首页> 外文会议>IEEE International Conference on Data Science in Cyberspace >MaliceScript: A Novel Browser-Based Intranet Threat
【24h】

MaliceScript: A Novel Browser-Based Intranet Threat

机译:MaliceScript:基于浏览器的新型Intranet威胁

获取原文

摘要

Recently, we have seen a sharp increase in browser-based threats that are specifically designed to attack intranet, especially in APT. In response to such attacks, it is both important to deal with the existing attacks and predict potential attacks from attacker's perspective. In this paper, we propose a new browser-based Web attack model that allows a browser to collect intranet topology and further to infiltrate a website from the intranet instead of from the extranet, leveraging some features of browsers. To verify the effectiveness of the proposed attack model, we design and implement a project named MaliceScript, and we systemically describe the technical details of the MaliceScript as well. Moreover, we demonstrate the MaliceScript in controlled experiments, and the related results prove that the MaliceScript can detect the intranet topology correctly and infiltrate intranet website secretly. Both the theory and experiment indicate that the proposed threat will probably become a reality in the near future, because it is easy to launch but difficult to be detected. In order to prevent the proposed threat, we give some practical suggestions at the end of this paper.
机译:最近,我们发现专门设计用于攻击Intranet(尤其是APT)的基于浏览器的威胁急剧增加。针对此类攻击,应对现有攻击并从攻击者的角度预测潜在的攻击既重要。在本文中,我们提出了一种基于浏览器的新型Web攻击模型,该模型允许浏览器收集Intranet拓扑,并进一步利用浏览器的某些功能从Intranet而非Extranet渗透网站。为了验证所提出的攻击模型的有效性,我们设计并实现了一个名为MaliceScript的项目,并且我们还系统地描述了MaliceScript的技术细节。此外,我们在受控实验中演示了MaliceScript,相关结果证明,MaliceScript可以正确检测Intranet拓扑并秘密地渗透Intranet网站。理论和实验都表明,所提出的威胁很可能在不久的将来成为现实,因为它易于发射,但很难被发现。为了防止提出的威胁,我们在本文结尾处提出了一些实用的建议。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号