BLOCK: A Black-box Approach for Detection of State Violation Attacks Towards Web Applications

被引:0
|
作者
Li, Xiaowei [1 ]
Xue, Yuan [1 ]
机构
[1] Vanderbilt Univ, Dept Elect Engn & Comp Sci, 221 Kirkland Hall, Nashville, TN 37235 USA
关键词
black-box approach; state violation attack; web application security; invariant;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
State violation attacks towards web applications exploit logic flaws and allow restrictive functions and sensitive information to be accessed at inappropriate states. Since application logic flaws are specific to the intended functionality of a particular web application, it is difficult to develop a general approach that addresses state violation attacks. To date, existing approaches all require web application source code for analysis or instrumentation in order to detect state violations. In this paper, we present BLOCK, a BLack-bOx approach for detecting state violation attaCKs. We regard the web application as a stateless system and infer the intended web application behavior model by observing the interactions between the clients and the web application. We extract a set of invariants from the web request/response sequences and their associated session variable values during its attack-free execution. The set of invariants is then used for evaluating web requests and responses at runtime. Any web request or response that violates the associated invariants is identified as a potential state violation attack. We develop a system prototype based on the WebScarab proxy and evaluate our detection system using a set of real-world web applications. The experiment results demonstrate that our approach is effective at detecting state violation attacks and incurs acceptable performance overhead. Our approach is valuable in that it is independent of the web application source code and can easily scale up.
引用
收藏
页码:247 / 256
页数:10
相关论文
共 50 条
  • [31] Adversarial Black-Box Attacks Against Network Intrusion Detection Systems: A Survey
    Alatwi, Huda Ali
    Aldweesh, Amjad
    2021 IEEE WORLD AI IOT CONGRESS (AIIOT), 2021, : 34 - 40
  • [32] Mitigation of Black-Box Attacks on Intrusion Detection Systems-Based ML
    Alahmed, Shahad
    Alasad, Qutaiba
    Hammood, Maytham M.
    Yuan, Jiann-Shiun
    Alawad, Mohammed
    COMPUTERS, 2022, 11 (07)
  • [33] KENKU: Towards Efficient and Stealthy Black-box Adversarial Attacks against ASR Systems
    Wu, Xinghui
    Ma, Shiqing
    Shen, Chao
    Lin, Chenhao
    Wang, Qian
    Li, Qi
    Rao, Yuan
    PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 247 - 264
  • [34] Contention Detection by Throttling: a Black-box On-line Approach
    Vallone, Joel
    Birke, Robert
    Chen, Lydia Y.
    Falsafi, Babak
    2015 IEEE 23RD INTERNATIONAL SYMPOSIUM ON QUALITY OF SERVICE (IWQOS), 2015, : 237 - 242
  • [35] Black-box Adversarial Attacks on Video Recognition Models
    Jiang, Linxi
    Ma, Xingjun
    Chen, Shaoxiang
    Bailey, James
    Jiang, Yu-Gang
    PROCEEDINGS OF THE 27TH ACM INTERNATIONAL CONFERENCE ON MULTIMEDIA (MM'19), 2019, : 864 - 872
  • [36] Black-box Adversarial Attacks in Autonomous Vehicle Technology
    Kumar, K. Naveen
    Vishnu, C.
    Mitra, Reshmi
    Mohan, C. Krishna
    2020 IEEE APPLIED IMAGERY PATTERN RECOGNITION WORKSHOP (AIPR): TRUSTED COMPUTING, PRIVACY, AND SECURING MULTIMEDIA, 2020,
  • [37] AdvMind: Inferring Adversary Intent of Black-Box Attacks
    Pang, Ren
    Zhang, Xinyang
    Ji, Shouling
    Luo, Xiapu
    Wang, Ting
    KDD '20: PROCEEDINGS OF THE 26TH ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY & DATA MINING, 2020, : 1899 - 1907
  • [38] GeoDA: a geometric framework for black-box adversarial attacks
    Rahmati, Ali
    Moosavi-Dezfooli, Seyed-Mohsen
    Frossard, Pascal
    Dai, Huaiyu
    2020 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2020), 2020, : 8443 - 8452
  • [39] Black-box adversarial attacks by manipulating image attributes
    Wei, Xingxing
    Guo, Ying
    Li, Bo
    INFORMATION SCIENCES, 2021, 550 : 285 - 296
  • [40] Physical Black-Box Adversarial Attacks Through Transformations
    Jiang, Wenbo
    Li, Hongwei
    Xu, Guowen
    Zhang, Tianwei
    Lu, Rongxing
    IEEE TRANSACTIONS ON BIG DATA, 2023, 9 (03) : 964 - 974