Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Issue title: Best papers of the Security Track at the 2006 ACM Symposium on Applied Computing
Guest editors: Giampaolo BellaGuest Editor and Peter Y.A. RyanGuest Editor
Article type: Research Article
Authors: Vigna, Giovannia | Valeur, Fredrika | Balzarotti, Davidea | Robertson, Williama | Kruegel, Christopherb | Kirda, Enginb
Affiliations: [a] University of California, Santa Barbara, CA 93106, USA. E-mail: vigna@cs.ucsb.edu, fredrik@cs.ucsb.edu, balzarot@cs.ucsb.edu, wkr@cs.ucsb.edu | [b] Technical University, 1040 Vienna, Austria. E-mail: chris@seclab.tuwien.ac.at, ek@seclab.tuwien.ac.at
Abstract: Web-based applications have become a popular means of exposing functionality to large numbers of users by leveraging the services provided by web servers and databases. The wide proliferation of custom-developed web-based applications suggests that anomaly detection could be a suitable approach for providing early warning and real-time blocking of application-level exploits. Therefore, a number of research prototypes and commercial products that learn the normal usage patterns of web applications have been developed. Anomaly detection techniques, however, are prone to both false positives and false negatives. As a result, if anomalous web requests are simply blocked, it is likely that some legitimate requests would be denied, resulting in decreased availability. On the other hand, if malicious requests are allowed to access a web application's data stored in a back-end database, security-critical information could be leaked to an attacker. To ameliorate this situation, we propose a system composed of a web-based anomaly detection system, a reverse HTTP proxy, and a database anomaly detection system. Serially composing a web-based anomaly detector and a SQL query anomaly detector increases the detection rate of our system. To address a potential increase in the false positive rate, we leverage an anomaly-driven reverse HTTP proxy to serve anomalous-but-benign requests that do not require access to sensitive information. We developed a prototype of our approach and evaluated its applicability with respect to several existing web-based applications, showing that our approach is both feasible and effective in reducing both false positives and false negatives.
Keywords: Anomaly detection, web security, database security, data compartmentalization
DOI: 10.3233/JCS-2009-0321
Journal: Journal of Computer Security, vol. 17, no. 3, pp. 305-329, 2009
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
sales@iospress.com
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
info@iospress.nl
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office info@iospress.nl
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
china@iospress.cn
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
如果您在出版方面需要帮助或有任何建, 件至: editorial@iospress.nl