Puppetnets: Misusing Web Browsers as a Distributed Attack Infrastructure

CCS(2008)

引用 38|浏览13
暂无评分
摘要
Most of the recent work on Web security focuses on preventing attacks that directly harm the browser’s host machine and user. In this paper we attempt to quantify the threat of browsers being indirectly misused for attacking third parties. Specifically, we look at how the existing Web infrastructure (e.g., the languages, protocols, and security policies) can be exploited by malicious or subverted Web sites to remotely instruct browsers to orchestrate actions including denial of service attacks, worm propagation, and reconnaissance scans. We show that attackers are able to create powerful botnet-like infrastructures that can cause significant damage. We explore the effectiveness of countermeasures including anomaly detection and more fine-grained browser security policies.
更多
查看译文
关键词
anomaly detection,existing Web infrastructure,instruct browser,web security,fine-grained browser security policy,Misusing Web Browsers,distributed attacks,Attack Infrastructure,powerful botnet-like infrastructure,host machine,recent work,security policy,Web security,malicious software,Web site
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要