SlideShare a Scribd company logo
1 of 22
Download to read offline
PRA Pattern Recognition and Applications Group!


  HMM-Web: a framework for the
 detection off attacks against Web
           Applications
                 I. Corona, D. Ariu, G. Giacinto

                              Presenter
                             Davide Ariu

                    Pattern Recognition and Applications Group
P R A               Department of Electrical and Electronic Engineering
                    University of Cagliari, Italy
 June 17, 2009            ICC 2009 - HMMWeb - Davide Ariu             1
Outline

•  Motivations
•  HMM-Web vs. Web Application Firewalls
•  Description of the IDS Scheme
•  Noise inside the training set
•  Sequences codification
•  Experimental Setup
•  Experimental Results
•  Conclusions



June 17, 2009       ICC 2009 - HMMWeb - Davide Ariu   2
Motivations


  Why we do address the problem
   of securing Web Applications?




June 17, 2009   ICC 2009 - HMMWeb - Davide Ariu   3
Motivations




       Source: X-Force® 2008 Trend & Risk Report – January 2009
June 17, 2009            ICC 2009 - HMMWeb - Davide Ariu          4
Motivations




       Source: X-Force® 2008 Trend & Risk Report – January 2009
June 17, 2009            ICC 2009 - HMMWeb - Davide Ariu          5
Protection of Web Applications
•  Web Applications can be protected using a
   Web-Application Firewall (WAF)
     –  WAF filter applications’ input using a set of rules.
•  Writing rules for a Web-Application Firewall is a
   procedure:
     –  Vulnerable to zero-days attacks
          •  WAF can’t stop an attack if it doesn’t have a rule
             against it
     –  Time Expensive
          •  Rules must be written by hand by the administrator
     –  Prone to errors
          •  Requires the administrator having an in-depth
             knowledge of applications which reside on the
             Web-Server
June 17, 2009            ICC 2009 - HMMWeb - Davide Ariu          6
HMM-Web

•  HMM-Web addresses all of the weaknesses of
   Web-Application Firewalls because is an Intrusion
   Detection System:
     –  Anomaly Based
           •  This means which is also able to face with zero-days
              attacks
     –  Fully Automated for what concerns the training
        procedure
           •  Time saving
           •  Doesn’t require the administrator having knowledge
              of applications which reside on the Web-Server




June 17, 2009             ICC 2009 - HMMWeb - Davide Ariu            7
An usage scenario




June 17, 2009       ICC 2009 - HMMWeb - Davide Ariu   8
Request URI Modelling

•  As attacks like XSS and SQL-Injection exploit input
   validation flaws, we want to model the input
   provided by the user.
•  User-provided data are passed by the browser to
   the Web-Server (then to the application) using a
   sequence of attribute-value pairs.
•  Consequently, we want to model:
     –  The sequence of attributes
     –  The value of each attribute




June 17, 2009           ICC 2009 - HMMWeb - Davide Ariu   9
Request URI Modelling

•  From the example request URI
      GET /search.php?cat=32&key=hmm HTTP/1.1
    we extract:
     –  The name of the application: “search.php”
     –  The sequence of attributes: “cat-key”
     –  The value of each attribute:
           •  “32” for the attribute cat
           •  “hmm” for the attribute key


•  These are the elements that HMM-Web analyses

June 17, 2009             ICC 2009 - HMMWeb - Davide Ariu   10
Classifier Ensemble

•  HMM-Web is based on Hidden Markov Models
•  For each application running on the Web Server
   HMM-Web creates a module consisting of
     –  An HMM-Ensemble to model the sequence of attributes
         •  This feature allows to detect request URI modified by
            hand
     –  An HMM-Ensemble for each one of attributes received
        by the Web Application
         •  This feature allows to detect if one attribute is
            receiving an anomalous value.




June 17, 2009           ICC 2009 - HMMWeb - Davide Ariu        11
IDS-Scheme




June 17, 2009    ICC 2009 - HMMWeb - Davide Ariu   12
Noise in the training set

•  HMM-Web is trained on a training set made of
   requests toward the Web-Server we want to
   protect.
•  This means that this training set might contain
   both legitimate and attack requests.
•  From a Pattern Recognition point of view,this is a
   problem of training on noisy data..

       How does this noise affect HMM-Web
                  performances?


June 17, 2009          ICC 2009 - HMMWeb - Davide Ariu   13
Noise in the training set
•  The assumption that the most part of queries inside the
   training set is legitimate is not reasonable for applications
   which are rarely interrogated.




June 17, 2009          ICC 2009 - HMMWeb - Davide Ariu             14
Noise in the training set
                       Countermeasure
    •  We propose to model the fraction of attacks
       inside the training set as:
                                     M
                            1
                         α = ∑α i ⋅ | q(w i ) |
                            N i=1
    •  Where:
         –  M is the number of applications on the Web Server
         –  N is the number of queries in the training set
         –  | q(w i ) | is the number of queries on the i-th application
         –  α i is the fraction of attacks on the i-th application
            €
                     How can we estimate effectively           αi
€
€                         for each application?
    June 17, 2009            ICC 2009 - HMMWeb - Davide Ariu           15
Noise in the training set
                       Countermeasure
    •  Experimental results show that even a rough
       estimate of the amount of attacks inside the
       training set, allows to improve the performances
       of the IDS.
    •  A good estimate of α i is that provided by the
       following formula:
                              α
                    αi =                , ∀i ∈ [1, M ]
                         M ⋅ freq(w i )
    •    freq(w i ) is €
                       simply the ratio between the number
         of queries toward the i-th application and the
         overall number of queries.
            €

€   June 17, 2009          ICC 2009 - HMMWeb - Davide Ariu   16
Attribute value codification

•  The values passed to the attributes might
   contain digits, alphabetic letters or meta-
   characters.
•  As it is not important distinguishing between
   elements belonging to each one of these
   categories, HMM-Web
     –  Replaces all the digits with the symbol “N”
     –  Replaces all the alphabetic letters with the symbol “A”
     –  Leaves immutate meta-characters
•  E.g. The attribute value “/dir/sub/1,2” becomes
   “/AAA/AAA/N,N”

June 17, 2009           ICC 2009 - HMMWeb - Davide Ariu       17
Experimental Setup

•  We tested HMM-Web on a production Web-
   Server of our Academic Institution.
•  The Web-Server hosts 52 Applications:
     –  24 provide services for registered users
     –  28 provide public services
•  Dataset D: 150.000 queries toward the Web –
   Server
•  Dataset A: 38 attacks against 18 applications
     –  19 Cross Site Scripting Attacks
     –  19 SQL Injection Attacks




June 17, 2009           ICC 2009 - HMMWeb - Davide Ariu   18
Experimental Results
                Effectiveness of attributes’ codification




The curve on the right has been obtained using the codification proposed by Kruegel et al. In
“A multimodel approach to the detection of web-based attacks”, Computer Networks, 2005.

    June 17, 2009                 ICC 2009 - HMMWeb - Davide Ariu                      19
Experimental Result
                Effectiveness of the MCS Approach




June 17, 2009            ICC 2009 - HMMWeb - Davide Ariu   20
Conclusions
•  In this work we propose an anomaly-based IDS for
   the protection of Web-Applications

•  Respect to traditional WAF HMM-Web is able to face
   with zero-days attacks and doesn’t require the
   administrator having an in-dept knowledge of
   applications to be protected.

•  We suggest also a solution for the codification of
   queries toward the web server and a strategy to take
   into account the noise into the training set.
•  HMM-Web achieves excellent results in terms of
   detection/false positive rate, even against attacks
   that are similar to those inside the training set.

June 17, 2009       ICC 2009 - HMMWeb - Davide Ariu      21
Questions?




June 17, 2009   ICC 2009 - HMMWeb - Davide Ariu   22

More Related Content

Similar to HMM-Web: a framework for the detection of attacks against Web applications

Ankita- Hacker Proof your app using Functional Tests
Ankita- Hacker Proof your app using Functional TestsAnkita- Hacker Proof your app using Functional Tests
Ankita- Hacker Proof your app using Functional TestsAnkita Gupta
 
IBM elm alm overview-software engineerin-lifecycle-management
IBM elm alm overview-software engineerin-lifecycle-managementIBM elm alm overview-software engineerin-lifecycle-management
IBM elm alm overview-software engineerin-lifecycle-managementImran Hashmi
 
End-to-End and e-Business Value from the Telematics Reference Implementation ...
End-to-End and e-Business Value from the Telematics Reference Implementation ...End-to-End and e-Business Value from the Telematics Reference Implementation ...
End-to-End and e-Business Value from the Telematics Reference Implementation ...mfrancis
 
How to Integrate AppSec Testing into your DevOps Program
How to Integrate AppSec Testing into your DevOps Program How to Integrate AppSec Testing into your DevOps Program
How to Integrate AppSec Testing into your DevOps Program Denim Group
 
4.4.2013 Software Quality - Regression Testing Automated and Manual - RFT/RQM
4.4.2013 Software Quality - Regression Testing Automated and Manual - RFT/RQM4.4.2013 Software Quality - Regression Testing Automated and Manual - RFT/RQM
4.4.2013 Software Quality - Regression Testing Automated and Manual - RFT/RQMIBM Rational
 
Delivering Java Applications? Ensure Top Performance Every Time, with Intell...
 Delivering Java Applications? Ensure Top Performance Every Time, with Intell... Delivering Java Applications? Ensure Top Performance Every Time, with Intell...
Delivering Java Applications? Ensure Top Performance Every Time, with Intell...John Williams
 
Automation testing strategy, approach & planning
Automation testing  strategy, approach & planningAutomation testing  strategy, approach & planning
Automation testing strategy, approach & planningSivaprasanthRentala1975
 
ims1-07-bhatia-ip-unity
ims1-07-bhatia-ip-unityims1-07-bhatia-ip-unity
ims1-07-bhatia-ip-unitybhatiak997
 
Simplify Troubleshooting With Context in Your Logs
Simplify Troubleshooting With Context in Your LogsSimplify Troubleshooting With Context in Your Logs
Simplify Troubleshooting With Context in Your LogsSolarWinds
 
Developing-Effective-Mass-Migration-Strategy-out-of-a-Tool-based-Portfolio-As...
Developing-Effective-Mass-Migration-Strategy-out-of-a-Tool-based-Portfolio-As...Developing-Effective-Mass-Migration-Strategy-out-of-a-Tool-based-Portfolio-As...
Developing-Effective-Mass-Migration-Strategy-out-of-a-Tool-based-Portfolio-As...Amazon Web Services
 
Vulnerabilities are bugs, Let's Test For Them!
Vulnerabilities are bugs, Let's Test For Them!Vulnerabilities are bugs, Let's Test For Them!
Vulnerabilities are bugs, Let's Test For Them!VAddy
 
Digital Security by Design: Imperas’ Interests - Simon Davidmann, Imperas Sof...
Digital Security by Design: Imperas’ Interests - Simon Davidmann, Imperas Sof...Digital Security by Design: Imperas’ Interests - Simon Davidmann, Imperas Sof...
Digital Security by Design: Imperas’ Interests - Simon Davidmann, Imperas Sof...KTN
 
Managing Your Application Security Program with the ThreadFix Ecosystem
Managing Your Application Security Program with the ThreadFix EcosystemManaging Your Application Security Program with the ThreadFix Ecosystem
Managing Your Application Security Program with the ThreadFix EcosystemDenim Group
 
Lightweight Self-Protecting JavaScript
Lightweight Self-Protecting JavaScriptLightweight Self-Protecting JavaScript
Lightweight Self-Protecting JavaScriptPhú Phùng
 
2019 ibm io t exchange - meeting safety-related software audits
2019   ibm io t exchange - meeting safety-related software audits2019   ibm io t exchange - meeting safety-related software audits
2019 ibm io t exchange - meeting safety-related software auditsM Kevin McHugh
 
IBM BlueMix Presentation - Paris Meetup 17th Sept. 2014
IBM BlueMix Presentation - Paris Meetup 17th Sept. 2014IBM BlueMix Presentation - Paris Meetup 17th Sept. 2014
IBM BlueMix Presentation - Paris Meetup 17th Sept. 2014IBM France Lab
 
Vulnerabilities are bugs, Let's test for them!
Vulnerabilities are bugs, Let's test for them!Vulnerabilities are bugs, Let's test for them!
Vulnerabilities are bugs, Let's test for them!ichikaway
 
Automating your ms world part 3 a brand new way to monitor with am ps web
Automating your ms world part 3 a brand new way to monitor with am ps   webAutomating your ms world part 3 a brand new way to monitor with am ps   web
Automating your ms world part 3 a brand new way to monitor with am ps webSolarwinds N-able
 
VA_InterConnect2017
VA_InterConnect2017VA_InterConnect2017
VA_InterConnect2017Canturk Isci
 

Similar to HMM-Web: a framework for the detection of attacks against Web applications (20)

Ankita- Hacker Proof your app using Functional Tests
Ankita- Hacker Proof your app using Functional TestsAnkita- Hacker Proof your app using Functional Tests
Ankita- Hacker Proof your app using Functional Tests
 
IBM elm alm overview-software engineerin-lifecycle-management
IBM elm alm overview-software engineerin-lifecycle-managementIBM elm alm overview-software engineerin-lifecycle-management
IBM elm alm overview-software engineerin-lifecycle-management
 
End-to-End and e-Business Value from the Telematics Reference Implementation ...
End-to-End and e-Business Value from the Telematics Reference Implementation ...End-to-End and e-Business Value from the Telematics Reference Implementation ...
End-to-End and e-Business Value from the Telematics Reference Implementation ...
 
How to Integrate AppSec Testing into your DevOps Program
How to Integrate AppSec Testing into your DevOps Program How to Integrate AppSec Testing into your DevOps Program
How to Integrate AppSec Testing into your DevOps Program
 
4.4.2013 Software Quality - Regression Testing Automated and Manual - RFT/RQM
4.4.2013 Software Quality - Regression Testing Automated and Manual - RFT/RQM4.4.2013 Software Quality - Regression Testing Automated and Manual - RFT/RQM
4.4.2013 Software Quality - Regression Testing Automated and Manual - RFT/RQM
 
Delivering Java Applications? Ensure Top Performance Every Time, with Intell...
 Delivering Java Applications? Ensure Top Performance Every Time, with Intell... Delivering Java Applications? Ensure Top Performance Every Time, with Intell...
Delivering Java Applications? Ensure Top Performance Every Time, with Intell...
 
Automation testing strategy, approach & planning
Automation testing  strategy, approach & planningAutomation testing  strategy, approach & planning
Automation testing strategy, approach & planning
 
ims1-07-bhatia-ip-unity
ims1-07-bhatia-ip-unityims1-07-bhatia-ip-unity
ims1-07-bhatia-ip-unity
 
Simplify Troubleshooting With Context in Your Logs
Simplify Troubleshooting With Context in Your LogsSimplify Troubleshooting With Context in Your Logs
Simplify Troubleshooting With Context in Your Logs
 
Developing-Effective-Mass-Migration-Strategy-out-of-a-Tool-based-Portfolio-As...
Developing-Effective-Mass-Migration-Strategy-out-of-a-Tool-based-Portfolio-As...Developing-Effective-Mass-Migration-Strategy-out-of-a-Tool-based-Portfolio-As...
Developing-Effective-Mass-Migration-Strategy-out-of-a-Tool-based-Portfolio-As...
 
Cloud Computing Latest
Cloud Computing LatestCloud Computing Latest
Cloud Computing Latest
 
Vulnerabilities are bugs, Let's Test For Them!
Vulnerabilities are bugs, Let's Test For Them!Vulnerabilities are bugs, Let's Test For Them!
Vulnerabilities are bugs, Let's Test For Them!
 
Digital Security by Design: Imperas’ Interests - Simon Davidmann, Imperas Sof...
Digital Security by Design: Imperas’ Interests - Simon Davidmann, Imperas Sof...Digital Security by Design: Imperas’ Interests - Simon Davidmann, Imperas Sof...
Digital Security by Design: Imperas’ Interests - Simon Davidmann, Imperas Sof...
 
Managing Your Application Security Program with the ThreadFix Ecosystem
Managing Your Application Security Program with the ThreadFix EcosystemManaging Your Application Security Program with the ThreadFix Ecosystem
Managing Your Application Security Program with the ThreadFix Ecosystem
 
Lightweight Self-Protecting JavaScript
Lightweight Self-Protecting JavaScriptLightweight Self-Protecting JavaScript
Lightweight Self-Protecting JavaScript
 
2019 ibm io t exchange - meeting safety-related software audits
2019   ibm io t exchange - meeting safety-related software audits2019   ibm io t exchange - meeting safety-related software audits
2019 ibm io t exchange - meeting safety-related software audits
 
IBM BlueMix Presentation - Paris Meetup 17th Sept. 2014
IBM BlueMix Presentation - Paris Meetup 17th Sept. 2014IBM BlueMix Presentation - Paris Meetup 17th Sept. 2014
IBM BlueMix Presentation - Paris Meetup 17th Sept. 2014
 
Vulnerabilities are bugs, Let's test for them!
Vulnerabilities are bugs, Let's test for them!Vulnerabilities are bugs, Let's test for them!
Vulnerabilities are bugs, Let's test for them!
 
Automating your ms world part 3 a brand new way to monitor with am ps web
Automating your ms world part 3 a brand new way to monitor with am ps   webAutomating your ms world part 3 a brand new way to monitor with am ps   web
Automating your ms world part 3 a brand new way to monitor with am ps web
 
VA_InterConnect2017
VA_InterConnect2017VA_InterConnect2017
VA_InterConnect2017
 

More from Pluribus One

Smart Textiles - Prospettive di mercato - Davide Ariu
Smart Textiles - Prospettive di mercato - Davide Ariu Smart Textiles - Prospettive di mercato - Davide Ariu
Smart Textiles - Prospettive di mercato - Davide Ariu Pluribus One
 
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...Pluribus One
 
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...Pluribus One
 
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...Pluribus One
 
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019Pluribus One
 
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...Pluribus One
 
On Security and Sparsity of Linear Classifiers for Adversarial Settings
On Security and Sparsity of Linear Classifiers for Adversarial SettingsOn Security and Sparsity of Linear Classifiers for Adversarial Settings
On Security and Sparsity of Linear Classifiers for Adversarial SettingsPluribus One
 
Secure Kernel Machines against Evasion Attacks
Secure Kernel Machines against Evasion AttacksSecure Kernel Machines against Evasion Attacks
Secure Kernel Machines against Evasion AttacksPluribus One
 
Machine Learning under Attack: Vulnerability Exploitation and Security Measures
Machine Learning under Attack: Vulnerability Exploitation and Security MeasuresMachine Learning under Attack: Vulnerability Exploitation and Security Measures
Machine Learning under Attack: Vulnerability Exploitation and Security MeasuresPluribus One
 
Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...
Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...
Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...Pluribus One
 
Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...
Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...
Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...Pluribus One
 
Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...
Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...
Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...Pluribus One
 
Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...
Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...
Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...Pluribus One
 
Battista Biggio @ AISec 2014 - Poisoning Behavioral Malware Clustering
Battista Biggio @ AISec 2014 - Poisoning Behavioral Malware ClusteringBattista Biggio @ AISec 2014 - Poisoning Behavioral Malware Clustering
Battista Biggio @ AISec 2014 - Poisoning Behavioral Malware ClusteringPluribus One
 
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...Pluribus One
 
Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Sec...
Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Sec...Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Sec...
Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Sec...Pluribus One
 
Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...
Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...
Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...Pluribus One
 
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"Pluribus One
 
Zahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense SlidesZahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense SlidesPluribus One
 
Design of robust classifiers for adversarial environments - Systems, Man, and...
Design of robust classifiers for adversarial environments - Systems, Man, and...Design of robust classifiers for adversarial environments - Systems, Man, and...
Design of robust classifiers for adversarial environments - Systems, Man, and...Pluribus One
 

More from Pluribus One (20)

Smart Textiles - Prospettive di mercato - Davide Ariu
Smart Textiles - Prospettive di mercato - Davide Ariu Smart Textiles - Prospettive di mercato - Davide Ariu
Smart Textiles - Prospettive di mercato - Davide Ariu
 
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...
 
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...
 
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...
 
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
 
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...
 
On Security and Sparsity of Linear Classifiers for Adversarial Settings
On Security and Sparsity of Linear Classifiers for Adversarial SettingsOn Security and Sparsity of Linear Classifiers for Adversarial Settings
On Security and Sparsity of Linear Classifiers for Adversarial Settings
 
Secure Kernel Machines against Evasion Attacks
Secure Kernel Machines against Evasion AttacksSecure Kernel Machines against Evasion Attacks
Secure Kernel Machines against Evasion Attacks
 
Machine Learning under Attack: Vulnerability Exploitation and Security Measures
Machine Learning under Attack: Vulnerability Exploitation and Security MeasuresMachine Learning under Attack: Vulnerability Exploitation and Security Measures
Machine Learning under Attack: Vulnerability Exploitation and Security Measures
 
Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...
Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...
Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...
 
Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...
Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...
Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...
 
Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...
Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...
Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...
 
Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...
Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...
Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...
 
Battista Biggio @ AISec 2014 - Poisoning Behavioral Malware Clustering
Battista Biggio @ AISec 2014 - Poisoning Behavioral Malware ClusteringBattista Biggio @ AISec 2014 - Poisoning Behavioral Malware Clustering
Battista Biggio @ AISec 2014 - Poisoning Behavioral Malware Clustering
 
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
 
Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Sec...
Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Sec...Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Sec...
Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Sec...
 
Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...
Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...
Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...
 
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
 
Zahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense SlidesZahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense Slides
 
Design of robust classifiers for adversarial environments - Systems, Man, and...
Design of robust classifiers for adversarial environments - Systems, Man, and...Design of robust classifiers for adversarial environments - Systems, Man, and...
Design of robust classifiers for adversarial environments - Systems, Man, and...
 

Recently uploaded

Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 

Recently uploaded (20)

Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 

HMM-Web: a framework for the detection of attacks against Web applications

  • 1. PRA Pattern Recognition and Applications Group! HMM-Web: a framework for the detection off attacks against Web Applications I. Corona, D. Ariu, G. Giacinto Presenter Davide Ariu Pattern Recognition and Applications Group P R A Department of Electrical and Electronic Engineering University of Cagliari, Italy June 17, 2009 ICC 2009 - HMMWeb - Davide Ariu 1
  • 2. Outline •  Motivations •  HMM-Web vs. Web Application Firewalls •  Description of the IDS Scheme •  Noise inside the training set •  Sequences codification •  Experimental Setup •  Experimental Results •  Conclusions June 17, 2009 ICC 2009 - HMMWeb - Davide Ariu 2
  • 3. Motivations Why we do address the problem of securing Web Applications? June 17, 2009 ICC 2009 - HMMWeb - Davide Ariu 3
  • 4. Motivations Source: X-Force® 2008 Trend & Risk Report – January 2009 June 17, 2009 ICC 2009 - HMMWeb - Davide Ariu 4
  • 5. Motivations Source: X-Force® 2008 Trend & Risk Report – January 2009 June 17, 2009 ICC 2009 - HMMWeb - Davide Ariu 5
  • 6. Protection of Web Applications •  Web Applications can be protected using a Web-Application Firewall (WAF) –  WAF filter applications’ input using a set of rules. •  Writing rules for a Web-Application Firewall is a procedure: –  Vulnerable to zero-days attacks •  WAF can’t stop an attack if it doesn’t have a rule against it –  Time Expensive •  Rules must be written by hand by the administrator –  Prone to errors •  Requires the administrator having an in-depth knowledge of applications which reside on the Web-Server June 17, 2009 ICC 2009 - HMMWeb - Davide Ariu 6
  • 7. HMM-Web •  HMM-Web addresses all of the weaknesses of Web-Application Firewalls because is an Intrusion Detection System: –  Anomaly Based •  This means which is also able to face with zero-days attacks –  Fully Automated for what concerns the training procedure •  Time saving •  Doesn’t require the administrator having knowledge of applications which reside on the Web-Server June 17, 2009 ICC 2009 - HMMWeb - Davide Ariu 7
  • 8. An usage scenario June 17, 2009 ICC 2009 - HMMWeb - Davide Ariu 8
  • 9. Request URI Modelling •  As attacks like XSS and SQL-Injection exploit input validation flaws, we want to model the input provided by the user. •  User-provided data are passed by the browser to the Web-Server (then to the application) using a sequence of attribute-value pairs. •  Consequently, we want to model: –  The sequence of attributes –  The value of each attribute June 17, 2009 ICC 2009 - HMMWeb - Davide Ariu 9
  • 10. Request URI Modelling •  From the example request URI GET /search.php?cat=32&key=hmm HTTP/1.1 we extract: –  The name of the application: “search.php” –  The sequence of attributes: “cat-key” –  The value of each attribute: •  “32” for the attribute cat •  “hmm” for the attribute key •  These are the elements that HMM-Web analyses June 17, 2009 ICC 2009 - HMMWeb - Davide Ariu 10
  • 11. Classifier Ensemble •  HMM-Web is based on Hidden Markov Models •  For each application running on the Web Server HMM-Web creates a module consisting of –  An HMM-Ensemble to model the sequence of attributes •  This feature allows to detect request URI modified by hand –  An HMM-Ensemble for each one of attributes received by the Web Application •  This feature allows to detect if one attribute is receiving an anomalous value. June 17, 2009 ICC 2009 - HMMWeb - Davide Ariu 11
  • 12. IDS-Scheme June 17, 2009 ICC 2009 - HMMWeb - Davide Ariu 12
  • 13. Noise in the training set •  HMM-Web is trained on a training set made of requests toward the Web-Server we want to protect. •  This means that this training set might contain both legitimate and attack requests. •  From a Pattern Recognition point of view,this is a problem of training on noisy data.. How does this noise affect HMM-Web performances? June 17, 2009 ICC 2009 - HMMWeb - Davide Ariu 13
  • 14. Noise in the training set •  The assumption that the most part of queries inside the training set is legitimate is not reasonable for applications which are rarely interrogated. June 17, 2009 ICC 2009 - HMMWeb - Davide Ariu 14
  • 15. Noise in the training set Countermeasure •  We propose to model the fraction of attacks inside the training set as: M 1 α = ∑α i ⋅ | q(w i ) | N i=1 •  Where: –  M is the number of applications on the Web Server –  N is the number of queries in the training set –  | q(w i ) | is the number of queries on the i-th application –  α i is the fraction of attacks on the i-th application € How can we estimate effectively αi € € for each application? June 17, 2009 ICC 2009 - HMMWeb - Davide Ariu 15
  • 16. Noise in the training set Countermeasure •  Experimental results show that even a rough estimate of the amount of attacks inside the training set, allows to improve the performances of the IDS. •  A good estimate of α i is that provided by the following formula: α αi = , ∀i ∈ [1, M ] M ⋅ freq(w i ) •  freq(w i ) is € simply the ratio between the number of queries toward the i-th application and the overall number of queries. € € June 17, 2009 ICC 2009 - HMMWeb - Davide Ariu 16
  • 17. Attribute value codification •  The values passed to the attributes might contain digits, alphabetic letters or meta- characters. •  As it is not important distinguishing between elements belonging to each one of these categories, HMM-Web –  Replaces all the digits with the symbol “N” –  Replaces all the alphabetic letters with the symbol “A” –  Leaves immutate meta-characters •  E.g. The attribute value “/dir/sub/1,2” becomes “/AAA/AAA/N,N” June 17, 2009 ICC 2009 - HMMWeb - Davide Ariu 17
  • 18. Experimental Setup •  We tested HMM-Web on a production Web- Server of our Academic Institution. •  The Web-Server hosts 52 Applications: –  24 provide services for registered users –  28 provide public services •  Dataset D: 150.000 queries toward the Web – Server •  Dataset A: 38 attacks against 18 applications –  19 Cross Site Scripting Attacks –  19 SQL Injection Attacks June 17, 2009 ICC 2009 - HMMWeb - Davide Ariu 18
  • 19. Experimental Results Effectiveness of attributes’ codification The curve on the right has been obtained using the codification proposed by Kruegel et al. In “A multimodel approach to the detection of web-based attacks”, Computer Networks, 2005. June 17, 2009 ICC 2009 - HMMWeb - Davide Ariu 19
  • 20. Experimental Result Effectiveness of the MCS Approach June 17, 2009 ICC 2009 - HMMWeb - Davide Ariu 20
  • 21. Conclusions •  In this work we propose an anomaly-based IDS for the protection of Web-Applications •  Respect to traditional WAF HMM-Web is able to face with zero-days attacks and doesn’t require the administrator having an in-dept knowledge of applications to be protected. •  We suggest also a solution for the codification of queries toward the web server and a strategy to take into account the noise into the training set. •  HMM-Web achieves excellent results in terms of detection/false positive rate, even against attacks that are similar to those inside the training set. June 17, 2009 ICC 2009 - HMMWeb - Davide Ariu 21
  • 22. Questions? June 17, 2009 ICC 2009 - HMMWeb - Davide Ariu 22