Cargando…
Generative Adversarial Network (GAN)-Based Autonomous Penetration Testing for Web Applications
The web application market has shown rapid growth in recent years. The expansion of Wireless Sensor Networks (WSNs) and the Internet of Things (IoT) has created new web-based communication and sensing frameworks. Current security research utilizes source code analysis and manual exploitation of web...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10534908/ https://www.ncbi.nlm.nih.gov/pubmed/37766067 http://dx.doi.org/10.3390/s23188014 |
_version_ | 1785112504867749888 |
---|---|
author | Chowdhary, Ankur Jha, Kritshekhar Zhao, Ming |
author_facet | Chowdhary, Ankur Jha, Kritshekhar Zhao, Ming |
author_sort | Chowdhary, Ankur |
collection | PubMed |
description | The web application market has shown rapid growth in recent years. The expansion of Wireless Sensor Networks (WSNs) and the Internet of Things (IoT) has created new web-based communication and sensing frameworks. Current security research utilizes source code analysis and manual exploitation of web applications, to identify security vulnerabilities, such as Cross-Site Scripting (XSS) and SQL Injection, in these emerging fields. The attack samples generated as part of web application penetration testing on sensor networks can be easily blocked, using Web Application Firewalls (WAFs). In this research work, we propose an autonomous penetration testing framework that utilizes Generative Adversarial Networks (GANs). We overcome the limitations of vanilla GANs by using conditional sequence generation. This technique helps in identifying key features for XSS attacks. We trained a generative model based on attack labels and attack features. The attack features were identified using semantic tokenization, and the attack payloads were generated using conditional sequence GAN. The generated attack samples can be used to target web applications protected by WAFs in an automated manner. This model scales well on a large-scale web application platform, and it saves the significant effort invested in manual penetration testing. |
format | Online Article Text |
id | pubmed-10534908 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-105349082023-09-29 Generative Adversarial Network (GAN)-Based Autonomous Penetration Testing for Web Applications Chowdhary, Ankur Jha, Kritshekhar Zhao, Ming Sensors (Basel) Article The web application market has shown rapid growth in recent years. The expansion of Wireless Sensor Networks (WSNs) and the Internet of Things (IoT) has created new web-based communication and sensing frameworks. Current security research utilizes source code analysis and manual exploitation of web applications, to identify security vulnerabilities, such as Cross-Site Scripting (XSS) and SQL Injection, in these emerging fields. The attack samples generated as part of web application penetration testing on sensor networks can be easily blocked, using Web Application Firewalls (WAFs). In this research work, we propose an autonomous penetration testing framework that utilizes Generative Adversarial Networks (GANs). We overcome the limitations of vanilla GANs by using conditional sequence generation. This technique helps in identifying key features for XSS attacks. We trained a generative model based on attack labels and attack features. The attack features were identified using semantic tokenization, and the attack payloads were generated using conditional sequence GAN. The generated attack samples can be used to target web applications protected by WAFs in an automated manner. This model scales well on a large-scale web application platform, and it saves the significant effort invested in manual penetration testing. MDPI 2023-09-21 /pmc/articles/PMC10534908/ /pubmed/37766067 http://dx.doi.org/10.3390/s23188014 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Chowdhary, Ankur Jha, Kritshekhar Zhao, Ming Generative Adversarial Network (GAN)-Based Autonomous Penetration Testing for Web Applications |
title | Generative Adversarial Network (GAN)-Based Autonomous Penetration Testing for Web Applications |
title_full | Generative Adversarial Network (GAN)-Based Autonomous Penetration Testing for Web Applications |
title_fullStr | Generative Adversarial Network (GAN)-Based Autonomous Penetration Testing for Web Applications |
title_full_unstemmed | Generative Adversarial Network (GAN)-Based Autonomous Penetration Testing for Web Applications |
title_short | Generative Adversarial Network (GAN)-Based Autonomous Penetration Testing for Web Applications |
title_sort | generative adversarial network (gan)-based autonomous penetration testing for web applications |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10534908/ https://www.ncbi.nlm.nih.gov/pubmed/37766067 http://dx.doi.org/10.3390/s23188014 |
work_keys_str_mv | AT chowdharyankur generativeadversarialnetworkganbasedautonomouspenetrationtestingforwebapplications AT jhakritshekhar generativeadversarialnetworkganbasedautonomouspenetrationtestingforwebapplications AT zhaoming generativeadversarialnetworkganbasedautonomouspenetrationtestingforwebapplications |