Proceedings of the 29th Annual ACM Symposium on Applied Computing 2014
DOI: 10.1145/2554850.2555071
|View full text |Cite
|
Sign up to set email alerts
|

Risk assessment of code injection vulnerabilities using fuzzy logic-based system

Abstract: Web applications are notoriously vulnerable to code injection attacks. Given that, practitioners need to assess the risk posed by applications due to code injection attacks to plan ahead on employing necessary mitigation approaches. This paper proposes a risk assessment approach for code injection vulnerability in web applications. We are motivated by the observation that traditional risk assessment approaches work well when quantitative values of specific parameters of the risk computation model is known in a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 22 publications
0
4
0
Order By: Relevance
“…low, medium, and high. 7 Now it is time to define membership function for each linguistic variable. A membership function (denoted by the…”
Section: A Fuzzification Of Inputsmentioning
confidence: 99%
See 1 more Smart Citation
“…low, medium, and high. 7 Now it is time to define membership function for each linguistic variable. A membership function (denoted by the…”
Section: A Fuzzification Of Inputsmentioning
confidence: 99%
“…The example values of trapezoidal membership function (TNF) for our three linguistic variables are as follows: as Low (l1), the TNF (o,p,q,r) is (2,3,4,5). Similarly for Medium(l2) is (4,5,6,7) and High (l3) is (6,7,8,9). The values for these three linguistic variables are assumed as follows: value of Low ¼ 0.3, Medium ¼ 0.6, and High ¼ 0.9 on y-axis to draw respective membership function.…”
Section: A Fuzzification Of Inputsmentioning
confidence: 99%
“…Meanwhile, inputs leading to Web applications' data flow and control flow variability, which make it difficult to accurately obtain injection points' information, especially for the hidden interfaces. Therefore, new mathematical methods such as fuzzy logic, threat modeling are introduced to evaluate potential risk of injection vulnerabilities [33,35].…”
Section: Key Technologies Of Xss Attack Detection Injection Point Anamentioning
confidence: 99%
“…There are some research works that involve the use of fuzzy logic for generating attack samples. The Fuzzy Logic System (FLS), introduced by Shahriar et al [24], utilizes input from different attack types, described as top threats in Open Worldwide Application Security Project (OWASP) web attacks, and risk assessment models, to generate attack payloads. These payloads can be tested against PHP-based applications, to check the security risk level of different applications.…”
Section: Introductionmentioning
confidence: 99%