Puppetnets: Misusing Web Browsers as a Distributed Attack Infrastructure

被引:5
作者
Forth-Ics, Spiros Antonatos [1 ]
Akritidis, Periklis [1 ]
Lam, Vinh The
Anagnostakis, Kostas G.
机构
[1] Univ Cambridge, Cambridge CB2 1TN, England
关键词
Security; Measurement; Experimentation; Web security; malicious software; distributed attacks;
D O I
10.1145/1455518.1455524
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most of the recent work on Web security focuses on preventing attacks that directly harm the browser's host machine and user. In this paper we attempt to quantify the threat of browsers being indirectly misused for attacking third parties. Specifically, we look at how the existing Web infrastructure ( e. g., the languages, protocols, and security policies) can be exploited by malicious or subverted Web sites to remotely instruct browsers to orchestrate actions including denial of service attacks, worm propagation, and reconnaissance scans. We show that attackers are able to create powerful botnet-like infrastructures that can cause significant damage. We explore the effectiveness of countermeasures including anomaly detection and more fine-grained browser security policies.
引用
收藏
页数:38
相关论文
共 69 条
[1]  
*ABC EL, 2006, ABCE DAT
[2]  
*AL INT INC, 2006, GLOB TOP 500
[3]  
ALCORN W, 2005, CROSS SITE SCRIPTING
[4]  
Andersen Starr, 2004, CHANGES FUNCTIONAL 2
[5]  
[Anonymous], P MULT COMP NETW MMC
[6]  
[Anonymous], 2002, P 9 ACM C COMPUTER C, DOI DOI 10.1145/586110.586130
[7]  
BARRETT BL, 2005, HOME WEBALIZER
[8]  
BERK V, 2003, P IEEE INT WORKSH IN
[9]  
Berners-Lee T., 1994, 1738 RFC
[10]  
BORTZ A, 2007, P 16 INT WORLD WID W