Modern information technologies / 4. Information Security

Shcherbatenko V.M.1,  Zakharova M.V.2, Liuta M.V. 1

Kyiv National University of Technologies and Design1

Cherkasy State Technological University2, Ukraine

Analysis of dangerous attacks to increase security of web-applications on the Internet

Online application security is becoming one of the main problems for ensuring not only the safety of websites, but also many corporate applications running over the Internet.

The aim of this work is to identify the main vulnerabilities of Web applications, the analysis of dangerous attacks, the definition of the best methods of protection to increase the level of security of web applications.

The most important criterion for the proper functioning of all web applications is security, but hacking is a frequent phenomenon. In order to avoid breaking a web application, you need to identify all vulnerabilities. One of the vulnerabilities of web servers is the "holes" in their software. It refers to the server programs themselves, such as Apache, Microsoft Internet Information Server etc. The software is quite voluminous and complex, so there are "holes" in it.

"Holes" are often found not in the entire line of web servers but only in some of their releases. The more popular one or another software is, the more vulnerable it is.

When analyzing attacks on web applications, some of the most dangerous ones were  identified:

The most popular attack is "Insufficient of transport layer protection" - receiving data during transmission. By means of this attack 70%  web-resources can be damaged. For the failure to use this attack, HTTPS protocol must be used.

Information leakage is the next type of attack. This attack can damage 56% of the resources. Information leakage occurs as a result of a failure or improper operation of the program. To exclude this possibility, you need to constantly test the program and check the messages on the server side.

Cross-site scripting attack - cross-site scripting can be executed on 47% of resources. The attack allows you to pass the JavaScript code to use in the user's browser. Attacks of this type are often referred to as HTML injections. For the defense it is necessary to clear and validate the input data

 The generation of a large number of requests, or the selection of passwords ("Bruteforce"), can be performed on 29% of the resources. For the defense it is necessary to ensure the use of high complexity passwords, server configuration for the analysis of incoming requests, and use CAPTHA after several incorrectly entered passwords.

Attack "Contentpoofing" - substitute data through the replacement of content pages is possible for 26% of resources. Using this technique, the attacker forces the user to believe that the page is generated by the web server, rather than being transmitted from an external source. For the defense from this type of attacks it is necessary to refuse the use of frames and, most importantly, never send absolute or local paths to files in the parameters.

The type of attacks on website visitors that uses the disadvantages of the HTTP protocol is «Cross-site request forgery». This attack can be executed on 24% of resources. For the defence it is necessary to verify the input data from forms, for example, by adding a unique application [2].

One of the methods of defending web applications and identifying vulnerable zones is the ongoing auditing of web applications. The main works that is carried out while auditing security of web resources are identifying vulnerabilities that allow unauthorized access to closed areas of web applications; attempts to modify the information of web services; testing of the possibility of implementation and implementation of arbitrary malicious code; SQL Injection Stability Test; Cross Site Scripting, XSS, script code analysis, detection of vulnerabilities in operating systems on which web servers operate; reporting on vulnerabilities and risks found, as well as recommendations for their elimination, testing of Dos / DDos attacks.

 

 

When conducting an audit, experts analyze the web application, operating system and database. It uses tool scanning, manual analysis which greatly increases the quality of work (Fig. 1).

Tool analysis involves scanning of a web resource with the help of a vulnerability scanner, as well as other specialized applications such as Wapiti, Netsparker Community Edition.

Manual analysis is the second kind of scanning when an application is deployed on a dedicated server, and experts do the testing of the application manually using all possible methods and attacks on the applications. After that, the detailed report of the stability of applications to certain attacks is made, including attacks of type of denial of service [1].

Fig. 1- Methodology for auditing the security of web applications

Therefore, for the defense from the most popular types of attacks, it is necessary to properly check the input data, use the encrypted HTTPS protocol, and use a framework that has built-in validation, encryption and validation mechanisms. Besides, conducting a permanent safety audit, monitoring of web resources will ensure the reliability of the application and will increase the level of protection of the applications.

Reference

1. Web resource security rating: 2015. - Company of Informational Security, 2015. - Online access mode: http://itland.com.ua/services/penetration-service/web-application-penetration-testing/

2. Website Security Statistics Report: 2015. - WhiteHat Security 2015. - Internet access mode: https://info.whitehatsec.com/Website-Stats-Report-2015.html

3. Collabrece J. Web Application Security - Ready Solutions / J. Scambreyz, M. Shema. - M .: Williams Publishing House, 2003. - 384 pp.