BLOCK: A Black-box Approach for Detection of State Violation Attacks Towards Web Applications

被引:0
|
作者
Li, Xiaowei [1 ]
Xue, Yuan [1 ]
机构
[1] Vanderbilt Univ, Dept Elect Engn & Comp Sci, 221 Kirkland Hall, Nashville, TN 37235 USA
关键词
black-box approach; state violation attack; web application security; invariant;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
State violation attacks towards web applications exploit logic flaws and allow restrictive functions and sensitive information to be accessed at inappropriate states. Since application logic flaws are specific to the intended functionality of a particular web application, it is difficult to develop a general approach that addresses state violation attacks. To date, existing approaches all require web application source code for analysis or instrumentation in order to detect state violations. In this paper, we present BLOCK, a BLack-bOx approach for detecting state violation attaCKs. We regard the web application as a stateless system and infer the intended web application behavior model by observing the interactions between the clients and the web application. We extract a set of invariants from the web request/response sequences and their associated session variable values during its attack-free execution. The set of invariants is then used for evaluating web requests and responses at runtime. Any web request or response that violates the associated invariants is identified as a potential state violation attack. We develop a system prototype based on the WebScarab proxy and evaluate our detection system using a set of real-world web applications. The experiment results demonstrate that our approach is effective at detecting state violation attacks and incurs acceptable performance overhead. Our approach is valuable in that it is independent of the web application source code and can easily scale up.
引用
收藏
页码:247 / 256
页数:10
相关论文
共 50 条
  • [21] Towards Query Efficient Black-box Attacks: An Input-free Perspective
    Du, Yali
    Fang, Meng
    Yi, Jinfeng
    Cheng, Jun
    Tao, Dacheng
    AISEC'18: PROCEEDINGS OF THE 11TH ACM WORKSHOP ON ARTIFICIAL INTELLIGENCE AND SECURITY, 2018, : 13 - 24
  • [22] Towards Black-Box Anomaly Detection in Virtual Network Functions
    Sauvanaud, Carla
    Lazri, Kahina
    Kaaniche, Mohamed
    Kanoun, Karama
    2016 46TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS WORKSHOPS (DSN-W), 2016, : 254 - 257
  • [23] Black-Box Data Poisoning Attacks on Crowdsourcing
    Chen, Pengpeng
    Yang, Yongqiang
    Yang, Dingqi
    Sun, Hailong
    Chen, Zhijun
    Lin, Peng
    PROCEEDINGS OF THE THIRTY-SECOND INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, IJCAI 2023, 2023, : 2975 - 2983
  • [24] Toward Visual Distortion in Black-Box Attacks
    Li, Nannan
    Chen, Zhenzhong
    IEEE TRANSACTIONS ON IMAGE PROCESSING, 2021, 30 : 6156 - 6167
  • [25] Resiliency of SNN on Black-Box Adversarial Attacks
    Paudel, Bijay Raj
    Itani, Aashish
    Tragoudas, Spyros
    20TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA 2021), 2021, : 799 - 806
  • [26] SoK: Pitfalls in Evaluating Black-Box Attacks
    Suya, Fnu
    Suri, Anshuman
    Zhang, Tingwei
    Hong, Jingtao
    Tian, Yuan
    Evans, David
    IEEE CONFERENCE ON SAFE AND TRUSTWORTHY MACHINE LEARNING, SATML 2024, 2024, : 387 - 407
  • [27] Beating White-Box Defenses with Black-Box Attacks
    Kumova, Vera
    Pilat, Martin
    2021 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2021,
  • [28] State of the Art: Automated Black-Box Web Application Vulnerability Testing
    Bau, Jason
    Bursztein, Elie
    Gupta, Divij
    Mitchell, John
    2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2010, : 332 - 345
  • [29] TOWARDS A BLACK-BOX LANCZOS PROGRAM
    PARLETT, BN
    NOUROMID, B
    COMPUTER PHYSICS COMMUNICATIONS, 1989, 53 (1-3) : 169 - 179
  • [30] MalDBA: Detection for Query-Based Malware Black-Box Adversarial Attacks
    Kong, Zixiao
    Xue, Jingfeng
    Liu, Zhenyan
    Wang, Yong
    Han, Weijie
    ELECTRONICS, 2023, 12 (07)