Learning DFA representations of HTTP for protecting web applications

نویسندگان

  • Kenneth L. Ingham
  • Anil Somayaji
  • John Burge
  • Stephanie Forrest
چکیده

Intrusion detection is a key technology for self-healing systems designed to prevent or manage damage caused by security threats. Protecting web server-based applications using intrusion detection is challenging, especially when autonomy is required (i.e., without signature updates or extensive administrative overhead). Web applications are difficult to protect because they are large, complex, highly customized, and often created by programmers with little security background. Anomaly-based intrusion detection has been proposed as a strategy to meet these requirements. This paper describes how DFA (Deterministic Finite Automata) induction can be used to detect malicious web requests. The method is used in combination with rules for reducing variability among requests and heuristics for filtering and grouping anomalies. With this setup a wide variety of attacks is detectable with few false-positives, even when the system is trained on data containing benign attacks (e.g., attacks that fail against properly patched servers). 2006 Elsevier B.V. All rights reserved.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Memento: A Framework for Hardening Web Applications

We propose a generic framework called Memento for systematically hardening web applications. Memento models a web application’s behavior using a deterministic finite automata (DFA), where each server-side script is a state, and state transitions are triggered by HTTP requests. We use this DFA to defend against cross-site request forgery (CSRF) and crosssite-scripting (XSS) attacks. The client w...

متن کامل

Application level load balancing in a web switch or security oriented filtering based on the content signatures for deep packet inspection and delayed input DFA

There is a growing demand for network devices capable of examining the content of the Data packet in order to improve the network security and provide application specific services. Most high performance systems that perform deep packet inspection implement simple string matching algorithms to match packets against a large but finite set of strings .However there is a growing interest in using ...

متن کامل

Protecting a Moving Target: Addressing Web Application Concept Drift

Because of the ad hoc nature of web applications, intrusion detection systems that leverage machine learning techniques are particularly well-suited for protecting websites. The reason is that these systems are able to characterize the applications’ normal behavior in an automated fashion. However, anomaly-based detectors for web applications suffer from false positives that are generated whene...

متن کامل

ARC: Protecting against HTTP Parameter Pollution Attacks Using Application Request Caches

HTTP Parameter Pollution (HPP) vulnerabilities allow attackers to exploit web applications by manipulating the query parameters of the requested URLs. In this paper, we present Application Request Cache (ARC), a framework for protecting web applications against HPP exploitation. ARC hosts all benign URL schemas, which act as generators of the complete functional set of URLs that compose the app...

متن کامل

Impact of Using Web-quests on Learning Vocabulary by Iranian Pre-university Students

Web-quests are internet-based technology applications in which groups of students follow a specific set of steps toward the completion of a final project on a specific subject or a multi-disciplinary subject. The present study aimed to investigate the impacts of using web-quests on learning vocabulary by Iranian pre-university students. The sample of the study consisted of 72 students assigned ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computer Networks

دوره 51  شماره 

صفحات  -

تاریخ انتشار 2007