Web Runner 2049: Evaluating Third-Party Anti-bot Services

被引:19
作者
Azad, Babak Amin [1 ]
Starov, Oleksii [2 ]
Laperdrix, Pierre [3 ]
Nikiforakis, Nick [1 ]
机构
[1] SUNY Stony Brook, Stony Brook, NY 11794 USA
[2] Palo Alto Networks, Santa Clara, CA USA
[3] Univ Lille, INRIA, CNRS, Lille, France
来源
DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, DIMVA 2020 | 2020年 / 12223卷
基金
美国国家科学基金会;
关键词
D O I
10.1007/978-3-030-52683-2_7
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Given the ever-increasing number of malicious bots scouring the web, many websites are turning to specialized services that advertise their ability to detect bots and block them. In this paper, we investigate the design and implementation details of commercial anti-bot services in an effort to understand how they operate and whether they can effectively identify and block malicious bots in practice. We analyze the JavaScript code which their clients need to include in their websites and perform a set of gray box and black box analyses of their proprietary back-end logic, by simulating bots utilizing well-known automation tools and popular browsers. On the positive side, our results show that by relying on browser fingerprinting, more than 75% of protected websites in our dataset, successfully defend against attacks by basic bots built with Python scripts or PhantomJS. At the same time, by using less popular browsers in terms of automation (e.g., Safari on Mac and Chrome on Android) attackers can successfully bypass the protection of up to 82% of protected websites. Our findings show that the majority of protected websites are prone to bot attacks and the existing anti-bot solutions cannot substantially limit the ability of determined attackers. We have responsibly disclosed our findings with the anti-bot service providers.
引用
收藏
页码:135 / 159
页数:25
相关论文
共 52 条
[1]   The Web Never Forgets: Persistent Tracking Mechanisms in the Wild [J].
Acar, Gunes ;
Eubank, Christian ;
Englehardt, Steven ;
Juarez, Marc ;
Narayanan, Arvind ;
Diaz, Claudia .
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, :674-689
[2]  
[Anonymous], 2016, P 2016 ACM SIGSAC C, DOI DOI 10.1145/2976749.2978313
[3]  
[Anonymous], 2013, ACM C COMP COMM SEC
[4]  
[Anonymous], 2019, How Bots Are Disrupting Airline Ticket Sales
[5]  
[Anonymous], 2017, Uber's Massive Scraping Program Collected Data About Competitors Around The World
[6]  
BuiltWith Technology Lookup, 2018, About us
[7]   Picasso: Lightweight Device Class Fingerprinting for Web Clients [J].
Bursztein, Elie ;
Malyshev, Artem ;
Pietraszek, Tadek ;
Thomas, Kurt .
PROCEEDINGS OF THE 6TH WORKSHOP ON SECURITY AND PRIVACY IN SMARTPHONES AND MOBILE DEVICES (SPSM'16), 2016, :93-102
[8]  
Canali D., 2013, 20 ANN NETW DISTR SY
[9]   (Cross-)Browser Fingerprinting via OS and Hardware Level Features [J].
Cao, Yinzhi ;
Li, Song ;
Wijmans, Erik .
24TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2017), 2017,
[10]  
Cloudflare, The web performance & security company