Swaddler: An approach for the anomaly-based detection of state violations in web applications

被引:0
|
作者
Cova, Marco [1 ]
Balzarotti, Davide [1 ]
Felmetsger, Viktoria [1 ]
Vigna, Giovanni [1 ]
机构
[1] Univ Calif Santa Barbara, Dept Comp Sci, Santa Barbara, CA 93106 USA
基金
美国国家科学基金会;
关键词
web attacks; anomaly detection; dynamic analysis; code instrumentation;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In recent years, web applications have become tremendously popular, and nowadays they are routinely used in security-critical environments, such as medical, financial, and military systems. As the use of web applications for critical services has increased, the number and sophistication of attacks against these applications have grown as well. Most approaches to the detection of web-based attacks analyze the interaction of a web application with its clients and back-end servers. Even though these approaches can effectively detect and block a number of attacks, there are attacks that cannot be detected only by looking at the external behavior of a web application. In this paper, we present Swaddler, a novel approach to the anomaly-based detection of attacks against web applications. Swaddler analyzes the internal state of a web application and learns the relationships between the application's critical execution points and the application's internal state. By doing this, Swaddler is able to identify attacks that attempt to bring an application in an inconsistent, anomalous state, such as violations of the intended workflow of a web application. We developed a prototype of our approach for the PHP language and we evaluated it with respect to several real-world applications.
引用
收藏
页码:63 / +
页数:4
相关论文
共 50 条
  • [1] Anomaly-Based Web Attack Detection: A Deep Learning Approach
    Liang, Jingxi
    Zhao, Wen
    Ye, Wei
    [J]. PROCEEDINGS OF 2017 VI INTERNATIONAL CONFERENCE ON NETWORK, COMMUNICATION AND COMPUTING (ICNCC 2017), 2017, : 80 - 85
  • [2] An Anomaly-Based Approach for Detecting Modularity Violations on Method Placement
    Yoda, Kazuki
    Nakamaru, Tomoki
    Akiyama, Soramichi
    Chiba, Shigeru
    [J]. 2022 IEEE 22ND INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY, QRS, 2022, : 287 - 298
  • [3] An Anomaly-Based Approach for Detecting Modularity Violations on Method Placement
    Yoda, Kazuki
    Nakamaru, Tomoki
    Akiyama, Soramichi
    Chiba, Shigeru
    [J]. IEEE International Conference on Software Quality, Reliability and Security, QRS, 2022, 2022-December : 287 - 298
  • [4] AN ANOMALY-BASED WEB APPLICATION FIREWALL
    Torrano-Gimenez, Carmen
    Perez-Villegas, Alejandro
    Alvarez, Gonzalo
    [J]. SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2009, : 23 - 28
  • [5] Applications of Clustering Methods to Anomaly-Based Intrusion Detection Systems
    Nikolova, Evgeniya
    Jecheva, Veselina
    [J]. 2015 8TH INTERNATIONAL CONFERENCE ON DATABASE THEORY AND APPLICATION (DTA), 2015, : 37 - 41
  • [6] On the effects of learning set corruption in anomaly-based detection of web defacements
    Medvet, Eric
    Bartoli, Alberto
    [J]. DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, PROCEEDINGS, 2007, 4579 : 60 - +
  • [7] An anomaly-based approach for DDoS attack detection in cloud environment
    Rawashdeh, Adnan
    Alkasassbeh, Mouhammd
    Al-Hawawreh, Muna
    [J]. INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS IN TECHNOLOGY, 2018, 57 (04) : 312 - 324
  • [8] Collaborative anomaly-based attack detection
    Gamer, Thomas
    Scharf, Michael
    Schoeller, Marcus
    [J]. SELF-ORGANIZING SYSTEMS, PROCEEDINGS, 2007, 4725 : 280 - +
  • [9] An algorithm for anomaly-based botnet detection
    Binkley, James R.
    Singh, Suresh
    [J]. USENIX ASSOCIATION PROCEEDINGS OF THE 2ND WORKSHOP ON STEPS TO REDUCING UNWANTED TRAFFIC ON THE INTERNET, 2006, : 43 - +
  • [10] Benchmarking anomaly-based detection systems
    Maxion, RA
    Tan, KMC
    [J]. DSN 2000: INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2000, : 623 - 630