...
首页> 外文期刊>International Journal of Information Security >You click, I steal: analyzing and detecting click hijacking attacks in web pages
【24h】

You click, I steal: analyzing and detecting click hijacking attacks in web pages

机译:您单击,我窃取:分析和检测在网页中的点击劫持攻击

获取原文
获取原文并翻译 | 示例
           

摘要

Click Hijacking (clickjacking) is emerging as a web-based threat on the Internet. The prime objective of clickjacking is stealing user clicks. An attacker can carry out a clickjacking attack by tricking the victim into clicking an element that is barely visible or completely hidden. By stealing the victim's clicks, an attacker could entice the victim to perform an unintended action from which the attacker can benefit. These actions include online money transactions, sharing malicious website links, initiate social networking links, etc. This paper presents an anatomy of advanced clickjacking attacks not yet reported in the literature. In particular, we propose new class of clickjacking attacks that employ SVG filters and create various effects with SVG filters. We demonstrate that current defense techniques are ineffective to deal with these sophisticated clickjacking attacks. Furthermore, we develop a novel detection method for such attacks based on the behavior (response) of a website active content against the user clicks (request). In our experiments, we found that our method can detect advanced Scalable Vector Graphics (SVG)-based attacks where most of the contemporary tools fail. We explore and utilize various common and distinguishing characteristics of malicious and legitimate web pages to build a behavioral model based on Finite State Automaton. We evaluate our proposal with a sample set of 78,000 web pages from various sources, and 1000 web pages known to involve clickjacking. Our results demonstrate that the proposed solution enjoys good accuracy and a negligible percentage of false positives (i.e., 0.28%), and zero false negatives in distinguishing clickjacking and legitimate websites.
机译:单击劫持(ClickJacking)正在互联网上作为基于Web的威胁而涌现。 ClickJacking的主要目标是窃取用户点击。攻击者可以通过欺骗受害者来单击几乎可见或完全隐藏的元素来进行ClickJacking攻击。通过窃取受害者的点击次数,攻击者可以诱使受害者执行意外行动,从中攻击者可以从中受益。这些行动包括在线货币交易,共享恶意网站链接,启动社交网络链接等。本文提出了在文献中尚未报告的高级ClickJacking攻击的解剖学。特别是,我们提出了新的ClickJacking攻击,使用SVG过滤器使用SVG过滤器创建各种效果。我们证明,处理这些复杂的ClickJacking攻击的目前的防御技术是无效的。此外,我们基于对用户点击(请求)的网站活动内容的行为(响应)来开发一种新的检测方法。在我们的实验中,我们发现我们的方法可以检测高级可扩展的矢量图形(SVG)基础的攻击,其中大多数当代工具失败。我们探索并利用了恶意和合法网页的各种共同和区别特征,以建立基于有限状态自动机的行为模型。我们评估我们的提案,使用来自各种来源的78,000个网页的样本集,并已知1000个网页涉及ClickJacking。我们的结果表明,所提出的解决方案具有良好的准确性和可忽略的误报百分比(即0.28%),以及区分ClickJacking和合法网站的零假否定。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号