【24h】

Web driven alert verification

机译:网络驱动的警报验证

获取原文

摘要

A web attack is an attack against a web server through the HTTP Protocol. By analyzing known web attacks, we find out that each one has its own behavior. Vestiges of their behavior could be detected in non-body parts of the HTTP Protocol. Such information can be used to verify web alerts generated by Web Application Firewalls (WAFs) and Web Intrusion Detection Systems (Web IDSs). In this paper, we propose a method to verify web alerts generated by mentioned sensors. The goal of the alert verification component is to eliminate or tag alerts that do not represent successful attacks. Our approach is based on analyzing HTTP Transaction metadata, including Request method, Request Headers, Status Code, and Response Headers. We implemented an alert verification module, reconfigured ModSecurity, modified a subset of the OWASP ModSecurity Core Rule Set, and developed knowledge-base of web attack vectors to evaluate our method. We show that our approach significantly reduces false and non-relevant alerts with quite low processing overhead, thus enhances the quality of the results.
机译:Web攻击是通过HTTP协议对Web服务器的攻击。通过分析已知的Web攻击,我们发现每个攻击都有其自己的行为。可以在HTTP协议的非正文部分检测到它们行为的烦恼。此类信息可用于验证由Web应用程序防火墙(WAF)和Web入侵检测系统(Web IDS)生成的Web警报。在本文中,我们提出了一种验证由上述传感器生成的Web警报的方法。警报验证组件的目标是消除或标记不代表成功攻击的警报。我们的方法基于分析HTTP事务元数据,包括请求方法,请求标头,状态代码和响应标头。我们实施了警报验证模块,重新配置了ModSecurity,修改了OWASP ModSecurity核心规则集的子集,并开发了Web攻击媒介的知识库来评估我们的方法。我们证明了我们的方法以相当低的处理开销显着减少了虚假和不相关的警报,从而提高了结果的质量。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号