Modeling of post-incident root cause analysis for cross site request forgery (CSRF) attack

With the advancement ment of ICT technology, especially on web technologies, people have changes their way of doing this. Online transactions have become more popular compared to physically going at the specific location to do transactions. However, the advancement of web technology has also...

पूर्ण विवरण

ग्रंथसूची विवरण
मुख्य लेखक: Mustafa, Mohd Nawawi
स्वरूप: थीसिस
भाषा:अंग्रेज़ी
प्रकाशित: 2015
विषय:
ऑनलाइन पहुंच:http://psasir.upm.edu.my/id/eprint/50428/1/FSKTM%202015%2039%20IR.pdf
_version_ 1846215619982131200
author Mustafa, Mohd Nawawi
author_facet Mustafa, Mohd Nawawi
author_sort Mustafa, Mohd Nawawi
description With the advancement ment of ICT technology, especially on web technologies, people have changes their way of doing this. Online transactions have become more popular compared to physically going at the specific location to do transactions. However, the advancement of web technology has also introduced new security threats to the businesses and the clients. OWASP Top 10 security project has classifies web application security incident into ten categories of most commonly exploited vulnerabilities. Eventhough the countermeasures for those vulnerabilities have been available for some time, the numbers of exploited web applications are increasing each year. One of the factors that contributes to the increasing number of ICT security incidents is failure to determine the root cause of an incident, thus allowing the attacker to repeat an attack on the system in the future by exploiting the same vulnerability. This study will propose a model for post-incident root cause analysis to determine the suitable countermeasures in rectifying the Cross Site Request Forgery (CSRF) vulnerabilities. The proposed model were consists of attacker component, countermeasure component and inference component. The proposed model will be developed using Colored Petri Nets. CSRF attack simulation was performed using Damn Vulnerable Web Application (DVWA) as the target machine and tested based on recommendations by the previous researchers. To test the effectiveness of the developed model, the result of the CSRF attack simulations were compared with results by other researchers in the same category. Hopefully, the proposed post-incident root cause analysis will benefit web application developers, security auditors and other related parties to identify and fix CSRF vulnerabilities on their web applications.
format Thesis
id oai:psasir.upm.edu.my:50428
institution Universiti Putra Malaysia
language English
publishDate 2015
record_format eprints
spelling oai:psasir.upm.edu.my:504282019-01-29T08:30:09Z http://psasir.upm.edu.my/id/eprint/50428/ Modeling of post-incident root cause analysis for cross site request forgery (CSRF) attack Mustafa, Mohd Nawawi With the advancement ment of ICT technology, especially on web technologies, people have changes their way of doing this. Online transactions have become more popular compared to physically going at the specific location to do transactions. However, the advancement of web technology has also introduced new security threats to the businesses and the clients. OWASP Top 10 security project has classifies web application security incident into ten categories of most commonly exploited vulnerabilities. Eventhough the countermeasures for those vulnerabilities have been available for some time, the numbers of exploited web applications are increasing each year. One of the factors that contributes to the increasing number of ICT security incidents is failure to determine the root cause of an incident, thus allowing the attacker to repeat an attack on the system in the future by exploiting the same vulnerability. This study will propose a model for post-incident root cause analysis to determine the suitable countermeasures in rectifying the Cross Site Request Forgery (CSRF) vulnerabilities. The proposed model were consists of attacker component, countermeasure component and inference component. The proposed model will be developed using Colored Petri Nets. CSRF attack simulation was performed using Damn Vulnerable Web Application (DVWA) as the target machine and tested based on recommendations by the previous researchers. To test the effectiveness of the developed model, the result of the CSRF attack simulations were compared with results by other researchers in the same category. Hopefully, the proposed post-incident root cause analysis will benefit web application developers, security auditors and other related parties to identify and fix CSRF vulnerabilities on their web applications. 2015-07 Thesis NonPeerReviewed text en http://psasir.upm.edu.my/id/eprint/50428/1/FSKTM%202015%2039%20IR.pdf Mustafa, Mohd Nawawi (2015) Modeling of post-incident root cause analysis for cross site request forgery (CSRF) attack. Masters thesis, Universiti Putra Malaysia. Web applications - Security measures Root cause analysis Computer networks - Security measures
spellingShingle Web applications - Security measures
Root cause analysis
Computer networks - Security measures
Mustafa, Mohd Nawawi
Modeling of post-incident root cause analysis for cross site request forgery (CSRF) attack
title Modeling of post-incident root cause analysis for cross site request forgery (CSRF) attack
title_full Modeling of post-incident root cause analysis for cross site request forgery (CSRF) attack
title_fullStr Modeling of post-incident root cause analysis for cross site request forgery (CSRF) attack
title_full_unstemmed Modeling of post-incident root cause analysis for cross site request forgery (CSRF) attack
title_short Modeling of post-incident root cause analysis for cross site request forgery (CSRF) attack
title_sort modeling of post incident root cause analysis for cross site request forgery csrf attack
topic Web applications - Security measures
Root cause analysis
Computer networks - Security measures
url http://psasir.upm.edu.my/id/eprint/50428/1/FSKTM%202015%2039%20IR.pdf
url-record http://psasir.upm.edu.my/id/eprint/50428/
work_keys_str_mv AT mustafamohdnawawi modelingofpostincidentrootcauseanalysisforcrosssiterequestforgerycsrfattack