyen, N.-H.: Iris recognition for biometric passport authentication. VNU J. Sci. Nat. Sci. Technol. 26(1), 14–20 (2010)
Le, H.H., Nguyen, N.H., Nguyen, T.T.: Exploiting GPU for large scale fingerprint identification. In: Nguyen, N.T., Trawiński, B., Fujita, H., Hong, T.-P. (eds.) Intelligent Information and Database Systems. LNCS, vol. 9621, pp. 688–697. Springer, Heidelberg (2016)
http://www.internetlivestats.com/. Accessed 26 April 2016
Web technology surveys. http://w3techs.com/technologies/overview/programming_language/all/. Accessed 15 April 2016
Dahse, J., Holz, T.: Static detection of second-order vulnerabilities in web applications. In: 23rd USENIX Security Symposium (USENIX Security 14), pp. 989–1003 (2014)
Starov, O., Dahse, J., Ahmad, S., Holz, T., Nikiforakis, N.: Thieves, no honor among: a large-scale analysis of malicious web shells. In: 25th International Conference on World Wide Web, pp. 1021–1032 (2016)
Global websecurity whitehat contest. https://ctftime.org/ctf/112
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Le, VG., Nguyen, HT., Lu, DN., Nguyen, NH. (2016). A Solution for Automatically Malicious Web Shell and Web Application Vulnerability Detection. In: Nguyen, NT., Iliadis, L., Manolopoulos, Y., Trawiński, B. (eds) Computational Collective Intelligence. ICCCI 2016. Lecture Notes in Computer Science(), vol 9875. Springer, Cham. https://doi.org/10.1007/978-3-319-45243-2_34
Download citation
DOI: https://doi.org/10.1007/978-3-319-45243-2_34
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-45242-5
Online ISBN: 978-3-319-45243-2
eBook Packages: Computer ScienceComputer Science (R0)