skip to main content
10.1145/1141277.1141361acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
Article

An anomaly-driven reverse proxy for web applications

Published:23 April 2006Publication History

ABSTRACT

Careless development of web-based applications results in vulnerable code being deployed and made available to the whole Internet, creating easily-exploitable entry points for the compromise of entire networks. To ameliorate this situation, we propose an approach that composes a web-based anomaly detection system with a reverse HTTP proxy. The approach is based on the assumption that a web site's content can be split into security sensitive and non-sensitive parts, which are distributed to different servers. The anomaly score of a web request is then used to route suspicious requests to copies of the web site that do not hold sensitive content. By doing this, it is possible to serve anomalous but benign requests that do not require access to sensitive information, sensibly reducing the impact of false positives. We developed a prototype of our approach and evaluated its applicability with respect to several existing web-based applications, showing that our approach is both feasible and effective.

References

  1. P. Akritidis, K. Anagnostakis, and E. Markatos. Efficient Content-Based Detection of Zero-Day Worms. In Proceedings of the International Conference on Communications (ICC), Seoul, Korea, May 2005.Google ScholarGoogle ScholarCross RefCross Ref
  2. M. Almgren, H. Debar, and M. Dacier. A lightweight tool for detecting web server attacks. In Proceedings of the ISOC Symposium on Network and Distributed Systems Security, San Diego, CA, February 2000.Google ScholarGoogle Scholar
  3. M. Almgren and U. Lindqvist. Application-Integrated Data Collection for Security Monitoring. In Proceedings of Recent Advances in Intrusion Detection (RAID), LNCS, pages 22--36, Davis, CA, October 2001. Springer. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. R. Andersson. punBB - fast and lightweight PHP-powered discussion board. http://www.punbb.org/, 2005.Google ScholarGoogle Scholar
  5. Breach Security. Breachgate. http://www.breach.com/, June 2005.Google ScholarGoogle Scholar
  6. S. Chen, J. Xu, and E. Sezer. Non-Control-Data Attacks Are Realistic Threats. In Proceedings of the USENIX Security Symposium, Baltimore, MD, August 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Common Vulnerabilities and Exposures. http://www.cve.mitre.org/, 2003.Google ScholarGoogle Scholar
  8. C. Kruegel and G. Vigna. Anomaly Detection of Web-based Attacks. In Proceedings of the 10thACM Conference on Computer and Communication Security (CCS '03), pages 251--261, Washington, DC, October 2003, ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. myBloggie - PHP and mySQL Blog/Weblog script. http://mybloggie.mywebland.com/, 2005.Google ScholarGoogle Scholar
  10. MySQL - The world's most popular open-source database. http://www.mysql.com/, 2005.Google ScholarGoogle Scholar
  11. PHP: Hypertext Preprocessor. http://www.php.net/, 2005.Google ScholarGoogle Scholar
  12. phPay - webshop or catalog based on SQL and PHP. http://phpay.sourceforge.net/, 2005.Google ScholarGoogle Scholar
  13. K. Poulsen. Tower records settles charges over hack attacks. http://www.securityfocus.com/news/8508, April 2004.Google ScholarGoogle Scholar
  14. M. Roesch. Snort - Lightweight Intrusion Detection for Networks. In Proceedings of the USENIX LISA '99 Conference, Seattle, WA, November 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. K. A. S. Sidiroglou, P. Akritidis, K. Xinidis, E. Markatos, and A. D. Keromytis. Detecting Targeted Attacks Using Shadow Honeypots. In Proceeding of the USENIX Security Symposium, Baltimore, MD, August 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. E. Tombini, H. Debar, L. Mé, and M. Ducassé. A Serial Combination of Anomaly and Misuse IDSes Applied to HTTP Traffic. In Proceedings of the Annual Computer Security Aapplications Cconference (ACSAC), Tucson, AZ, December 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. T. Toth and C. Kruegel. Accurate Buffer Overflow Detection Via Abstract Payload Execution. In Proceedings of the Symposium on Recent Advances in Intrusion Detection (RAID), Zurich, Switzerland, October 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Victoria's Secret Reveals Too Much. http://www.cbsnews.com/, October 2003.Google ScholarGoogle Scholar
  19. G. Vigna, W. Robertson, V. Kher, and R. Kemmerer. A Stateful Intrusion Detection System for World-Wide Web Servers. In Proceedings of the Annual Computer Security Applications Conference (ACSAC 2003), pages 34--43, Las Vegas, NV, December 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. An anomaly-driven reverse proxy for web applications

                Recommendations

                Comments

                Login options

                Check if you have access through your login credentials or your institution to get full access on this article.

                Sign in
                • Published in

                  cover image ACM Conferences
                  SAC '06: Proceedings of the 2006 ACM symposium on Applied computing
                  April 2006
                  1967 pages
                  ISBN:1595931082
                  DOI:10.1145/1141277

                  Copyright © 2006 ACM

                  Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                  Publisher

                  Association for Computing Machinery

                  New York, NY, United States

                  Publication History

                  • Published: 23 April 2006

                  Permissions

                  Request permissions about this article.

                  Request Permissions

                  Check for updates

                  Qualifiers

                  • Article

                  Acceptance Rates

                  Overall Acceptance Rate1,650of6,669submissions,25%

                PDF Format

                View or Download as a PDF file.

                PDF

                eReader

                View online with eReader.

                eReader