Model of rules for malicious input parameters detection

Authors

  • Oleksandr Korzhenevskyi National Technical University of Ukraine «Igor Sikorsky Kiev Polytechnic Institute», Ukraine
  • Mykola Graivoronskyi National Technical University of Ukraine «Igor Sikorsky Kiev Polytechnic Institute», Ukraine

DOI:

https://doi.org/10.20535/tacs.2664-29132022.1.274127

Abstract

This article is devoted to detection of advanced techniques of malicious input parameter injections and web application firewall (WAF) bypass. The authors have proposed a hierarchical model for detection rules definition, which allows to edit different fragments separately. This model has been implemented with the usage of Backus-Naur form and ANTLR4 (generator of parsers and lexers). The solution has been tested using some popular web application scanners. The testing environment has been created with Python3. The results of research have been compared with the corresponding ones for the existing open source solution – libinjection. The main accent has been made to SQL injcetions and Cross-Site Scripting attacks.

Downloads

Published

2023-02-17

Issue

Section

Intelligent Data analysis methods in cybersecurity