对检测和防止网站污损的贡献

Barerem-Melgueba Mao, Kanlanfei Damnam Bagolibe
{"title":"对检测和防止网站污损的贡献","authors":"Barerem-Melgueba Mao, Kanlanfei Damnam Bagolibe","doi":"10.1109/CW.2019.00062","DOIUrl":null,"url":null,"abstract":"One of the most common hackers attacks on organizations public communication infrastructure is website defacement. This attack consists of modifying the appearance of a website by affixing a signature or a particular message or making the website inactive. The goals of web defacement are diverse and range from simply recognizing the technical prowess of the hacker to claims messages posted on the victim's website by minority groups, referred to as hacktivism. The main consequence of this attack is the loss of credibility of the hacked organization. This can, in some cases, lead to indirect economic losses because of the distorted web content conveyed by the hacked organization. Since websites carry a very large amount of information, it is very important to protect them from this form of attack. In most cases, the defense against web defacement relies on monitoring websites and restoring the system after the incident occurred. The time between the execution of the attack and the system's restoration time is highly dependent on the performance of the website's monitoring tool and the response capacity of the technical teams. Most of website defacement defense tools available on the market are generally based on the verification of the integrity of the data and the notification of the administrators when signatures change. This technique is more or less effective for static websites subjected to weak modification cycles. For dynamic websites, interfaced with databases or syndicated, where the changes are relatively short and random, it becomes almost impossible to use techniques based solely on signature verification and data integrity to know if a website was attacked. This work proposes a model that combines several techniques (data integrity analysis, changes of the value of an artifice and the adoption of high availability architecture) to be used to develop a tool against this type of attacks.","PeriodicalId":117409,"journal":{"name":"2019 International Conference on Cyberworlds (CW)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"A Contribution to Detect and Prevent a Website Defacement\",\"authors\":\"Barerem-Melgueba Mao, Kanlanfei Damnam Bagolibe\",\"doi\":\"10.1109/CW.2019.00062\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"One of the most common hackers attacks on organizations public communication infrastructure is website defacement. This attack consists of modifying the appearance of a website by affixing a signature or a particular message or making the website inactive. The goals of web defacement are diverse and range from simply recognizing the technical prowess of the hacker to claims messages posted on the victim's website by minority groups, referred to as hacktivism. The main consequence of this attack is the loss of credibility of the hacked organization. This can, in some cases, lead to indirect economic losses because of the distorted web content conveyed by the hacked organization. Since websites carry a very large amount of information, it is very important to protect them from this form of attack. In most cases, the defense against web defacement relies on monitoring websites and restoring the system after the incident occurred. The time between the execution of the attack and the system's restoration time is highly dependent on the performance of the website's monitoring tool and the response capacity of the technical teams. Most of website defacement defense tools available on the market are generally based on the verification of the integrity of the data and the notification of the administrators when signatures change. This technique is more or less effective for static websites subjected to weak modification cycles. For dynamic websites, interfaced with databases or syndicated, where the changes are relatively short and random, it becomes almost impossible to use techniques based solely on signature verification and data integrity to know if a website was attacked. This work proposes a model that combines several techniques (data integrity analysis, changes of the value of an artifice and the adoption of high availability architecture) to be used to develop a tool against this type of attacks.\",\"PeriodicalId\":117409,\"journal\":{\"name\":\"2019 International Conference on Cyberworlds (CW)\",\"volume\":\"29 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 International Conference on Cyberworlds (CW)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CW.2019.00062\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Cyberworlds (CW)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CW.2019.00062","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

黑客对组织公共通信基础设施的最常见攻击之一是网站破坏。这种攻击包括通过添加签名或特定消息或使网站不活动来修改网站的外观。网络污损的目的是多种多样的,从简单地承认黑客的技术实力到声称少数群体在受害者网站上发布的信息,被称为黑客行动主义。这种攻击的主要后果是被攻击组织失去信誉。在某些情况下,这可能会导致间接的经济损失,因为被黑客组织所传达的扭曲的网络内容。由于网站承载了大量的信息,因此保护它们免受这种形式的攻击是非常重要的。在大多数情况下,对网络污损的防御依赖于监控网站并在事件发生后恢复系统。执行攻击和系统恢复时间之间的时间高度依赖于网站监控工具的性能和技术团队的响应能力。市面上大多数网站污损防御工具,一般都是基于对数据完整性的验证,并在签名发生变化时通知管理员。这种技术或多或少是有效的静态网站遭受弱修改周期。对于动态网站,与数据库或联合的接口,其中的变化相对较短和随机,几乎不可能使用基于签名验证和数据完整性的技术来知道网站是否受到攻击。这项工作提出了一个模型,该模型结合了几种技术(数据完整性分析,设备价值的变化和高可用性架构的采用),用于开发针对此类攻击的工具。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A Contribution to Detect and Prevent a Website Defacement
One of the most common hackers attacks on organizations public communication infrastructure is website defacement. This attack consists of modifying the appearance of a website by affixing a signature or a particular message or making the website inactive. The goals of web defacement are diverse and range from simply recognizing the technical prowess of the hacker to claims messages posted on the victim's website by minority groups, referred to as hacktivism. The main consequence of this attack is the loss of credibility of the hacked organization. This can, in some cases, lead to indirect economic losses because of the distorted web content conveyed by the hacked organization. Since websites carry a very large amount of information, it is very important to protect them from this form of attack. In most cases, the defense against web defacement relies on monitoring websites and restoring the system after the incident occurred. The time between the execution of the attack and the system's restoration time is highly dependent on the performance of the website's monitoring tool and the response capacity of the technical teams. Most of website defacement defense tools available on the market are generally based on the verification of the integrity of the data and the notification of the administrators when signatures change. This technique is more or less effective for static websites subjected to weak modification cycles. For dynamic websites, interfaced with databases or syndicated, where the changes are relatively short and random, it becomes almost impossible to use techniques based solely on signature verification and data integrity to know if a website was attacked. This work proposes a model that combines several techniques (data integrity analysis, changes of the value of an artifice and the adoption of high availability architecture) to be used to develop a tool against this type of attacks.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信