Abstract
Web applications are ubiquitous in today’s businesses. The security of these applications is of utmost importance since security breaches might negatively impact good reputation, and even result in bankruptcy. There are different methods of assessing security of Web applications, mainly based on some automated method of scanning. One type of scan method feeds random data to the application and monitors its behavior. The other type uses a database with predefined vulnerabilities that are checked one by one until either a vulnerability is found, or it can be claimed that the application does not have any known vulnerabilities. The important step in latter type of scan process is the identification of the application since in this case we are narrowing number of checks and, as a consequence, the scan process is faster. This paper describes a method for Web application identification based on a black box principle. Our method is based on the invariance of certain characteristics of Web applications. We experimentally tested and confirmed the usefulness of this approach.
Similar content being viewed by others
References
bbPress: http://bbpress.org/ (2008)
Berners-Lee, T., Fielding, R., Masinter, L.: Uniform Resource Identifier (URI): generic syntax. RFC 3986 (Standard). http://www.ietf.org/rfc/rfc3986.txt (2005)
eBay: http://www.ebay.com (2007)
Joomla!: http://www.joomla.org/ (2007)
Mamboserver.com—Home: http://www.mamboserver.com/ (2007)
MyBB—Free PHP and MySQL Forum Software: http://www.mybboard.net/ (2008)
Nessus vulnerability scanner: http://www.nessus.org (2007)
phpBB—Creating Communities Worldwide http://www.phpbb.com/ (2008)
PHP-Nuke: http://phpnuke.org/ (2007)
PostNuke CMS: a flexible open source content management system: http://www.postnuke.com/ (2008)
PunBB: http://punbb.org/ (2008)
R Development Core Team: R: a language and environment for statistical computing. R Foundation for Statistical Computing, Vienna, Austria. http://www.R-project.org. ISBN 3-900051-07-0 (2009)
Rubin A.D., Geer D., Ranum M.J.: Web Security Sourcebook. Wiley, New York (1997)
Rubin A.D., Geer D.E. Jr: A survey of web security. Computer 31(9), 34–41 (1998). doi:10.1109/2.708448
Security Administrator Tool for Analyzing Networks (SATAN): http://www.porcupine.org/satan/ (2007)
UseBB—the usable forum software: http://www.usebb.net/ (2008)
WAPITI—Web application vulnerability scanner/security auditor: wapiti.sourceforge.net/ (2008)
WSAT: http://sourceforge.net/projects/wsat (2008)
Author information
Authors and Affiliations
Corresponding author
Additional information
This work has been carried out within projects 036-0361994-1995 Universal Middleware Platform for Intelligent e-Learning Systems and 036-0362980-1921 Computing Environments for Ubiquitous Distributed Systems both funded by the Ministry of Science and Technology of the Republic Croatia.
Rights and permissions
About this article
Cite this article
Kozina, M., Golub, M. & Groš, S. A method for identifying Web applications. Int. J. Inf. Secur. 8, 455–467 (2009). https://doi.org/10.1007/s10207-009-0092-3
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10207-009-0092-3