Intelligent On-Off Web Defacement Attacks and Random Monitoring-Based Detection Algorithms
Abstract
:1. Introduction
- We introduce a new intelligent on-off web defacement attack model that can completely avoid existing client-based detection methods using fixed periodic monitoring.
- We propose to use a random monitoring defense strategy against intelligent on-off web defacement attacks as a promising countermeasure, and conduct a simple probabilistic analysis that shows how random monitoring defense strategy can be effective in detecting such attacks.
- We devise two random monitoring algorithms, the Uniform Random Monitoring Algorithm (URMA) and the Attack Damage-based Random Monitoring Algorithm (ADRMA), against intelligent on-off web defacement attacks and provide extensive experiment results that show their detection performance by comparing with a fixed periodic monitoring algorithm (FPMA).
2. Related Works
3. Intelligent On-Off Web Defacement Attack
3.1. The Security Weakness of Client-Based Detection Methods with a Fixed Monitoring Cycle
Algorithm 1: Fixed Periodic Monitoring Algorithm (FPMA). | |
Input: | |
Number of slots: n | |
Current time: tcurrent | |
Start time of current monitoring round (MR): tMRstart | |
Fixed monitoring slot: msfixed | |
Output: | |
Detection result: detection_result | |
1: | begin |
2: | while (tMRstart ≤ tcurrent ≤ (tMRstart + n − 1)) : |
3: | if tcurrent == (tMRstart + msfixed − 1): |
4: | // monitor( ) checks if web pages are defaced |
5: | detection_result ← monitor() |
6: | else: |
7: | // monitor( ) is not performed |
8: | continue |
9: | end |
- AS1: Attacker can discover some security vulnerabilities of its target web server such as WS
- AS2: Defender (client-based web defacement monitoring system located outside WS) monitors web pages stored in WS periodically (every 10 seconds)
- AS3: Attacker can modify web pages in WS by AS1
- AS4: Attacker can figure out monitoring cycle c and previous monitoring slots at the time t
3.2. Attack model: Intelligent on-off web defacement attacks
- Attacker stores WPoriginal before defacing it;
- To avoid a monitoring slot, the attacker calculates (or estimates) the next monitoring slot msnext by a detection system based on current time tcurrent, monitoring cycle c, and previous monitoring slot msprevious;
- When tcurrent is not msnext, attacker defaces WP;
- When tcurrent is msnext, attacker does not deface WP; if the web page is already defaced, attacker replaces WPdefaced with WPoriginal to avoid being captured by defender.
Algorithm 2: Intelligent On-Off Web Defacement Attack | |
Input: | |
Current time: tcurrent | |
Previous monitoring time (slot): msprevious | |
Monitoring cycle (fixed): c | |
Original web page: WPoriginal | |
Defaced web page: WPdefaced | |
Output: | |
State of web page: WPstate | |
1: | begin |
2: | while (true): |
3: | if (tcurrent − msprevious) != c: |
4: | WPstate ← WPdefaced # attack mode is on |
5: | else: |
6: | WPstate ←WPoriginal # attack mode is off |
7: | end |
4. Random Monitoring-Based Defense Strategy and Two Detection Algorithms
4.1. Defense Strategy: Random Monitoring
- n: the size of monitoring round (MR) or the size of the monitoring cycle; thus, n is the number of slots that consist of one MR. Each slot in MR can be identified by an index such as s1, s2, …, si, …, sn. As we explained in Section 3.1, n can vary depending on the performance of defense systems. Given n, detection system can monitor only once at sj where .
- SDS: A finite set of all possible slots from which the defender chooses one slot during one MR; Thus, given n, SDS = {s1, s2, …, sn} and the cardinality of SDS (|SDS|) = n.
- SAS: A finite set of all possible combinations of slots from which the attacker chooses one or more slots for launching defacement attacks during one MR. Thus, given n, SAS = {s1, s2, …, sn, (s1, s2), (s2, s3), …, (sn-1, sn), …, (s1, s2, …, sn)} and |SAS| = 2n – 1; SAS = the power set of SDS - null set ∅.
- Random variable X: slots that the attacker chooses
- Random variable Y: one slot that the defender chooses
- Let P [X = si+] be the probability that X contains si.
4.2. Design of Two Detection Abased on Random Monitoring Strategy
4.2.1. Uniform Random Monitoring Algorithm (URMA)
Algorithm 3: Uniform Random Monitoring Algorithm (URMA) | |
Input: | |
Number of slots: n | |
Current time: tcurrent | |
Start time of current MR: tMRstart | |
Output: | |
Detection result: detection_result | |
1: | begin |
2: | if tcurrent == tMRstart − 1: |
3: | ms ← choose one slot for detection slot |
4: | according to uniform (1, n) |
5: | while (tMRstart ≤ tcurrent ≤ (tMRstart + n − 1)): |
6: | if tcurrent == (tMRstart + ms − 1): |
7: | // monitor( ) checks if web pages are defaced |
8: | detection_result ← monitor( ) |
9: | else: |
10: | // monitor( ) is not performed |
11: | continue |
12: | end |
4.2.2. Attack Damage-Based Random Monitoring Algorithm (ADRMA)
- SDS = {1, 2, 3}
- SAS = all subsets of SDS – null set ∅ = {1, 2, 3, (1, 2), (1, 3), (2, 3), (1, 2, 3)}.
Algorithm 4: Attack Damage-Based Random Monitoring Algorithm (ADRMA) | |
Input: | |
Number of slots: n | |
Current time: tcurrent | |
Start time of current MR: tMRstart | |
Output: | |
Attack damage DA | |
Defense slot ds | |
Detection result: detection_result | |
1: | begin |
2: | // Step 1: Calculate DAttack to choose a defense slot |
3: | for each d in [1, n]: |
4: | if d == 1: |
5: | DAttack(d) = |
6: | if 2 ≤ d < n: |
7: | DAttack(d) = |
8: | if d == n: |
9: | DAttack (d) = |
10: | // Step 2: Choose a defense slot and Monitor |
11: | ds ← choose one slot randomly by using DAttack (d) |
12: | such that a slot with lower will be |
13: | more likely chosen as a defense slot than a slot |
14: | with higher . |
15: | while (tMRstart ≤ tcurrent ≤ tMRstart + ): |
16: | if tcurrent == (tMRstart + ds 1): |
17: | // monitor( ) checks if web pages are defaced |
18: | detection_result ← monitor( ) |
19: | else: |
20: | // monitor( ) is not performed |
21: | continue |
22: | end |
5. Experiment Results
5.1. Experimental Objectives and Methods
5.1.1. Purpose of Experiments
5.1.2. Three Intelligent On-Off Attack Models
- AM1 (most aggressive): In this attack model, we assume that the attacker knows how FPMA operates but does not have any knowledge about our random-monitoring algorithms. In AM3, the attacker is very aggressive such that it tries to deface all slots except the first slot of each MR monitored by FPMA.
- AM2 (moderately aggressive): In this attack model, we assume that the attacker knows not only FPMA but also the existence of our random-monitoring algorithms. Unlike AM1, the attacker in AM2 does not attack all safe slots. Instead, the attack tries to deface one or more slots randomly until he/she is detected. Specifically, the attacker will decide whether it deface each slot according to attack rate RA. For example, if attack rate RA = 80%, the attacker will launch defacement attack at each slot with the probability = 0.8. Thus, the higher RA is, the more aggressively the attacker defaces. In our experiment, we used RA = 80%, 60% and 40%.
- AM3 (least aggressive): Like AM2, we assume that the attacker knows not only FPMA but also the existence of our random-monitoring algorithms. Unlike AM2, the attacker in AM3 randomly chooses only one slot for each MR until he/she is detected by our random monitoring algorithms as the following. Assuming that the size of MR = n and slot 1 is the monitoring slot by FPMA, slot i will be more likely chosen by the attacker than slot j where i ≥ j and 2≤ i, j ≤ n. This attack model is designed by considering that the attacker may think that slot 2 just after slot 1 is the most safe slot for launching defacement attacks because slot 2 is the most distant slot to the next monitoring slot (slot 1 + n) while slot n is the most dangerous slot at which the attacker may be detected by FPMA.
5.1.3. Experimental Methods and Metrics
5.2. Experiment Results and Analysis
6. Conclusions and Future Works
Funding
Acknowledgments
Conflicts of Interest
Appendix A.
References
- Zone-H.org. Available online: http://www.zone-h.org/stats/ymd/ (accessed on 15 April 2019).
- Banff Cyber Technologies. Defacement, B.I.o.W. Available online: https://www.banffcyber.com/knowledge-base/articles/business-implications-web-defacement/ (accessed on 20 January 2019).
- Bartoli, A.; Davanzo, G.; Medvet, E. The Reaction Time to Web Site Defacements. Internet Comput. 2009, 13, 52–58. [Google Scholar] [CrossRef]
- Davanzo, G.; Medvet, E.; Bartoli, A. Anomaly Detection Technique for a Web Defacement Monitoring Service. Expert Syst. Appl. 2011, 38, 12521–12530. [Google Scholar] [CrossRef]
- Kim, G.H.; Spafford, E.H. Design and Implementation of Tripwire: A File System Integrity Checker. In Proceedings of the 2nd ACM Conference on Computer and Communications Security, Fairfax, VA, USA, 19 November 1993; pp. 18–29. [Google Scholar]
- Ganger, A.P.; Pennington, A.G.; Strunk, J.D.; Griffin, J.L.; Soules, C.A.N.; Goodson, G.R.; Ganger, G.R. Storage-based Intrusion Detection: Watching Storage Activity for Suspicious Behavior. In Proceedings of the 12th USENIX Security Symposium, Washington, DC, USA, 4–8 Auguest 2003; pp. 1–15. [Google Scholar]
- Kim, K.; Choi, S.-S.; Park, H.-S.; Ko, S.-J.; Song, J.-S. Website Falsification Detection System Based on Image and Code Analysis for Enhanced Security Monitoring and Response. J. Korea Inst. Inf. Secur. Cryptol. 2014, 24, 871–883. [Google Scholar] [CrossRef]
- Medvet, E.; Bartoli, A. On the Effects of Learning Set Corruption in Anomaly-Based Detection of Web Defacements. In Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), Lucerne, Switzerland, 12 July 2007; Springer: Berlin/Heidelberg, Germany, 2007; pp. 65–78. [Google Scholar]
- Kim, W.; Joo, M.; Lee, E.; Lee, D.; Park, E.; Kim, S. N-gram-based dynamic web page defacement validation. In Proceedings of the Information Security Applications, 5th International Workshop, WISA 2004, Jeju Island, Korea, 23–25 August 2004. [Google Scholar]
- Borgolte, K.; Kruegel, C.; Vigna, G. Meerkat: Detecting Website Defacements through Image-based Object Recognition. In Proceedings of the 24th USENIX Conference on Security Symposium, Washington, DC, USA, 12–14 August 2015; pp. 595–610. [Google Scholar]
- Park, H.; Cho, Y. CREMS: Client-based Real-time wEb defacement Monitoring and detection System. In Proceedings of the Conference on Information Security and Cryptography-Summer (CSIC-S), Asan, Korea, 3–5 June 2017; pp. 657–658. [Google Scholar]
- Medvet, E.; Fillon, C.; Bartoli, A. Detection of Web Defacements by means of Genetic Programming. In Proceedings of the IEEE International Symposium on Information Assurance and Security, Manchester, UK, 29–31 August 2007; pp. 227–234. [Google Scholar]
- Masango, M.; Francois, M.; Palesa, A.; Bokang, M. Web Defacement and Intrusion Monitoring Tool: WDIMT. In Proceedings of the International Conference on Cyberworlds, Chester, UK, 20–22 September 2017; pp. 72–79. [Google Scholar]
- Kals, S.; Kirda, E.; Kruegel, C.; Jovanovic, N. Secubat: A Web Vulnerability Scanner. In Proceedings of the International Conference on World Wide Web, Edinburgh, Scotland, 23–26 May 2006; pp. 247–256. [Google Scholar]
- Kanti, T.; Richariya, V. Implementing a web browser with web defacement detection techniques. World Comput. Sci. Inf. Technol. J. 2011, 1, 307–310. [Google Scholar]
- Bartoli, A.; Davanzo, G.; Medvet, E. A Framework for Large-Scale Detection of Web Site Defacements. ACM Trans. Internet Technol. 2010, 10, 10–37. [Google Scholar] [CrossRef]
- Bartoli, A.; Medvet, E. Automatic Integrity Checks for Remote Web Resources. IEEE Internet Comput. 2006, 10, 56–62. [Google Scholar] [CrossRef]
- Hoang, X.D.; Nguyen, N.T. Detecting Website Defacements Based on Machine Learning Techniques and Attack Signatures. Computers 2019, 8, 35. [Google Scholar] [CrossRef]
- Kim, W.; Lee, J.; Park, E.; Kim, S. Advanced Mechanism for Reducing False Alarm Rate in Web Page Defacement Detection. In Proceedings of the International Workshop on Information Security Applications (WISA), Jeju Island, Korea, 28–30 August 2006. [Google Scholar]
- Bergadano, F.; Carretto, F.; Cogno, F.; Ragno, D. Defacement Detection with Passive Adversaries. Algorithms 2019, 12, 150. [Google Scholar] [CrossRef]
- WebOrion Defacement Monitor. Available online: https://www.banffcyber.com/weborion-defacement-monitor/ (accessed on 23 August 2019).
- Julianto, S.M.; Munir, R. Intrusion detection against unauthorized file modification by integrity checking and recovery with HW/SW platforms using programmable system-on-chip (SoC). In Proceedings of the International Conference on Information and Communications Technology (ICOIACT), Yogyakarta, Indonesia, 6–8 March 2018; pp. 174–179. [Google Scholar]
- Shi, B.; Li, B.; Cui, L.; Ouyang, L. Vanguard: A Cache-Level Sensitive File Integrity Monitoring System in Virtual Machine Environment. IEEE Access 2018, 6, 38567–38577. [Google Scholar] [CrossRef]
- Smith, C.L. AIDE-Advanced Intrusion Detection Environment; Pacific Northwest Nat. Lab.: Richland, WA, USA, 2013. [Google Scholar]
- Li, S.; Xiao, L.; Qin, G.; Ruan, L.; Su, S. COW-IMM A Novel Integrity Measurement Method Based on Copy-on-Write for File in Virtual Machine. IEEE Access 2018, 6, 51776–51790. [Google Scholar] [CrossRef]
- Qiang, W.; Yang, J.; Jin, H.; Shi, X. PrivGuard: Protecting Sensitive Kernel Data From Privilege Escalation Attacks. IEEE Access 2018, 6, 46584–46594. [Google Scholar] [CrossRef]
- O’Leary, M. Privilege Escalation in Linux. In Cyber Operations; Apress: Berkeley, CA, USA, 2019; pp. 419–453. [Google Scholar]
- Moisan, F.; Gonzalez, C. Security under Uncertainty: Adaptive Attackers Are More Challenging to Human Defenders than Random Attackers. Front. Psychol. 2017, 8, 982. [Google Scholar] [CrossRef] [PubMed]
- Nguyen, T.H.; Kar, D.; Brown, M.; Sinha, A.; Jiang, A.X.; Tambe, M. Towards a Science of Security Games. In Mathematics & Statistics; Springer: Berlin/Heidelberg, Germany, 2016; Volume 6. [Google Scholar]
- També, M. Security and Game Theory: Algorithms, Deployed Systems, Lessons Learned; Cambridge University: Cambridge, UK, 2011. [Google Scholar]
- Zhang, H.; Zheng, K.; Wang, X.; Lou, S.; Wu, B. Efficient Strategy Selection for Moving Target Defense Under Multiple Attacks. IEEE Access 2019, 7, 65982–65995. [Google Scholar] [CrossRef]
- Connell, W.; Menasce, D.A.; Albanese, M. Performance Modeling of Moving Target Defenses with Reconfiguration Limits. IEEE Trans. Dependable Secur. Comput. 2018, 99, 1. [Google Scholar] [CrossRef]
- Lei, C.; Ma, D.-H.; Zhang, H.-Q. Optimal Strategy Selection for Moving Target Defense Based on Markov Game. IEEE Access 2017, 5, 156–169. [Google Scholar] [CrossRef]
- Sharma, D.P.; Cho, J.-H.; Moore, T.J.; Nelson, F.F.; Lim, H.; Kim, D.S. Random Host and Service Multiplexing for Moving Target Defense in Software-Defined Networks. In Proceedings of the IEEE International Conference on Communications (ICC), Shanghai, China, 26–28 May 2019. [Google Scholar]
- Lim, K.; Tuladhar, K.M.; Kim, H. Detecting Location Spoofing using ADAS sensors in VANETs. In Proceedings of the IEEE Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 11–14 January 2019. [Google Scholar]
- Kim, H.; Ben-Othman, J. A Collision-free Surveillance System using Smart UAVs in Multi Domain IoT. IEEE Commun. Lett. 2018, 22, 2587–2590. [Google Scholar] [CrossRef]
- Khraisat, A.; Gondal, I.; Vamplew, P.; Kamruzzaman, J.; Alazab, A. A Novel Ensemble of Hybrid Intrusion Detection System for Detecting Internet of Things Attacks. Electronics 2019, 8, 1210. [Google Scholar] [CrossRef] [Green Version]
d | SAS(i) | DAttack(d) | |||||||
---|---|---|---|---|---|---|---|---|---|
SAS(1) | SAS(2) | SAS(3) | SAS(4) | SAS(5) | SAS(6) | SAS(7) | |||
1 | 2 | 3 | (1,2) | (1,3) | (2,3) | (1,2,3) | ∑ | ratio | |
1 | 0 | 1 | 1 | 0 | 0 | 2 | 0 | 4 | 2 |
2 | 1 | 0 | 1 | 1 | 2 | 0 | 1 | 6 | 3 |
3 | 1 | 1 | 0 | 2 | 1 | 1 | 2 | 8 | 4 |
Size of Monitoring Round |MR| | |MR| = 5 | |MR| = 10 | |||||
---|---|---|---|---|---|---|---|
Attack Models | Metrics | FPMA | Proposed Algorithms | FPMA | Proposed Algorithms | ||
URMA | ADRMA | URMA | ADRMA | ||||
AM1 | Elapsed MR (NMR) | Not detected | 1 | 1 | Not detected | 1 | 1 |
Elapsed Slots (NES) | Not detected | 3.5 | 3.31 | Not detected | 6.05 | 5.48 | |
Defaced Slots (NDS) | 400 | 1.5 | 1.31 | 900 | 4.05 | 3.48 | |
AM2 (RA = 80) | Elapsed MR (NMR) | Not detected | 1.25 | 1.24 | Not detected | 1.24 | 1.24 |
Elapsed Slots (NES) | Not detected | 4.73 | 4.5 | Not detected | 8.38 | 8.38 | |
Defaced Slots (NDS) | 323.24 | 1.8 | 1.63 | 727.57 | 4.76 | 4.37 | |
AM2 (RA = 60) | Elapsed MR (NMR) | Not detected | 1.64 | 1.63 | Not detected | 1.63 | 1.64 |
Elapsed Slots (NES) | Not detected | 6.66 | 6.46 | Not detected | 12.23 | 12.01 | |
Defaced Slots (NDS) | 244.75 | 2.08 | 1.98 | 545.57 | 5.43 | 5.3 | |
AM2 (RA = 40) | Elapsed MR (NMR) | Not detected | 2.27 | 2.31 | Not detected | 2.47 | 2.46 |
Elapsed Slots (NES) | Not detected | 9.84 | 9.85 | Not detected | 20.72 | 20.11 | |
Defaced Slots (NDS) | 174.29 | 2.38 | 2.37 | 364.36 | 6.38 | 6.12 | |
AM2 (RA = 20) | Elapsed MR (NMR) | Not detected | 3.31 | 3.34 | Not detected | 4.61 | 4.64 |
Elapsed Slots (NES) | Not detected | 15.03 | 15 | Not detected | 42.07 | 41.86 | |
Defaced Slots (NDS) | 121.34 | 2.81 | 2.83 | 195.16 | 7.2 | 7.19 | |
AM3 | Elapsed MR (NMR) | Not detected | 3.91 | 3.69 | Not detected | 8.9 | 8.6 |
Elapsed Slots (NES) | Not detected | 17.55 | 16.27 | Not detected | 84.34 | 80.91 | |
Defaced Slots (NDS) | 100 | 2.91 | 2.69 | 100 | 7.9 | 7.6 |
© 2019 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Cho, Y. Intelligent On-Off Web Defacement Attacks and Random Monitoring-Based Detection Algorithms. Electronics 2019, 8, 1338. https://doi.org/10.3390/electronics8111338
Cho Y. Intelligent On-Off Web Defacement Attacks and Random Monitoring-Based Detection Algorithms. Electronics. 2019; 8(11):1338. https://doi.org/10.3390/electronics8111338
Chicago/Turabian StyleCho, Youngho. 2019. "Intelligent On-Off Web Defacement Attacks and Random Monitoring-Based Detection Algorithms" Electronics 8, no. 11: 1338. https://doi.org/10.3390/electronics8111338
APA StyleCho, Y. (2019). Intelligent On-Off Web Defacement Attacks and Random Monitoring-Based Detection Algorithms. Electronics, 8(11), 1338. https://doi.org/10.3390/electronics8111338