ARC: Protecting against HTTP Parameter Pollution Attacks Using Application Request Caches

作者: Elias Athanasopoulos , Vasileios P. Kemerlis , Michalis Polychronakis , Evangelos P. Markatos

DOI: 10.1007/978-3-642-31284-7_24

关键词:

摘要: HTTP Parameter Pollution (HPP) vulnerabilities allow attackers to exploit web applications by manipulating the query parameters of requested URLs. In this paper, we present Application Request Cache (ARC), a framework for protecting against HPP exploitation. ARC hosts all benign URL schemas, which act as generators complete functional set URLs that compose application's logic. For each incoming request, exports URL, extracts associated schema, and searches it in already known schemas. case schema is not found, request rejected, event recorded. ARC can be transparently integrated with existing without any modifications server client code. It implemented Google's Go language uses efficient data structures storing imposing negligible computational overhead on application server. When running 4-core Linux server, process hundreds thousands requests per second. A typical resolution scale microseconds.

参考文章(34)
R. Sekar, An Efficient Black-box Technique for Defeating Web Application Attacks. network and distributed system security symposium. ,(2009)
Jesse James Garrett, Ajax: A New Approach to Web Applications ,(2007)
Richard A. Kemmerer, Christopher Krügel, Giovanni Vigna, William K. Robertson, Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks. network and distributed system security symposium. ,(2006)
Giovanni Vigna, William Robertson, Static enforcement of web application integrity through strong typing usenix security symposium. pp. 283- 298 ,(2009)
Seth Fogie, Anton Rager, Robert Hansen, Petko D. Petkov, Jeremiah Grossman, XSS Attacks: Cross Site Scripting Exploits and Defense ,(2007)
Eugene Ciurana, Developing with Google App Engine ,(2009)
Matthew Van Gundy, Hao Chen, Noncespaces: Using Randomization to Enforce Information Flow Tracking and Thwart Cross-Site Scripting Attacks. network and distributed system security symposium. ,(2009)
Yacin Nadji, Prateek Saxena, Dawn Song, Document Structure Integrity: A Robust Basis for Cross-site Scripting Defense. network and distributed system security symposium. ,(2009)
Vitaly Shmatikov, George Danezis, Yan Chen, Proceedings of the 18th ACM conference on Computer and communications security computer and communications security. ,(2011)
Angelos D. Keromytis, Salvatore J. Stolfo, Yingbo Song, Spectrogram: A Mixture-of-Markov-Chains Model for Anomaly Detection in Web Traffic network and distributed system security symposium. pp. 121- 135 ,(2009) , 10.7916/D86W9K09