NAISS: A reverse proxy approach to mitigate MageCart's e-skimmers in e-commerce

被引:1
作者
Rus, Adrian-Catalin [1 ]
El-Hajj, Mohammed [1 ]
Sarmah, Dipti Kapoor [1 ]
机构
[1] Univ Twente, Dept Semant Cybersecur & Serv, Drienerlolaan 5, NL-7522 NB Enschede, Netherlands
关键词
Image steganography; E-skimmers; MageCart; Digital signatures; Network filter; E-commerce; Elliptic curve cryptography; WEB APPLICATIONS; SECURITY;
D O I
10.1016/j.cose.2024.103797
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rise of payment details theft has led to increasing concerns regarding the security of e-commerce platforms. For the MageCart threat family, the attacks employ e-skimmers, which are pieces of software code that instruct clients to forward payment details to an attacker-controlled server. They can be injected into hosting providers' servers as HTML tags such as script, iframe, and img. By leveraging image steganography - the technique of hiding structured information inside images without visual perturbances - MageCart groups can deliver eskimmers without raising suspicion. In this work, we systematically review applicable solutions in the literature and evaluate their drawbacks in the setting of a compromised hosting provider. While promising, existing solutions in the literature present shortcomings such as a lack of compatibility, adaptability, or functionality in the presence of an attacker. Based on this review, we compile a set of features for a better solution, which we use as a foundation for designing our proposed solution - NAISS: Network Authentication of Images to Stop e-Skimmers. Through our solution, digital signatures of individual images are checked inside a serverside middlebox residing in the hosting provider's network to prevent the transmission of unauthorized images to clients. Elliptic curve signatures are provided by the e-commerce platform developer prior to uploading a website to the hosting provider. Our proof-of-concept implementation shows that NAISS is capable of filtering 100% of present stegoimages, regardless of their novelty, while imposing a minimal performance detriment and no client-side modifications.
引用
收藏
页数:26
相关论文
共 105 条
[1]  
Adalier M., 2015, WORKSHOP ELLIPTIC CU, V66, P2014
[2]  
Zhang KA, 2019, Arxiv, DOI arXiv:1901.03892
[3]  
Alghathian G.A., 2021, Lawyer Quart, V11
[4]   An effective detection approach for phishing websites using URL and HTML']HTML features [J].
Aljofey, Ali ;
Jiang, Qingshan ;
Rasool, Abdur ;
Chen, Hui ;
Liu, Wenyin ;
Qu, Qiang ;
Wang, Yang .
SCIENTIFIC REPORTS, 2022, 12 (01)
[5]  
Almasi S., 2020, Protecting users from compromised browsers and form grabbers
[6]  
Alzoubi H., 2022, International Journal of Data and Network Science, V6, P1369, DOI DOI 10.5267/J.IJDNS.2022.5.014
[7]  
[Anonymous], 2012, PIK Prax. Inf.verarb. Kommun.
[8]  
Atkinson B., 2002, Specification
[9]   Security testing of web applications: A systematic mapping of the literature [J].
Aydos, Murat ;
Aldan, Cigdem ;
Coskun, Evren ;
Soydan, Alperen .
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (09) :6775-6792
[10]  
Badami C.A., 2021, Jrevealpeg: a semi-blind jpeg steganalysis tool targeting current open-source embedding programs