Table 2: XSS vulnerabilities detected.
Vulnerable files Variants # vulnerabilities
Acunetix 4 73 73
AppScan 6 76 7
During the case study, we discovered that the use of
AVDL is highly effective in making the concept of
vulnerability concrete and tangible. With the aid of
AVDL, web application vulnerability is no longer an
abstract, overlapping and error-prone idea but a
tangible object of modeling and analytical
specification process.
5 CONCLUSIONS
Web applications having become popular, wide
spread and rapidly proliferated raises many security
issues and exacerbates the demand for practical
solutions. Manual security solutions targeted at these
vulnerabilities are language-dependent, type-
specific, labor-intensive, expensive and error-prone.
In this paper, we have evaluated the use of a
language-neutral data model as part of a new
framework for web application vulnerability
analysis. Our framework is extendible being based
on existing web application scanners and AVDL as a
uniform vulnerability description format.
At the current stage, we conduct case studies
with different web application scanners and
evaluating their outputs using AVDL. We continue
with the unified data model as a data interface for
the rule-based inference engine which incorporates
vulnerability analysis and prediction capability. In
due course, we hope to provide a commercializable
tool to web site administrators and web developers
to actively secure their applications.
ACKNOWLEDGEMENTS
This work is funded by Centre for Strategic
Infocomm Technologies, Ministry of Defence
Singapore.
REFERENCES
Acunetix. (2007). "Acunetix Cross Site Scripting
Scanner." from http://www.acunetix.com/cross-site-
scripting/scanner.htm.
Bazaz, A. and J. D. Arthur (2007). Towards A Taxonomy
of Vulnerabilities. Proceedings of the 40th Annual
Hawaii International Conference on System Sciences,
2007. HICSS 2007. Waikoloa, HI: 163a - 163a.
Berghe, C. V., J. Riordan, et al. (2005). A Vulnerability
Taxonomy Methodology applied to Web Services.
Bishop, M. (1999). Vulnerabilities Analysis. Web
proceedings of the 2nd International Workshop on
Recent Advances in Intrusion Detection (RAID'99),
West Lafayette, Indiana, USA.
Cova, M., V. Felmetsger, et al. (2007). Vulnerability
Analysis of Web-based Applications. Test and
Analysis of Web Services, Springer Berlin Heidelberg:
363-394.
CVE. (2007). "CVE - Common Vulnerabilities and
Exposures (CVE)." from http://cve.mitre.org/.
Dowd, M., J. McDonald, et al. (2006). Chapter
1,2,3,4,8,13,17,18. The Art of Software Security
Assessment: Identifying and Preventing Software
Vulnerabilities, Addison Wesley Professional.
Fong, E. and V. Okun (2007). Web Application Scanners:
Definitions and Functions. Proceedings of the 40th
Annual Hawaii International Conference on System
Sciences, 2007. HICSS'07, Waikoloa, HI, IEEE.
Ghosh, A. K., T. O'Connor, et al. (1998). An Automated
Approach for Identifying Potential Vulnerabilities in
Software. Proceeding of the 1998 IEEE Symposium on
Security and Privacy: 0104.
Grossman, J. (2007). WhiteHat Website Security Statistics
Report, WhiteHat Security.
Halfond, W. G. J., A. Orso, et al. (2006). Using positive
tainting and syntax-aware evaluation to counter SQL
injection attacks. Proceedings of the 14th ACM
SIGSOFT international symposium on Foundations of
software engineering SIGSOFT '06/FSE-14 Portland,
Oregon, USA, ACM Press: 175-185.
Halfond, W. G. J., J. Viegas, et al. (2006). A Classification
of SQL Injection Attacks and Countermeasures.
Proceedings of the IEEE International Symposium on
Secure Software Engineering (ISSSE 2006) Arlington,
VA, USA.
Huang, Y.-W., S.-K. Huang, et al. (2003). Web
application security assessment by fault injection and
behavior monitoring. Proceedings of the 12th
international conference on World Wide Web.
Budapest, Hungary, ACM Press: 148-159.
Huang, Y.-W., F. Yu, et al. (2004). Securing web
application code by static analysis and runtime
protection. Proceedings of the 13th international
conference on World Wide Web. New York, NY,
USA, ACM Press: 40-52.
Hurst, D. (2007, 09 Feb 2007). "Asking the Right
Question: Penetration Testing vs. Vulnerability
Analysis Tools, Which Is Best?" from http://
www.infosecwriters.com/texts.php?op=display&id=537.
IBM (2007). Cyber Attacks On The Rise: IBM 2007
Midyear Report, IBM Corporation. IBM Internet
Security Systems™ X-Force® Research and
Development.
Insecure.org. (2007). "Top 10 Web Vulnerability
Scanners." Retrieved September, 2007, from http://
sectools.org/web-scanners.html.
REALIZING WEB APPLICATION VULNERABILITY ANALYSIS VIA AVDL
263