• Title/Summary/Keyword: 웹애플리케이션 보안

Search Result 78, Processing Time 0.019 seconds

Verification Methods of OWASP TOP 10 Security Vulnerability under Multi-Tenancy Web Site's Environments (멀티테넌시 기반 웹 사이트의 OWASP TOP 10 보안취약성 검증 방법)

  • Lee, Do Hyeon;Lee, Jong Wook;Kim, Jeom Goo
    • Convergence Security Journal
    • /
    • v.16 no.4
    • /
    • pp.43-51
    • /
    • 2016
  • Nowadays hacked using a security vulnerability in a web application, and the number of security issues on the web site at many sites due to the exposure of personal information is increasing day by day. In this paper, considering the open-source Web Application Security Project at the time of production of the website. Proposed the OWASP TOP 10 vulnerability verification method, by applying the proposed method and then analyzed for improved method and vulnerability to verify the performance of security vulnerability.

Implementation and Design of Proxy System for Web vulnerability Analysis (웹 취약점 분석을 위한 프락시 시스템의 설계 및 구현)

  • Kim, Gwang-Hyun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.9
    • /
    • pp.1011-1018
    • /
    • 2014
  • Because of the proliferation of web services through web site, web hacking attempts are increasing using vulnerabilities of the web application. In order to improve the security of web applications, we have to find vulnerabilities in web applications and then have to remove. This paper addresses a vulnerability in a web application on existing problems and analyze and propose solutions to the vulnerability. This paper have checked the stability of existing web security solutions and evaluated its suitability through analysis of vulnerability. Also, we have implemented the vulnerability analysis tools for web Proxy system and proposed methods to optimize for resolution of web vulnerabilities.

A Defense Mechanism Based on Session Status against Cookie Replay Attack in Web Applications (웹 애플리케이션에서 세션 상태 기반의 쿠키 재전송 공격 방어 기법)

  • Won, Jong Sun;Park, JiSu;Shon, Jin Gon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.1
    • /
    • pp.31-36
    • /
    • 2015
  • As web accessibility has been easier, security issue becomes much more important in web applications demanding user authentication. Cookie is used to reduce the load of the server from the session in web applications and manage the user information efficiently. However, the cookie containing user information can be sniffed by an attacker. With this sniffed cookie, the attacker can retain the web application session of the lawful user as if the attacker is the lawful user. This kind of attack are called cookie replay attack and it causes serious security problems in web applications. In this paper, we have introduced a mechanism to detect cookie replay attacks and defend them, and verified effectiveness of the mechanism.

Design and Implementation of Security Frame work for Application Server with Components

  • 김행곤;강전근
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.4
    • /
    • pp.531-540
    • /
    • 2004
  • Development of Web service application requires the interoperability between various heterogeneous systems, extensibility to allow modification of business environment not of user interface, maintainability, flexibility and reusability As the properties of CBD (Component Based Development) have gradually become clear, attention has started to turn the smooth technology and methodology to solve the existing problems and issues the dynamic responds for the distributed web environments. In this paper, we identify some of the major architectural affecting CBD and describe the Design and Implementation of Security Framework for Application Server with Components. We identify the candidate components, model it using UML and layer it on the architecture. The frameworks will Provide the various security functions, such as incorporating with legacy security systems, supporting of J2EE, JAAS and Kerberos and assisting in increasing the tailorability of component.

  • PDF

OAuth based Proxy Delegation Service (OAuth 기반의 대리 인증서 위임 서비스)

  • Heo, Daeyoung;Hwang, Suntae
    • Journal of Internet Computing and Services
    • /
    • v.13 no.6
    • /
    • pp.55-62
    • /
    • 2012
  • Grid web applications by standard Web technology are increasingly used to provide grid service to users as normal Web user interface and service. It is however difficult to integrate a grid security system such as Grid Security Infrastructure (GSI) into Web applications because the delegation way of standard Web security is not the same as the one of Grid security. This can be solved by allowing Web applications to get a Grid credential by using an online credential repository system such as MyProxy. In this paper, we investigate the problem that occurs when MyProxy, which assumes mutual trust between a user and Grid web application, is adapted for achieving security integration between Web and Grid, and we propose a new Grid proxy delegation service to delegate a Grid credential to the Web without assuming mutual trust. In the service, the X.509 proxy delegation process is added to OAuth protocol for credential exchange, and authentication can be done by an external service such as OpenID. So, users can login onto the Grid web application in a single sign-on manner, and are allowed to securely delegate and retrieve multiple credentials for one or more Virtual Organizations.

Vulnerability Analysis and Threat Mitigation for Secure Web Application Development (안전한 웹 애플리케이션 개발을 위한 취약점 분석 및 위협 완화)

  • Moon, Jae-Chan;Cho, Seong-Je
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.2
    • /
    • pp.127-137
    • /
    • 2012
  • Recently, as modern Internet uses mashups, Web 3.0, JavaScript/AJAX widely, the rate at which new vulnerabilities are being discovered is increasing rapidly. It can subsequently introduce big security threats. In order to efficiently mitigate these web application vulnerabilities and security threats, it is needed to rank vulnerabilities based on severity and consider the severe vulnerabilities during a specific phase of software development lifecycle (SDLC) for web applications. In this paper, we have first verified whether the risk rating methodology of OWASP Top 10 vulnerabilities is a reasonable one or not by analyzing the vulnerability data of web applications in the US National Vulnerability Database (NVD). Then, by inspecting the vulnerability information of web applications based on OWASP Top-10 2010 list and CWE (Common Weakness Enumeration) directory, we have mapped the web-related entries of CWE onto the entries of OWASP Top-10 2010 and prioritized them. We have also presented which phase of SDLC is associated with each vulnerability entry. Using this approach, we can prevent or mitigate web application vulnerabilities and security threats efficiently.

Design and Implementation for Web based Enterprise Application System (Web 기반 기업 Application 시스템을 위한 보안환경 설계 및 구현)

  • Jeong, Kyung-Hee;Shin, Dong-Gyu
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.05c
    • /
    • pp.2165-2168
    • /
    • 2003
  • 인터넷을 기반으로 기업 활동이 점차로 넘어지면서, 동적이면서 실시간의 데이터를 제공하기 위하여 거미줄처럼 여러 개의 시스템이 연계되기도 하고, ERP, CRM, EAI등으로 기업 내 Application을 통합하기도 한다. Backend System의 통합으로 얻을 수 있는 기대효과에 맞서서 이의 인터넷 서비스 위험은 더 커져 정보 보안 문제가 중요한 이슈가 되었다. 이에 본 논문에서는 웹 기반 사용자의 정보를 안전하게 보호하고, 여러 가지 보안 문제를 해결할 수 있는 안전한 애플리케이션 보안 구조에 대한 설계 및 구현에 대해 기술하였다. 기업의 웹 서비스는 B2B 와 B2E 로 구분되는 데, 특히 B2B 거래 시의 법적 증명력을 가지기 위한 전자 거래 법 규정에 따른 정보 시스템의 보안 구성 요건을 철저히 분석하여, 시스템 구현에 적용하였다. 아울러 향후 기업의 웹 기반 애플리케이션 시스템 보안 구조의 발전방향을 살펴보면서 웹 기반 정보 시스템의 보안 환경을 검토하거나, 추진할 때 도움이 될 수 있고자 한다.

  • PDF

웹 애플리케이션 취약성 수치화 프레임워크 연구 동향

  • Cho, Sung-Young;Jeon, Sang-Hun;Lim, Chae-Ho;Kim, Se-Hun
    • Review of KIISC
    • /
    • v.22 no.3
    • /
    • pp.48-55
    • /
    • 2012
  • 웹 애플리케이션의 취약점을 이용한 공격으로 인한 보안 사고가 급증함에 따라, 웹 애플리케이션의 취약점을 진단하고 취약성을 수치화하는 프레임워크가 개발 및 제시되고 있다. 이 논문에서는 현재 웹 애플리케이션의 취약성을 수치화할 수 있는 CVSS와 CWSS와 같은 여러 가지 프레임워크 연구를 분석하고, 현재까지 제시된 취약성 수치화 프레임워크가 가지고 있는 문제점을 제시함으로써 향후 보완해야 할 방향을 제시한다.

Fuzzing of Web Application Server Using Known Vulnerability Information and Its Verification (알려진 취약점 정보를 활용한 웹 애플리케이션 서버 퍼징 및 검증)

  • Kim, Gi-Youn;Cho, Seong-Je
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06b
    • /
    • pp.181-184
    • /
    • 2011
  • 소프트웨어와 인터넷 연결이 일반화되고 소프트웨어 규모가 복잡해짐에 따라, 소프트웨어 보안 취약점 발생 수 및 관련 보안 사고가 나날이 증가하고 있다. 소프트웨어 보안 사고를 예방하기 위한 하나의 방법은 소프트웨어 개발 단계에서 취약점을 발견하여 제거하는 것이다. 이에 본 논문에서는 취약점 발견에 사용되는 대표적 테스팅 기법인 퍼징에 대해 연구하였다. 먼저, 웹 애플리케이션 서버와 관련된 기존의 공개된 취약점 정보를 분석하여 퍼징에 필요한 오용 케이스(misuse case) 생성 방법을 보인다. 생성된 오용 케이스는 URL과 HTTP 요청 메시지의 각 필드에 대한 테스팅 정보를 포함하고 있으며, 이 오용 케이스를 웹 애플리케이션 서버에 퍼징하여 실제 보안 관련 결함이 나타남을 확인하였다.

Consideration for Web Services Security (웹 서비스 보안기술에 대한 고찰)

  • 이대하;문진영;박찬규;조현규
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10c
    • /
    • pp.85-87
    • /
    • 2003
  • 최근 이 기종 시스템 및 애플리케이션에 상관없이 동일한 서비스를 제공할 수 있는 웹 서비스에 대한 관심이 고조되어 가고 있다. 하지만, 웹의 편리함과 동시에 누구에게나 접근 가능한 웹의 개방성은 보안에 대한 문제점을 야기 시키는데, 웹 서비스 보안기술은 이에 대한 해결책을 제시하고 있다. 본고에서는 웹 서비스 보안 기술의 구성요소 및 보안 메커니즘에 대해 살펴보고자 한다.

  • PDF