CFP last date
20 May 2024
Reseach Article

Securely Web-based Application for Construction Material Testing

by Nontarak S., Leelawat T.
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 42 - Number 11
Year of Publication: 2012
Authors: Nontarak S., Leelawat T.
10.5120/5741-7936

Nontarak S., Leelawat T. . Securely Web-based Application for Construction Material Testing. International Journal of Computer Applications. 42, 11 ( March 2012), 44-48. DOI=10.5120/5741-7936

@article{ 10.5120/5741-7936,
author = { Nontarak S., Leelawat T. },
title = { Securely Web-based Application for Construction Material Testing },
journal = { International Journal of Computer Applications },
issue_date = { March 2012 },
volume = { 42 },
number = { 11 },
month = { March },
year = { 2012 },
issn = { 0975-8887 },
pages = { 44-48 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume42/number11/5741-7936/ },
doi = { 10.5120/5741-7936 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:31:06.343672+05:30
%A Nontarak S.
%A Leelawat T.
%T Securely Web-based Application for Construction Material Testing
%J International Journal of Computer Applications
%@ 0975-8887
%V 42
%N 11
%P 44-48
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The main aim of this paper was to develop and evaluate securely web-based application for construction material testing using object-oriented technology and parameterized queries for SQL command queries. The SQL queries for the web application of construction material testing were modified by adjusting their codes which included connection strings, authorization bypass and execute commands. Detection of SQL injection vulnerability was conducted by expertise and two automatic web vulnerability scanning tools. It was found that the parameterized queries could minimize the SQL injection flaws of the web application significantly.

References
  1. Ar?oz, O. , et al. 2007. Web-based quality control of ready mixed concrete. Building and Environment. 42, 1465-1470.
  2. Kost, S. 2007. An Introduction to SQL Injection Attacks for Oracle Developer. White Paper. Integrigy Corporation.
  3. Strom, D. 2006. An Anatomy of a Web Hack: SQL Injection explained. White Paper. Breach Security Inc.
  4. Spett, K. 2005. SQL Injection: Are your web applications vulnerable? Technical Report. SPI Dynamics Inc.
  5. Amirtahmasebi, K. , Jalalinia, S. R. , and Khadem, S. 2009. A survey of SQL injection defense mechanisms. in International Conference for Internet Technology and Secured Transactions, ICITST. London. IEEE.
  6. Anley. , C. 2002. More Advanced SQL Injection. White Paper. Next Generation Security Software Ltd.
  7. Bandhakavi, S. , et al. 2007. CANDID: Preventing SQL Injection Attacks using Dynamic Candidate Evaluations. in Proceedings of the 14th ACM conference on Computer and communications security. New York. ACM.
  8. Boyd, S. W. and Keromytis, A. D. 2004. SQLrand: Preventing SQL Injection Attacks. in Proceedings of the 2nd Applied Cryptography and Network Security (ACNS) Conference. Yellow Mountain.
  9. Nystrom, M. G. 2007. SQL Injection Defenses. Short Cuts. O'Reilly Media.
  10. Obimbo, C. and Ferriman, B. 2011. Vulnerabilities of LDAP as an Authentication Service. Journal of Information Security. 2, 151-157.
  11. Sam, M. S. N. 2005. SQL Injection Protection by Variable Normalization of SQL Statement. ; Available from: http://www. securitydocs. com/library/3388.
  12. Wei, K. , Muthuprasanna, M. , and Suraj, K. 2006. Preventing SQL injection attacks in stored procedures. in Software Engineering Conference. IEEE.
  13. Fonseca, J. , Vieira, M. , and Madeira, H. 2007. Testing and Comparing Web Vulnerability Scanning Tools for SQL Injection and XSS Attacks, in PRDC. 13th Pacific Rim International Symposium on Dependable Computing. , IEEE: Melbourne. 365 - 372.
  14. Fu, X. and Qian, K. 2008. SAFELI: SQL injection scanner using symbolic execution. in Proceedings of the 2008 workshop on Testing, Analysis, and Verification of web services and applications. New York. ACM.
  15. Khoury, N. , et al. 2011. An Analysis of Black-Box Web Application Security Scanners against Stored SQL Injection. in IEEE Third International Conference on Privacy, Security, Risk and Trust (PASSAT) and IEEE Third International Confernece on Social Computing (SocialCom) Boston. IEEE.
  16. Shinder, D. 2005. Acunetix Web Vulnerability Scanner. Product Review 2005; Available from: www. windowsecurity. com/articles/product-review-acunetix-wvs. html.
  17. Anon 2008. The Power of AppScan: A Hands-On Review of IBM Rational AppScan Standard Edition. EMA™ IMPACT BRIEF 2008; Available from: www. ibm. com/software/awdtools/appscan/.
Index Terms

Computer Science
Information Sciences

Keywords

Construction Material Testing Parameterized Query Web Scanning Tool Authorization Bypass