NAISS: A reverse proxy approach to mitigate MageCart's e-skimmers in e-commerce

被引:1
作者
Rus, Adrian-Catalin [1 ]
El-Hajj, Mohammed [1 ]
Sarmah, Dipti Kapoor [1 ]
机构
[1] Univ Twente, Dept Semant Cybersecur & Serv, Drienerlolaan 5, NL-7522 NB Enschede, Netherlands
关键词
Image steganography; E-skimmers; MageCart; Digital signatures; Network filter; E-commerce; Elliptic curve cryptography; WEB APPLICATIONS; SECURITY;
D O I
10.1016/j.cose.2024.103797
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rise of payment details theft has led to increasing concerns regarding the security of e-commerce platforms. For the MageCart threat family, the attacks employ e-skimmers, which are pieces of software code that instruct clients to forward payment details to an attacker-controlled server. They can be injected into hosting providers' servers as HTML tags such as script, iframe, and img. By leveraging image steganography - the technique of hiding structured information inside images without visual perturbances - MageCart groups can deliver eskimmers without raising suspicion. In this work, we systematically review applicable solutions in the literature and evaluate their drawbacks in the setting of a compromised hosting provider. While promising, existing solutions in the literature present shortcomings such as a lack of compatibility, adaptability, or functionality in the presence of an attacker. Based on this review, we compile a set of features for a better solution, which we use as a foundation for designing our proposed solution - NAISS: Network Authentication of Images to Stop e-Skimmers. Through our solution, digital signatures of individual images are checked inside a serverside middlebox residing in the hosting provider's network to prevent the transmission of unauthorized images to clients. Elliptic curve signatures are provided by the e-commerce platform developer prior to uploading a website to the hosting provider. Our proof-of-concept implementation shows that NAISS is capable of filtering 100% of present stegoimages, regardless of their novelty, while imposing a minimal performance detriment and no client-side modifications.
引用
收藏
页数:26
相关论文
共 105 条
[11]  
Barker E., 2018, Tech. Rep.
[12]  
Bjorklund K., 2021, What's the deal with stegomalware?: The techniques, challenges, defence and landscape
[13]  
Bower T., 2019, Identifying Javascript Skimmers on HighValue Websites, Imperial College of Science, Technology and Medicine, P1
[14]  
Box D., 2000, SIMPLE OBJECT ACCESS
[15]   A Signature-Based Intrusion Detection System for Web Applications based on Genetic Algorithm [J].
Bronte, Robert ;
Shahriar, Hossain ;
Haddad, Hisham M. .
SECURITY OF INFORMATION AND NETWORKS (SIN'16), 2016, :32-39
[16]  
Brown TB, 2020, ADV NEUR IN, V33
[17]  
Canali Davide, 2013, P 22 INT C WORLD WID, P177, DOI 10.1145/2488388.2488405
[18]  
Cappos J., 2016, US Patent, Patent No. [9,246,929, 9246929]
[19]   Fostering the uptake of Secure Multiparty Computation in e-commerce [J].
Catrina, Octavian ;
Kerschbaum, Florian .
ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, :693-+
[20]  
Chaganti R, 2021, Arxiv, DOI [arXiv:2110.02504, 10.48550/ARXIV.2110.02504, DOI 10.48550/ARXIV.2110.02504]