A Server Side Solution for Detecting WebInject: A Machine Learning Approach

被引:1
作者
Moniruzzaman, Md [1 ]
Bagirov, Adil [1 ]
Gondal, Iqbal [1 ]
Brown, Simon [2 ]
机构
[1] Federat Univ Australia, Internet Commerce Secur Lab ICSL, Ballarat, Vic, Australia
[2] Westpac Banking Corp, Sydney, NSW, Australia
来源
TRENDS AND APPLICATIONS IN KNOWLEDGE DISCOVERY AND DATA MINING: PAKDD 2018 WORKSHOPS | 2018年 / 11154卷
关键词
WebInject; Machine learning; Server side detection;
D O I
10.1007/978-3-030-04503-6_16
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the advancement of client-side on the fly web content generation techniques, it becomes easier for attackers to modify the content of a website dynamically and gain access to valuable information. A majority portion of online attacks is now done by WebInject. The end users are not always skilled enough to differentiate between injected content and actual contents of a webpage. Some of the existing solutions are designed for client side and all the users have to install it in their system, which is a challenging task. In addition, various platforms and tools are used by individuals, so different solutions needed to be designed. Existing server side solution often focuses on sanitizing and filtering the inputs. It will fail to detect obfuscated and hidden scripts. In this paper, we propose a server side solution using a machine learning approach to detect WebInject in banking websites. Unlike other techniques, our method collects features of a Document Object Model (DOM) and classifies it with the help of a pre-trained model.
引用
收藏
页码:162 / 167
页数:6
相关论文
共 14 条
[1]  
[Anonymous], 2012, 6 INT C INF SEC ASS
[2]   Prometheus: Analyzing WebInject-based information stealers [J].
Continella, Andrea ;
Carminati, Michele ;
Polino, Mario ;
Lanzi, Andrea ;
Zanero, Stefano ;
Maggi, Federico .
Journal of Computer Security, 2017, 25 (02) :117-137
[3]  
Criscione C, 2014, ANN CONF PRIV SECUR, P139, DOI 10.1109/PST.2014.6890933
[4]   XSS Attack Prevention Using DOM-Based Filter [J].
Dalai, Asish Kumar ;
Ankush, Shende Dinesh ;
Jena, Sanjay Kumar .
PROGRESS IN INTELLIGENT COMPUTING TECHNIQUES: THEORY, PRACTICE, AND APPLICATIONS, VOL 2, 2018, 719 :227-234
[5]   Hypervisor-based malware protection with AccessMiner [J].
Fattori, Aristide ;
Lanzi, Andrea ;
Balzarotti, Davide ;
Kirda, Engin .
COMPUTERS & SECURITY, 2015, 52 :33-50
[6]  
Heiderich M, 2011, LECT NOTES COMPUT SC, V6961, P281, DOI 10.1007/978-3-642-23644-0_15
[7]  
Kalu~zny J., 2015, SCRIPT BASED MALWARE
[8]  
Kharouni L., 2012, AUTOMATING ONLINE BA
[9]  
Kirda E., 2006, Applied Computing 2006. 21st Annual ACM Symposium on Applied Computing, P330, DOI 10.1145/1141277.1141357
[10]  
Lekies S., 2013, ACM CCS, P1193