Evaluation of Web Application Vulnerability Scanners using SQL Injection Attacks

With the evolution of web technologies, many businesses have decided to attract more clients through the online market, also called e-commerce. While numerous web applications exist, a significant portion remains susceptible to cyberattacks. Of these, Structured Query Language (SQL) injection attack...

Full description

Bibliographic Details
Published in:8th International Conference on Recent Advances and Innovations in Engineering: Empowering Computing, Analytics, and Engineering Through Digital Innovation, ICRAIE 2023
Main Author: Ibrahim R.Y.; Rosli M.M.
Format: Conference paper
Language:English
Published: Institute of Electrical and Electronics Engineers Inc. 2023
Online Access:https://www.scopus.com/inward/record.uri?eid=2-s2.0-85189931131&doi=10.1109%2fICRAIE59459.2023.10468295&partnerID=40&md5=d8f51b0881c397c1863a4dd0369293a7
id 2-s2.0-85189931131
spelling 2-s2.0-85189931131
Ibrahim R.Y.; Rosli M.M.
Evaluation of Web Application Vulnerability Scanners using SQL Injection Attacks
2023
8th International Conference on Recent Advances and Innovations in Engineering: Empowering Computing, Analytics, and Engineering Through Digital Innovation, ICRAIE 2023


10.1109/ICRAIE59459.2023.10468295
https://www.scopus.com/inward/record.uri?eid=2-s2.0-85189931131&doi=10.1109%2fICRAIE59459.2023.10468295&partnerID=40&md5=d8f51b0881c397c1863a4dd0369293a7
With the evolution of web technologies, many businesses have decided to attract more clients through the online market, also called e-commerce. While numerous web applications exist, a significant portion remains susceptible to cyberattacks. Of these, Structured Query Language (SQL) injection attacks are the most popular techniques used by cybercriminals to steal information from inside a database and take full control of the web application. It is imperative to assess the vulnerability of a web application before its online deployment, as this practice enables developers to identify and address potential flaws comprehensively. Yet, manually checking for vulnerabilities is nearly impractical due to the intricate nature of the process and the significant time it consumes. In this study, three automated web application vulnerability scanners and penetration testing tools: SQLMap, Open Web Application Security Project (OWASP) Zed Attack Proxy (ZAP) and Skipfish) were evaluated. These are open source and, according to OWASP, the most efficient vulnerability scanners. The scanners are compared based on their accuracy and response time in detecting most SQL injection vulnerabilities on pre-defined web applications available for Damn Vulnerable Web App (DVWA) testing. The results indicate that OWASP ZAP outperforms SQLMap and Skipfish in terms of accuracy and performance. The findings provide insights to continuously improve web application security scanners and protect web applications from potential vulnerabilities and cyber threats. © 2023 IEEE.
Institute of Electrical and Electronics Engineers Inc.

English
Conference paper

author Ibrahim R.Y.; Rosli M.M.
spellingShingle Ibrahim R.Y.; Rosli M.M.
Evaluation of Web Application Vulnerability Scanners using SQL Injection Attacks
author_facet Ibrahim R.Y.; Rosli M.M.
author_sort Ibrahim R.Y.; Rosli M.M.
title Evaluation of Web Application Vulnerability Scanners using SQL Injection Attacks
title_short Evaluation of Web Application Vulnerability Scanners using SQL Injection Attacks
title_full Evaluation of Web Application Vulnerability Scanners using SQL Injection Attacks
title_fullStr Evaluation of Web Application Vulnerability Scanners using SQL Injection Attacks
title_full_unstemmed Evaluation of Web Application Vulnerability Scanners using SQL Injection Attacks
title_sort Evaluation of Web Application Vulnerability Scanners using SQL Injection Attacks
publishDate 2023
container_title 8th International Conference on Recent Advances and Innovations in Engineering: Empowering Computing, Analytics, and Engineering Through Digital Innovation, ICRAIE 2023
container_volume
container_issue
doi_str_mv 10.1109/ICRAIE59459.2023.10468295
url https://www.scopus.com/inward/record.uri?eid=2-s2.0-85189931131&doi=10.1109%2fICRAIE59459.2023.10468295&partnerID=40&md5=d8f51b0881c397c1863a4dd0369293a7
description With the evolution of web technologies, many businesses have decided to attract more clients through the online market, also called e-commerce. While numerous web applications exist, a significant portion remains susceptible to cyberattacks. Of these, Structured Query Language (SQL) injection attacks are the most popular techniques used by cybercriminals to steal information from inside a database and take full control of the web application. It is imperative to assess the vulnerability of a web application before its online deployment, as this practice enables developers to identify and address potential flaws comprehensively. Yet, manually checking for vulnerabilities is nearly impractical due to the intricate nature of the process and the significant time it consumes. In this study, three automated web application vulnerability scanners and penetration testing tools: SQLMap, Open Web Application Security Project (OWASP) Zed Attack Proxy (ZAP) and Skipfish) were evaluated. These are open source and, according to OWASP, the most efficient vulnerability scanners. The scanners are compared based on their accuracy and response time in detecting most SQL injection vulnerabilities on pre-defined web applications available for Damn Vulnerable Web App (DVWA) testing. The results indicate that OWASP ZAP outperforms SQLMap and Skipfish in terms of accuracy and performance. The findings provide insights to continuously improve web application security scanners and protect web applications from potential vulnerabilities and cyber threats. © 2023 IEEE.
publisher Institute of Electrical and Electronics Engineers Inc.
issn
language English
format Conference paper
accesstype
record_format scopus
collection Scopus
_version_ 1809677779092897792