TEMPLATE DESIGN © 2008 www.PosterPresentations.com Automatic Classification of Parameters and Cookies Ali Reza Farid Amin 1, Gregor v. Bochmann 1, Guy-Vincent.

Slides:



Advertisements
Similar presentations
Cloud PIV Authentication and Authorization Demo PIV Card User Workstation Central Security Server In order to use Cloud Authentication and Authorization.
Advertisements

Closing the Gap: Analyzing the Limitations of Web Application Vulnerability Scanners David Shelly Randy Marchany Joseph Tront Virginia Polytechnic Institute.
Internet Security Protocols
Trace Analysis Chunxu Tang. The Mystery Machine: End-to-end performance analysis of large-scale Internet services.
Automating Bespoke Attack Ruei-Jiun Chapter 13. Outline Uses of bespoke automation ◦ Enumerating identifiers ◦ Harvesting data ◦ Web application fuzzing.
Access Control Enforcement Delegation for Information-Centric Networking Architectures N. Fotiou, G.F. Marias, G.C Polyzos.
ASP.NET 2.0 Chapter 6 Securing the ASP.NET Application.
1 Detecting Logic Vulnerabilities in E- Commerce Applications Presenter: Liu Yin Slides Adapted from Fangqi Sun Computer Science Department College of.
Esri UC2013. Technical Workshop. Technical Workshop 2013 Esri International User Conference July 8–12, 2013 | San Diego, California Building Secure Applications.
Health IT RESTful Application Programming Interface (API) Security Considerations Transport & Security Standards Workgroup March 18, 2015.
WEB ANALYTICS Prof Sunil Wattal. Business questions How are people finding your website? What pages are the customers most interested in? Is your website.
OAuth option for mHealth Brief Profile Proposal for 2013/14 presented to the IT Infrastructure Planning Committee R Horn (Agfa Healthcare)
Clinton Ho Program Manager Microsoft Corporation SESSION CODE: SIA311.
W3af LUCA ALEXANDRA ADELA – MISS 1. w3af  Web Application Attack and Audit Framework  Secures web applications by finding and exploiting web application.
Introduction to Application Penetration Testing
Access and Identity Management System (AIMS) Federal Student Aid PESC Fall 2009 Data Summit October 20, 2009 Balu Balasubramanyam.
TEMPLATE DESIGN © Efficient Crawling of Complex Rich Internet Applications Ali Moosavi, Salman Hooshmand, Gregor v. Bochmann,
Solving Some Modeling Challenges when Testing Rich Internet Applications for Security Software Security Research Group (SSRG), University of Ottawa In.
TEMPLATE DESIGN © Non-URL-Based Crawling strategy :  In a RIA one URL corresponds to many states of DOM. Unlike traditional.
Survey of Identity Repository Security Models JSR 351, Sep 2012.
FIspace SPT Seyhun Futaci. Technology behind FIspace Authentication and Authorization IDM service of Fispace provides SSO solution for web apps, mobile.
PAUL ALEXANDRU CHIRITA STEFANIA COSTACHE SIEGFRIED HANDSCHUH WOLFGANG NEJDL 1* L3S RESEARCH CENTER 2* NATIONAL UNIVERSITY OF IRELAND PROCEEDINGS OF THE.
An Empirical Study of Visual Security Cues to Prevent the SSLstripping Attack Dongwan Shin and Rodrigo Lopes In Proc. 27 th Annual Computer Security Applications.
POSTER TEMPLATE BY: Whitewater HTTP Vulnerabilities Nick Berry, Joe Joyce, & Kevin Vaccaro. Syntax & Routing Attempt to capture.
Protecting Students on the School Computer Network Enfield High School.
Openid Connect
Web Logic Vulnerability By Eric Jizba and Yan Chen With slides from Fangqi Sun and Giancarlo Pellegrino.
Second Line Intrusion Detection Using Personalization DISA Sponsored GWU-CS.
CS 4244: Internet Programming Security 1.0. Introduction Client identification and cookies Basic Authentication Digest Authentication Secure HTTP.
TEMPLATE DESIGN © Non-URL-Based Crawling strategy :  In a RIA one URL corresponds to many states of DOM. Unlike traditional.
Yuchen Zhou and David Evans Presented by Simon du Preez Compsci 726 SSOScan: Automated Testing of Web Applications for Single Sign-On Vulnerabilities.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
TEMPLATE DESIGN © Non-URL-Based Crawling strategy :  In a RIA one URL corresponds to many states of DOM. Unlike traditional.
TEMPLATE DESIGN © Crawling is the process of automatically exploring a web application to discover the states of the application.
How to introduce a unified authentication module using VISS infrastructure? For state institutions and local governments.
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
12. DISTRIBUTED WEB-BASED SYSTEMS Nov SUSMITHA KOTA KRANTHI KOYA LIANG YI.
Survey of Identity Repository Security Models JSR 351, Sep 2012.
A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks Source: Wireless Personal Communications,
Title of Research Poster
Introduction to Windows Azure AppFabric
Automatic Network Protocol Analysis
Node.js Express Web Applications
Y.-H. Chen International College Ming-Chuan University Fall, 2004
Data and Applications Security Developments and Directions
Deployment Planning Services
Node.js Express Web Services
Server Concepts Dr. Charles W. Kann.
Client / Session Identification Cookies
Firewalls.
Scraping Facebook via API in R
You will not hear sound until the host opens the audio line.
SSOScan: Automated Testing of Web Applications for Single Sign-On Vulnerabilities Yuchen Zhou, and David Evans 23rd USENIX Security Symposium, August,
Are these Ads Safe: Detecting Hidden A4acks through Mobile App-Web Interfaces Vaibhav Rastogi, Rui Shao, Yan Chen, Xiang Pan, Shihong Zou, and Ryan Riley.
Title of Research Poster
Real-Time Attack Detection in CPS
What is Cookie? Cookie is small information stored in text file on user’s hard drive by web server. This information is later used by web browser to retrieve.
Client / Session Identification Cookies
Rui Wu, Jose Painumkal, Sergiu M. Dascalu, Frederick C. Harris, Jr
CSc4730/6730 Scientific Visualization
Multi-party Authentication in Web Services
2019/1/1 High Performance Intrusion Detection Using HTTP-Based Payload Aggregation 2017 IEEE 42nd Conference on Local Computer Networks (LCN) Author: Felix.
X-Road as a Platform to Exchange MyData
Mary Montoya, CIO Bogi Malecki, Project Manager
Identifying Slow HTTP DoS/DDoS Attacks against Web Servers DEPARTMENT ANDDepartment of Computer Science & Information SPECIALIZATIONTechnology, University.
Protection Mechanisms in Security Management
Computer Network Information Center, Chinese Academy of Sciences
[Based in part on SWE 432 and SWE 632 materials by Jeff Offutt, GMU]
Presentation transcript:

TEMPLATE DESIGN © Automatic Classification of Parameters and Cookies Ali Reza Farid Amin 1, Gregor v. Bochmann 1, Guy-Vincent Jourdan 1, Iosif Viorel Onut 2 1 School of Information Technology and Engineering - University of Ottawa 2 Security AppScan® Enterprise, IBM Introduction Acknowledgments Methodology Motivation and Aim Experiments Future Works In an internet application, a set of parameters and cookies are exchanged between the client and the server. We classify these parameters and cookies into five different categories: Session Identifiers Session Tokens User Identifiers User Settings Others The task of creating this classification manually is tedious and time consuming. We aim at automating this classification in order to create configuration files for security scanning systems such as IBM AppScan Enterprise. Automatic detection of the user’s authentication point can help identifying the types of parameters and cookies, since a number of parameters are only sent to the server after the user gets authenticated. Detection of the login point: To detect the login point and also to attempt detecting the type of OAUTH authentication, if any. Analysis of parameter values and their occurrences: The behaviour of parameters after login point in each trace is analyzed. Two important factors of this study are the number of times that a parameter value has changed and the number of appearances of a parameter with the same value during consecutive requests. Detection of type of parameters: To identify the types of the parameters by comparing traces. Session Identifiers: Complex values that are set at some point in the trace and do not change afterwards, and have different values in all traces. Session Tokens: Values that are set at some point, remain constant over a period of time, and have different values in all traces. User Identifiers: Complex values that are set at some point and do not change afterwards, and have different values for different users but same values for the same user. User Settings: Values that are set once the user is identified and do not change afterwards. Can be the same across traces. Functionality of Configuration Detection Tool Analysis of the first 50 popular websites which are ranked by ‘Alexa.com’. Improve heuristics for detecting the type of parameters. Detection of additional authentication protocols for detecting the login point. Server-side web applications generate unique session ids which are sent to the client through the cookies. This data is sent with every request from the client to the server. The server implements an associative array with its key as the session id and its value as some data of the client [1, 2]. The captured traffic of SSO-authentication-based websites were used to study browser relay messages to find OAuth authentication vulnerabilities. The requests communicated between ID provider and relay party were analyzed by labelling their request parameters syntactically and semantically [3, 4]. 1.Ihm, Sunghwan, and Vivek S. Pai. "Towards understanding modern web traffic."Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference. ACM, Breton, Bergeron, et al.A Reference Framework for the Automated Exploration of Web Applications. 19th International Conference on Engineering of Complex Computer Systems(2014) 3.Wang, Rui, Shuo Chen, and XiaoFeng Wang. "Signing me onto your accounts through facebook and google: A traffic-guided security study of commercially deployed single-sign-on web services." Security and Privacy (SP), 2012 IEEE Symposium on. IEEE, Bai, Guangdong, et al. "AUTHSCAN: Automatic Extraction of Web Authentication Protocols from Implementations." NDSS Background Motivation: Classifying the types of parameters and cookies requires expert knowledge, and it is tedious to achieve manually. Goals: Web traffic traces Trace analysis: for each trace Header extraction Parameter analysis Login point detection Exchanged parameters for all traces Detection of types of parameters Candidates for Session Identifiers, User Identifiers, User Settings and other types of parameters Candidates for Session Identifiers, User Identifiers, User Settings and other types of parameters Exchanged parameters for one trace Analysis of parameters’ values and their occurrences Categorize the extracted parameters and cookies from users’ traces into Session identifiers, Session tokens, User identifiers, User Settings, and other types of parameters. Capture information on the users authentication point, and different parameters’ values and their behaviours. This work is supported in part by IBM and the Natural Science and Engineering Research Council of Canada. DISCLAIMER The views expressed in this poster are the sole responsibility of the authors and do not necessarily reflect those of the Center for Advanced Studies of IBM. Website Name: ASE (IBM AppScan Enterprise) Website Name: RTC (Rational Team Concert) Session identifiers: ASP.NET_SessionId JSESSIONIDSSO asc_access_token asc_session_id asc_access_token_secret User identifiers: j_username User settings: SliderX, SliderIsHidden, instance, featureKey, redirectPath, tempToken,net-jazz-ajax-cookie- rememberUserId, oauth_callback, JazzFormAuth, include _proxyURL, locale, exception_occurred, exception_details, t, SliderX, SliderIsHidden Session identifiers: JSESSIONIDSSO JSESSIONID Etag User identifiers: j_username User settings: X-com-ibm-team-foundation-auth-loop-avoidance, pageNum, JazzFormAuth, scope, hideAdmin hideGuest, proxyURL, hideArchivedUsers, net-jazz-ajax-cookie- rememberUserId, isLicenseSearch, hideUnassigned Below is the result of the classification experiment on two websites. The evaluation of classification has been done based on the website's configuration files. The green checkmark indicates the correct classification of parameter.