一类基于Node.js Web应用的软件层DoS攻击

Tuong Phi Lau
{"title":"一类基于Node.js Web应用的软件层DoS攻击","authors":"Tuong Phi Lau","doi":"10.1109/CSP55486.2022.00028","DOIUrl":null,"url":null,"abstract":"Application-level DoS attacks are occurring more frequently and raise more serious threats. Such attacks can be performed advantageously in node.js web apps, as these apps are built by third-party npm packages. Adversaries may inject malicious data into its client requests submitted to a victim server. It then may manipulate program states to pass the malicious input to sensitive APIs as long-running operations which are resided in npm modules required in the node.js web app. Once the sensitive APIs (e.g. pattern matching) can be called with hard-to-match input string, it may impose degradation of the worker pool’s throughput of the web server to interrupt web services accessed by Internet users. This attack vector is defined as Module-driven DoS (MDoS).This paper presents a class of software-level DoS so called MDoS, and an automated approach implementing inter-modular analysis to detect vulnerable npm modules exploitable for these vulnerabilities. The proposed method is evaluated on a dataset of 17,000 modules downloaded from the npm ecosystem. As a result, the automated analysis flagged out 355 vulnerable modules. Using manual code inspection found 237 true positives of 35 exposed to the MDoS, including 214 modules exploitable for launching ReDoS and 23 remaining ones suspicious for executing ReadDoS attacks indirectly.","PeriodicalId":187713,"journal":{"name":"2022 6th International Conference on Cryptography, Security and Privacy (CSP)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Class of Software-Layer DoS Attacks in Node.js Web Apps\",\"authors\":\"Tuong Phi Lau\",\"doi\":\"10.1109/CSP55486.2022.00028\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Application-level DoS attacks are occurring more frequently and raise more serious threats. Such attacks can be performed advantageously in node.js web apps, as these apps are built by third-party npm packages. Adversaries may inject malicious data into its client requests submitted to a victim server. It then may manipulate program states to pass the malicious input to sensitive APIs as long-running operations which are resided in npm modules required in the node.js web app. Once the sensitive APIs (e.g. pattern matching) can be called with hard-to-match input string, it may impose degradation of the worker pool’s throughput of the web server to interrupt web services accessed by Internet users. This attack vector is defined as Module-driven DoS (MDoS).This paper presents a class of software-level DoS so called MDoS, and an automated approach implementing inter-modular analysis to detect vulnerable npm modules exploitable for these vulnerabilities. The proposed method is evaluated on a dataset of 17,000 modules downloaded from the npm ecosystem. As a result, the automated analysis flagged out 355 vulnerable modules. Using manual code inspection found 237 true positives of 35 exposed to the MDoS, including 214 modules exploitable for launching ReDoS and 23 remaining ones suspicious for executing ReadDoS attacks indirectly.\",\"PeriodicalId\":187713,\"journal\":{\"name\":\"2022 6th International Conference on Cryptography, Security and Privacy (CSP)\",\"volume\":\"52 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 6th International Conference on Cryptography, Security and Privacy (CSP)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CSP55486.2022.00028\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 6th International Conference on Cryptography, Security and Privacy (CSP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSP55486.2022.00028","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

应用程序级DoS攻击越来越频繁,威胁也越来越严重。这种攻击可以在node.js web应用中进行,因为这些应用是由第三方npm包构建的。攻击者可能会将恶意数据注入提交给受害服务器的客户端请求中。然后,它可能会操纵程序状态,将恶意输入作为长期运行的操作传递给敏感api,这些操作驻留在node.js web应用程序中所需的npm模块中。一旦敏感api(例如模式匹配)可以用难以匹配的输入字符串调用,它可能会降低web服务器的工作池吞吐量,从而中断互联网用户访问的web服务。这种攻击向量被定义为模块驱动的DoS (Module-driven DoS)。本文介绍了一类被称为MDoS的软件级DoS,以及一种实现模块化间分析的自动化方法,以检测可利用这些漏洞的易受攻击的npm模块。该方法在从npm生态系统下载的17,000个模块的数据集上进行了评估。结果,自动分析标记出355个易受攻击的模块。通过手动代码检查,发现35个暴露给dos的模块中有237个是阳性的,其中214个模块可用于启动ReDoS,其余23个模块可用于间接执行ReadDoS攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A Class of Software-Layer DoS Attacks in Node.js Web Apps
Application-level DoS attacks are occurring more frequently and raise more serious threats. Such attacks can be performed advantageously in node.js web apps, as these apps are built by third-party npm packages. Adversaries may inject malicious data into its client requests submitted to a victim server. It then may manipulate program states to pass the malicious input to sensitive APIs as long-running operations which are resided in npm modules required in the node.js web app. Once the sensitive APIs (e.g. pattern matching) can be called with hard-to-match input string, it may impose degradation of the worker pool’s throughput of the web server to interrupt web services accessed by Internet users. This attack vector is defined as Module-driven DoS (MDoS).This paper presents a class of software-level DoS so called MDoS, and an automated approach implementing inter-modular analysis to detect vulnerable npm modules exploitable for these vulnerabilities. The proposed method is evaluated on a dataset of 17,000 modules downloaded from the npm ecosystem. As a result, the automated analysis flagged out 355 vulnerable modules. Using manual code inspection found 237 true positives of 35 exposed to the MDoS, including 214 modules exploitable for launching ReDoS and 23 remaining ones suspicious for executing ReadDoS attacks indirectly.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信