Self-Protecting Technology for Web Applications

Page 1

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056

Volume: 09 Issue: 08 | Aug 2022 www.irjet.net p-ISSN: 2395-0072

Self-Protecting Technology for Web Applications

***

Abstract - Self-defense for running applications is a security-based technology. It keeps an eye on the running program, which keeps an eye on incoming traffic to see whether any incoming attacks are present. If they are, it blocks them by using the information from the current application. By evaluating the inputs and preventing the inputs that could enable assaults in the application, it is claimed to enhance the security aspects of software. RASP reduces the reliance of applications on external hardware, such as firewalls, for runtime security protection. We outline the fundamental ideas behind Runtime Application SelfProtection Technology (RASP), a relatively new security strategythatissoontobewidelyadopted.

Key Words: SelfProtection,Security,NetworkTraffic

1. INTRODUCTION

Networks are expanding in size, becoming more complicated, and becoming harder to secure. In order to better detect risks, security providers are incorporating new methodologies into their software products, such as studyingusers'typicalroutines.Applicationsarescattered and complicated, thus application security strategies should be divided up to allow for a more in-depth investigation of the system's data. Attacks are becoming more sophisticated, and present access safeguards are no longer able to stop them. Due to shortcomings in applicationsecurity,productionapplicationsareatdanger. Once they take place on a network, security issues have verylittlevisibility.

There’sastrongneedofmodulethatcan:

• By keeping an eye on and analysing exploitation attempts, you can spot attack trends and prevent callers fromaccessingtheapplication.Context-awaredetection

• Recognize and record how an application performs, interactswithitsecosystem,andflowsdatainandout.

• Identify unusual searches, application inputs, feature usages,andcomparetothedatabase.

• Recognize typical application usage patterns and documenttheminthedatabase.

Ifsomethingisstrange,denyaccesstothefeatures.

• When an application has known vulnerabilities, defend against assaults without the requirement for development fixes.

1.1 EXISTING SYSTEM

RASPisasecuritytechnologythatisbuiltorlinkedintoan application or application runtime environment and is capable of controlling application execution as well as detectingandpreventingreal-timeattacks[1].

RASP prevents attacks by self-protecting or automatically reconfiguringin responsetoparticularnetwork situations withouthumanintervention(threats,faults,etc.).

Whenanapplicationisexecuted(runtime),RASPbecomes active, causing the programme to supervise itself and identify fraudulent input and behavior. RASP processes boththeapplication'sbehavioranditscontextinrealtime.

As a result, regular security analysis is used, with the system responding appropriately to any detected attacks. [2].

Web applications are a common target, and attackers commonly employ them to gain access to a system (network)[3].

Maintaining network security while preserving the flexibility needed by web application developers is the primary security goal of a business. The idea that a web application firewall (WAF) is the best security measure is one that is frequently expressed. Before running the web application, WAF filtering and code testing methods are implemented, evaluating incoming traffic flow for known attack patterns and blocking inputs from reaching the application. The consensus is that a WAF's signature base andpatternmatchingenginedeterminehowtrustworthyit is.

2. PROPOSED SYSTEM

Therearetwousedcasesinvolved:

I. The Self Protecting tool placed inside the application

User attempting to log in while still logged in: This user action can be viewed as suspicious, and the user is prompted to log out first to preserve the integrity of the programme.FeaturesoftheProposedSystem'sSecurity.

© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1488

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056

Volume: 09 Issue: 08 | Aug 2022 www.irjet.net p-ISSN: 2395-0072

a. Whenauserlogsinorout,thelogfilesareprinted with their timestamp and distinctive ID (such as theiraccountnumber).

b. A Boolean value is always set to true whenever a log-inaction iscarriedout. Iftheuserlogsout, the valuejustbecomesfalse.

c. Userswhoarealreadyloggedincannotloginfrom another tab of the browser without first logging out.

d. The aforementioned modifications, which were performed during the course of this project, were notexistentinthesystemthatwasinplacebefore.

e. Using the current system, we were able to access the information and identify suspicious and harmful activity. The application in our suggested solution does not access the database or modify any source code. We create logs for each login and logouteventtohelpusdetectnefariousbehaviours likeseveral usersusing the sameaccounttologin. By analysing the real-time generated logs, our applicationwilllookforanyanomalousactivity.

f. Since we won't be accessing the database, we will save all of the routine actions in the logs itself insteadofthedatabase,whichwashowthesystem was set up before. Without altering the source code, our suggested application will function as a general-purpose add-on that keeps track of both normal and aberrant activity. It runs in parallel in the background. As opposed to the prior system, where we had to access the database and modify the source code, the application in the existing system was not general-purpose for any web application.

II. The Self Protecting tool placed inside the application

SecurityFeaturesintheProposedSystem

a. When a user attempts to commit SQL injection, their behavior is deemed suspect, and they are prohibited from accessing the website. The fundamentalblockdiagramisdisplayedinFig.1.3.

b. The website prints a 404 message if a SQL injectionisexecuted.

c. The aforementioned modifications, which were performed during the course of this project, were notexistentinthesystemthatwasinplacebefore.

d. Wewerelookingthroughtheerrorlogfilesonthe current system to find unusual requests and suspiciousactivity.Theself-protectingmechanism is included in the application and does not access the database in our suggested system. We use the self-protecting tool within the programme to detect harmful activities like SQL injection inside the application. This tool also aids in preventing injection assaults made to the website. Our programme uses a self-protecting tool, as shown infigurebelow,toexamineallanomalousactivity.

Fig- 2 :Workingof2nd case

3. METHODOLOGY

Fig- 1 :Workingof1st case

Fig- 1 :BlockDiagramofProposedSystem

© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1489

International Research Journal of Engineering and Technology (IRJET)

e-ISSN: 2395-0056

Volume: 09 Issue: 08 | Aug 2022 www.irjet.net p-ISSN: 2395-0072

RASP limits attacks and only permits authorised users to accesstheprogrammebydistinguishingbetweenintruders and legitimate users for information. It serves as an additional layer of security for the application and keeps intruders out while it is running. Even small vendors can employruntimeself-protectingapplicationstosecuretheir products because they are affordable. The size or kind of theapplicationhasnobearingonit.

4. IMPLEMENTATION

Server Web Apache (Apache HTTP Server)

Open-source web server software includes Apache HTTP Server. The term "web server" refers to a device that enableswebsiteownerstopublishmaterialonline.

i. Selected a web application and following was implemented:

a. Disable the web application access from remote system

b. UnderstandingApacheHTTPServer

c. Creating a Virtual Host in Apache and direct all communication of each web application through thateachHostwhenaccessremotely

ii. Apache's HTTP request interpretation includes loggingthefollowinginformationinafile: a. thedateandtime, b. theURLormodulethatwasrequested, c. andanyunusualactivity.

iii. The development of a Java classthatwill read the followinginputandprintittotheconsole a. WebApplicationName b. Userlogindetails

iv. Calling the JAVA Class from Apache and provide theinputs.

Traffic & Data Analysis

There are numerous phases involved in traffic analysis, such as gathering network data, examining that data, and analysingittoimprovesystemperformance.

Steps:

i.

NetworkDataAnalysis

ii. ActivePassive

Attacks

Create a second Java class that analyses the CSV file's contents and transforms it into scenarios or policies (a seriesofinstructionsintheformofatxt,prop,orXMLfile) thatpreventusersfromaccessingthewebsite.

Implementation of Self protecting tool placed outside the application

Fig- 3 :Implementationof1st case

We access the GET request in the Apache proxy when the usertriestoaccesstheprogrammeusingtheURL,and we extract the account number from there. We have our detailstobeobtainedwithinformationtakenfromtheGET request header. These details are subsequently transmittedtoaPerlscript,wherevalidationoccurs.Atthe back end, we execute the Perl script, which calls the Java executable file. The header information is checked against the user's previously collected data. Jar file running in the background does validation. We read the JAR log file and do the appropriate tests. This log file is read in Jar, and userauthenticationisverified.

The information will be provided by the Jar file, and we have established the prerequisites for carrying out the action.Thespecificaccountnumberobtainedfromthelog fileandtheGETrequestinApache(accountnumberofthe user if the user has logged in or logged out). The log file containsallinformationoneachuser'sloginorlogout.

Jar generates 0 or 1 depending on the data in the log file. Values 0 and 1 show that the user has previously logged outandhasn'tdonesorecently,respectively.Thisdatawas submittedtoaPerlscript.So,welooktoseeiftheuserhas engaged in any suspicious behaviour. If so, a message about unauthorised access is displayed. An error notice therefore develops if the value is 1. It prevents the user from using the application. If the number is zero, the user has logged out and is now free to utilise the website. He can then carry out any function within the application. Creatinga newaccountorloggingintoanexistingone can bedonenext.

Implementation of Self protecting tool placed inside the application

We send the user request to the gateway when a user attempts to access an application via a URL, and the gateway then sends the information to the plugin. The

© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1490

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056

Volume: 09 Issue: 08 | Aug 2022 www.irjet.net p-ISSN: 2395-0072

plugins check for the presence of binary SQL injection patterns, and if they do, they return 0 otherwise. If the resultis0,theuserisprohibitedfromvisitingthewebsite; otherwise, they are permitted. If a pre-existing account is accessed, we verify that the username, password, and account number are correct and that the user has logged out.Accessisnotpermittedifitisinvalid.Allowtheuserto carryoutoperationslikecheckingthebalance,transferring money, withdrawing money, or closing the account if it is valid.Deletetheentry from thedatabase iftheusercloses theiraccount.

Fig -7 : illegitimateusernotallowedtoaccesswhenselfprotectingtoolisused

6. CONCLUSION

Fig – 4: Implementationof2nd case

Self-Protecting Applications are software friendlier, rely littleonthetypeofsoftware,andrequireminimaltechnical expertisetoutilize.Theyalsoofferarespectableservicefor safeguarding Web Applicationsagainstcriminal activity.It preventsdataleakageandshieldstheapplicationfromthe outside world. It safeguards the system from emerging dangers posed by any user simply by evaluating the patterns of user behavior. With its extremely transparent and practical methods, SPA, in contrast to other security software that is difficult to use and incompatible, can be utilizedbyanywebsite,fromastraightforwardsinglepage web application to a large social media application. Additionally, it doesn't call for any modifications to the Application's source code. SPA is therefore genuine softwareforprotectingWebapplications.

REFERENCES

[1] Gartner, IT Glossary, http://www.gartner.com/itglossary/runtime-application-self-protection-rasp/

[2] Veracode, https://www.veracode.com/security/runtimeapplication-self-protection-rasp

[3] Zhongxu Yin, Zhufeng Li&Yan Cao “A Web Application Runtime Application Self-protection SchemeagainstScriptInjectionAttacks”2018

[4] SalemiMacro"AutomatedrulesgenerationintoWeb ApplicationFirewallusingRuntimeApplicationSelfProtection"2020

[5] Amal Saha and Sugata Sanyal. Application layer intrusion detection with combination of explicitrule-based and machine learning algorithms and deployment in cyber-defence program! https://arxiv.org/pdf/1411.3089.pdf, November 2014.

[6] Alexander Fry. Runtime application self-protection (rasp), investigation of the eectiveness of a rasp solution in protecting known vulnerable target applications. https://www.sans.org/readingroom/whitepapers/ application/runtime-

© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1491
5. OUTCOMES Fig - 5:Realtimeviewofwebapplication Fig – 6: Legitimateuserallowedwhenself-protectingtool isused

International Research Journal of Engineering and Technology (IRJET)

e-ISSN: 2395-0056

Volume: 09 Issue: 08 | Aug 2022 www.irjet.net p-ISSN: 2395-0072

application-self-protectionrasp-investigationeffectiveness-rasp-solutionprotecting-vulnerabletarget-applications-38950,April2019.

[7] VivekGite.Linuxincrondinotifymonitordirectories for changes and take action. https://www.cyberciti.biz/faq/linuxinotifyexamples-to-replicate-directories/, December 2018.

[8] Adrian Lane. Understanding and selecting runtime application self- protection. https://securosis.com/assets/library/attachments/ Understanding_RASP_Immunio_V2.pdf,August2016.

[9] Dariusz PałkaMarek and ZacharaMarek Zachara. Learning web application rewall - benets and caveats. https://www.researchgate. net/publication/226351120_Learning_Web_Applica tion_Firewall_-_Benefits_and_Caveats,August2011.

[10]

Amal Saha and Sugata Sanyal. Application layer intrusion detection with combination of explicitrule-based and machine learning algorithms and deployment in cyber-defence program! https://arxiv.org/pdf/1411.3089.pdf, November 2014.

© 2022,
| Impact
7.529 | ISO 9001:2008 Certified Journal | Page 1492
IRJET
Factor value:

Turn static files into dynamic content formats.

Create a flipbook