WAF-A-MoLE: Evading Web Application Firewalls through Adversarial Machine Learning

被引:26
作者
Demetrio, Luca [1 ]
Valenza, Andrea [1 ]
Costa, Gabriele [2 ]
Lagorio, Giovanni [1 ]
机构
[1] Univ Genoa, Genoa, Italy
[2] IMT Sch Adv Studies Lucca, Lucca, Italy
来源
PROCEEDINGS OF THE 35TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING (SAC'20) | 2020年
基金
欧盟地平线“2020”;
关键词
web application firewall; adversarial machine learning; sql injection; mutational fuzzing; SQL INJECTION;
D O I
10.1145/3341105.3373962
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Web Application Firewalls are widely used in production environments to mitigate security threats like SQL injections. Many industrial products rely on signature-based techniques, but machine learning approaches are becoming more and more popular. The main goal of an adversary is to craft semantically malicious payloads to bypass the syntactic analysis performed by a WAF. In this paper, we present WAF-A-MoLE, a tool that models the presence of an adversary. This tool leverages on a set of mutation operators that alter the syntax of a payload without affecting the original semantics. We evaluate the performance of the tool against existing WAFs, that we trained using our publicly available SQL query dataset. We show that WAF-A-MoLE bypasses all the considered machine learning based WAFs.
引用
收藏
页码:1745 / 1752
页数:8
相关论文
共 38 条
[1]  
Anderson Hyrum S, 2017, Black Hat
[2]  
[Anonymous], 2017, ARXIV
[3]  
[Anonymous], 2015, 2015 IEEE 8 INT C SO
[4]  
[Anonymous], 1964, Automation and Remote Control
[5]   A Machine-Learning-Driven Evolutionary Approach for Testing Web Application Firewalls [J].
Appelt, Dennis ;
Nguyen, Cu D. ;
Panichella, Annibale ;
Briand, Lionel C. .
IEEE TRANSACTIONS ON RELIABILITY, 2018, 67 (03) :733-757
[6]  
Bandhakavi S, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P12
[7]  
Biggio B., 2013, MACHINE LEARNING KNO, P387, DOI [DOI 10.1007/978-3-642-40994-3_25, DOI 10.1007/978-3-642-40994-3]
[8]   Wild patterns: Ten years after the rise of adversarial machine learning [J].
Biggio, Battista ;
Roli, Fabio .
PATTERN RECOGNITION, 2018, 84 :317-331
[9]  
Brodersen Kay H., 2010, Proceedings of the 2010 20th International Conference on Pattern Recognition (ICPR 2010), P3121, DOI 10.1109/ICPR.2010.764
[10]  
Carlini N, 2017, PROCEEDINGS OF THE 10TH ACM WORKSHOP ON ARTIFICIAL INTELLIGENCE AND SECURITY, AISEC 2017, P3, DOI 10.1145/3128572.3140444