Web-platform security guide: Security assessment of the Web ecosystem
نویسندگان
چکیده
In this document, we report on the Web-platform security guide, which has been developed within the EC-FP7 project STREWS. Based on their research, the STREWS consortium argues that in order to strengthening the Internet (e.g. against pervasive monitoring), it is crucial to also strengthen the web application ecosystem, the de-facto Internet application platform. The Web security guide is the result of a broad security assessment of the current situation on the Web1. It looks at the Web ecosystem and provides a timely and comprehensive web security overview. It was written by the STREWS Consortium, that brings together a unique set of expertise in Europe to grasp the complexity of the Web platform and its security characteristics. It is unique because it brings together strong peers in academic web security research in Europe, a large European software vendor, and principal actors in standardisation activities in W3C and IETF, the predominant specification developing organisations for the Web. The Web platform security guide consists of four parts, and looks as follows: 1) The first part gives a comprehensive overview of the current Web and the expected developments in the near future. 2) Based on the understanding of the Web ecosystem in the first part, the second part captures the breadth and complexity of the Web security vulnerability landscape. It describes the Web assets that are worth attacking and lists the capabilities attackers may have at their disposition and discusses the commonly-used attacker models. 3) In the third part, the twenty most representative attack techniques are discussed and analyzed, grouped in seven high-level threat categories. The guide presents and discusses the latest state-of-theart, both from a research perspective as well as from a standardization perspective. Moreover, the guide provides a catalogue of best practices designed to mitigate the threats discussed, and to gradually improve the trustworthiness of web-enabled services. 4) Part four gives the full Web security threat landscape as an overview, indicates upcoming challenges resulting from the change of the web ecosystem and hints at some interesting opportunities for future research. In the following paragraphs, we briefly highlight the most important contributions and key takeaways for each part. 1The Web-platform security guide can freely be downloaded at http://www. strews.eu/results/5-web-platform-security-guide PART I: FOUNDATIONS OF THE WEB PLATFORM In the first part of the guide, we briefly recap and discuss the foundations of the Web ecosystem. The goal of this first part is to provide the reader with a basic understanding of the Web ecosystem, needed to understand the security assessment. Over the last 25 years, the Web ecosystem went through a series of technological waves (as depicted in Figure 1), enriching the platform to the current level where it provides an attractive alternative to stand-alone applications (or even replacing the operating system itself). Evolutions in the Web platform include richer presentation capabilities (e.g., graphics, style sheets and multimedia tags), client-side state (cookies and storage), client-side interactivity (JavaScript, the DOM and a rich set of JavaScript APIs), as well as rich Internet Applications (such as Flash, ActiveX and Silverlight). User (Browser) Web Server HTTP Transfer protocol
منابع مشابه
Image flip CAPTCHA
The massive and automated access to Web resources through robots has made it essential for Web service providers to make some conclusion about whether the "user" is a human or a robot. A Human Interaction Proof (HIP) like Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) offers a way to make such a distinction. CAPTCHA is a reverse Turing test used by Web serv...
متن کاملامنیت اطلاعات سامانه های تحت وب نهاد کتابخانه های عمومی کشور
Purpose: This paper aims to evaluate the security of web-based information systems of Iran Public Libraries Foundation (IPLF). Methodology: Survey method was used as a method for implementation. The tool for data collection was a questionnaire, based on the standard ISO/IEC 27002, that has the eleven indicators and 79 sub-criteria, which examines security of web-based information systems of IP...
متن کاملAnalyzing new features of infected web content in detection of malicious web pages
Recent improvements in web standards and technologies enable the attackers to hide and obfuscate infectious codes with new methods and thus escaping the security filters. In this paper, we study the application of machine learning techniques in detecting malicious web pages. In order to detect malicious web pages, we propose and analyze a novel set of features including HTML, JavaScript (jQuery...
متن کاملBringing P2P to the web: security and privacy in the firecoral network
Peer-to-peer systems have been a disruptive technology for enabling large-scale Internet content distribution. Yet web browsers, today’s dominant application platform, seem inherently based on the client/server communication model. This paper presents the design of Firecoral, a browserbased extension platform that enables the peer-to-peer exchange of web content in a secure, flexible manner. Fi...
متن کاملDetecting Bot Networks Based On HTTP And TLS Traffic Analysis
Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer to use the web as a communication environment to launch application layer attacks and secretly enga...
متن کامل