Cargando…

Generative Adversarial Network (GAN)-Based Autonomous Penetration Testing for Web Applications

The web application market has shown rapid growth in recent years. The expansion of Wireless Sensor Networks (WSNs) and the Internet of Things (IoT) has created new web-based communication and sensing frameworks. Current security research utilizes source code analysis and manual exploitation of web...

Descripción completa

Detalles Bibliográficos
Autores principales: Chowdhary, Ankur, Jha, Kritshekhar, Zhao, Ming
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10534908/
https://www.ncbi.nlm.nih.gov/pubmed/37766067
http://dx.doi.org/10.3390/s23188014
_version_ 1785112504867749888
author Chowdhary, Ankur
Jha, Kritshekhar
Zhao, Ming
author_facet Chowdhary, Ankur
Jha, Kritshekhar
Zhao, Ming
author_sort Chowdhary, Ankur
collection PubMed
description The web application market has shown rapid growth in recent years. The expansion of Wireless Sensor Networks (WSNs) and the Internet of Things (IoT) has created new web-based communication and sensing frameworks. Current security research utilizes source code analysis and manual exploitation of web applications, to identify security vulnerabilities, such as Cross-Site Scripting (XSS) and SQL Injection, in these emerging fields. The attack samples generated as part of web application penetration testing on sensor networks can be easily blocked, using Web Application Firewalls (WAFs). In this research work, we propose an autonomous penetration testing framework that utilizes Generative Adversarial Networks (GANs). We overcome the limitations of vanilla GANs by using conditional sequence generation. This technique helps in identifying key features for XSS attacks. We trained a generative model based on attack labels and attack features. The attack features were identified using semantic tokenization, and the attack payloads were generated using conditional sequence GAN. The generated attack samples can be used to target web applications protected by WAFs in an automated manner. This model scales well on a large-scale web application platform, and it saves the significant effort invested in manual penetration testing.
format Online
Article
Text
id pubmed-10534908
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-105349082023-09-29 Generative Adversarial Network (GAN)-Based Autonomous Penetration Testing for Web Applications Chowdhary, Ankur Jha, Kritshekhar Zhao, Ming Sensors (Basel) Article The web application market has shown rapid growth in recent years. The expansion of Wireless Sensor Networks (WSNs) and the Internet of Things (IoT) has created new web-based communication and sensing frameworks. Current security research utilizes source code analysis and manual exploitation of web applications, to identify security vulnerabilities, such as Cross-Site Scripting (XSS) and SQL Injection, in these emerging fields. The attack samples generated as part of web application penetration testing on sensor networks can be easily blocked, using Web Application Firewalls (WAFs). In this research work, we propose an autonomous penetration testing framework that utilizes Generative Adversarial Networks (GANs). We overcome the limitations of vanilla GANs by using conditional sequence generation. This technique helps in identifying key features for XSS attacks. We trained a generative model based on attack labels and attack features. The attack features were identified using semantic tokenization, and the attack payloads were generated using conditional sequence GAN. The generated attack samples can be used to target web applications protected by WAFs in an automated manner. This model scales well on a large-scale web application platform, and it saves the significant effort invested in manual penetration testing. MDPI 2023-09-21 /pmc/articles/PMC10534908/ /pubmed/37766067 http://dx.doi.org/10.3390/s23188014 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Chowdhary, Ankur
Jha, Kritshekhar
Zhao, Ming
Generative Adversarial Network (GAN)-Based Autonomous Penetration Testing for Web Applications
title Generative Adversarial Network (GAN)-Based Autonomous Penetration Testing for Web Applications
title_full Generative Adversarial Network (GAN)-Based Autonomous Penetration Testing for Web Applications
title_fullStr Generative Adversarial Network (GAN)-Based Autonomous Penetration Testing for Web Applications
title_full_unstemmed Generative Adversarial Network (GAN)-Based Autonomous Penetration Testing for Web Applications
title_short Generative Adversarial Network (GAN)-Based Autonomous Penetration Testing for Web Applications
title_sort generative adversarial network (gan)-based autonomous penetration testing for web applications
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10534908/
https://www.ncbi.nlm.nih.gov/pubmed/37766067
http://dx.doi.org/10.3390/s23188014
work_keys_str_mv AT chowdharyankur generativeadversarialnetworkganbasedautonomouspenetrationtestingforwebapplications
AT jhakritshekhar generativeadversarialnetworkganbasedautonomouspenetrationtestingforwebapplications
AT zhaoming generativeadversarialnetworkganbasedautonomouspenetrationtestingforwebapplications