Intelligent On-Off Web Defacement Attacks and Random Monitoring-Based Detection Algorithms

被引:3
|
作者
Cho, Youngho [1 ]
机构
[1] Korea Natl Def Univ, Grad Sch Natl Def Management, Dept Comp Engn, Nonsan 33021, South Korea
关键词
web defacement attack; on-off strategy; random monitoring algorithm; web security;
D O I
10.3390/electronics8111338
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent cyberattacks armed with various ICT (information and communication technology) techniques are becoming advanced, sophisticated and intelligent. In security research field and practice, it is a common and reasonable assumption that attackers are intelligent enough to discover security vulnerabilities of security defense mechanisms and thus avoid the defense systems' detection and prevention activities. Web defacement attacks refer to a series of attacks that illegally modify web pages for malicious purposes, and are one of the serious ongoing cyber threats that occur globally. Detection methods against such attacks can be classified into either server-based approaches or client-based approaches, and there are pros and cons for each approach. From our extensive survey on existing client-based defense methods, we found a critical security vulnerability which can be exploited by intelligent attackers. In this paper, we report the security vulnerability in existing client-based detection methods with a fixed monitoring cycle and present novel intelligent on-off web defacement attacks exploiting such vulnerability. Next, we propose to use a random monitoring strategy as a promising countermeasure against such attacks, and design two random monitoring defense algorithms: (1) Uniform Random Monitoring Algorithm (URMA), and (2) Attack Damage-Based Random Monitoring Algorithm (ADRMA). In addition, we present extensive experiment results to validate our idea and show the detection performance of our random monitoring algorithms. According to our experiment results, our random monitoring detection algorithms can quickly detect various intelligent web defacement on-off attacks (AM1, AM2, and AM3), and thus do not allow huge attack damage in terms of the number of defaced slots when compared with an existing fixed periodic monitoring algorithm (FPMA).
引用
收藏
页数:19
相关论文
共 50 条
  • [1] Anomaly detection techniques for a web defacement monitoring service
    Davanzo, G.
    Medvet, E.
    Bartoli, A.
    EXPERT SYSTEMS WITH APPLICATIONS, 2011, 38 (10) : 12521 - 12530
  • [2] The Detection of On-Off Attacks for the Internet of Things Objects
    Suryani, Vera
    Sulistyo, Selo
    Widyawan
    2018 INTERNATIONAL CONFERENCE ON CONTROL, ELECTRONICS, RENEWABLE ENERGY AND COMMUNICATIONS (ICCEREC), 2018, : 1 - 5
  • [3] RANDOM SAMPLING APPROACH TO DETECTION OF ON-OFF KEYING
    COLLMEYER, AJ
    IEEE TRANSACTIONS ON COMMUNICATION TECHNOLOGY, 1970, CO18 (05): : 679 - +
  • [4] Variational Bayes Based Multiuser Detection for On-Off Random Access Channels
    Jodha, Rituraj Singh
    Ray, Priyadip
    WIRELESS PERSONAL COMMUNICATIONS, 2018, 100 (03) : 895 - 906
  • [5] Intelligent monitoring-based safety system of massage robot
    Hu Ning
    Li Chang-sheng
    Wang Li-feng
    Hu Lei
    Xu Xiao-jun
    Zou Yun-peng
    Hu Yue
    Shen Chen
    JOURNAL OF CENTRAL SOUTH UNIVERSITY, 2016, 23 (10) : 2647 - 2658
  • [6] Intelligent monitoring-based safety system of massage robot
    胡宁
    李长胜
    王利峰
    胡磊
    徐晓军
    邹雲鹏
    胡玥
    沈晨
    Journal of Central South University, 2016, 23 (10) : 2647 - 2658
  • [7] Intelligent monitoring-based safety system of massage robot
    Ning Hu
    Chang-sheng Li
    Li-feng Wang
    Lei Hu
    Xiao-jun Xu
    Yun-peng Zou
    Yue Hu
    Chen Shen
    Journal of Central South University, 2016, 23 : 2647 - 2658
  • [8] A Sparsity Detection Framework for On-Off Random Access Channels
    Fletcher, Alyson K.
    Rangan, Sundeep
    Goyal, Vivek K.
    2009 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1- 4, 2009, : 169 - +
  • [9] SOOA: Exploring Special On-Off Attacks on Challenge-Based Collaborative Intrusion Detection Networks
    Li, Wenjuan
    Meng, Weizhi
    Kwok, Lam-For
    GREEN, PERVASIVE, AND CLOUD COMPUTING (GPC 2017), 2017, 10232 : 402 - 415
  • [10] Investigating the Influence of Special On-Off Attacks on Challenge-Based Collaborative Intrusion Detection Networks
    Li, Wenjuan
    Meng, Weizhi
    Kwok, Lam For
    FUTURE INTERNET, 2018, 10 (01):