Detecting and Explaining Anomalies Caused by Web Tamper Attacks via Building Consistency-based Normality

Web applications are crucial infrastructures in the modern society, which have high demand of reliability and security. However, their frontend can be manipulable by the clients (e.g., the frontend code can be modified to bypass some validation steps), which incurs the runtime anomaly when operating...

Full description

Saved in:
Bibliographic Details
Published inIEEE/ACM International Conference on Automated Software Engineering : [proceedings] pp. 531 - 543
Main Authors Liao, Yifan, Xu, Ming, Lin, Yun, Teoh, Xiwen, Xie, Xiaofei, Feng, Ruitao, Liauw, Frank, Zhang, Hongyu, Dong, Jin Song
Format Conference Proceeding
LanguageEnglish
Published ACM 27.10.2024
Subjects
Online AccessGet full text
ISSN2643-1572
DOI10.1145/3691620.3695024

Cover

Abstract Web applications are crucial infrastructures in the modern society, which have high demand of reliability and security. However, their frontend can be manipulable by the clients (e.g., the frontend code can be modified to bypass some validation steps), which incurs the runtime anomaly when operating the web service. Existing state-of-the-art anomaly detectors largely learn a deep learning model from the collected logs to predict abnormal logs with a probability. While effective in general, those approaches can suffer from (1) inaccuracy caused by subtle difference between the normal and abnormal/attack logs and (2) additional efforts for root cause analysis.In this work, we propose WebNorm, an anomaly detection approach to detect and explain the attack-caused anomalies on web applications in a unified way. Our rationale lies in learning the behaviorial normalities of a running web application as invariants. The normalities are designed regarding data normality (e.g., what information must be consistent across different events), flow normality (e.g., what events must happen under certain circumstances), and common-sense normality (e.g., what is the normal range of some parameters). The violation of the invariants indicates both the alarm and its explanation. WebNorm first monitors the normal behaviors of subject application and captures its information flows between entities such as frontend, service, and database. Then, it learns the behaviorial normalities in terms of logical rules so that it can detect and explain behaviorial anomaly by the inconsistency between the learned normalities and the runtime application behaviors. We model the invariants as first-order logics, transferrable to executable Python scripts to generate alarm with explainable root cause. Our extensive experiment shows that, on detecting the tamper attacks on the web applications as TrainTicket and NiceFish. WebNorm improves the precision and the recall of the baselines such as LogAnomaly, LogRobust, DeepLog, NeuralLog, PLELog, ReplicaWatcher by more than 56.1% and 35.1% respectively, serving as a new state-of-the-art anomaly detection solution.
AbstractList Web applications are crucial infrastructures in the modern society, which have high demand of reliability and security. However, their frontend can be manipulable by the clients (e.g., the frontend code can be modified to bypass some validation steps), which incurs the runtime anomaly when operating the web service. Existing state-of-the-art anomaly detectors largely learn a deep learning model from the collected logs to predict abnormal logs with a probability. While effective in general, those approaches can suffer from (1) inaccuracy caused by subtle difference between the normal and abnormal/attack logs and (2) additional efforts for root cause analysis.In this work, we propose WebNorm, an anomaly detection approach to detect and explain the attack-caused anomalies on web applications in a unified way. Our rationale lies in learning the behaviorial normalities of a running web application as invariants. The normalities are designed regarding data normality (e.g., what information must be consistent across different events), flow normality (e.g., what events must happen under certain circumstances), and common-sense normality (e.g., what is the normal range of some parameters). The violation of the invariants indicates both the alarm and its explanation. WebNorm first monitors the normal behaviors of subject application and captures its information flows between entities such as frontend, service, and database. Then, it learns the behaviorial normalities in terms of logical rules so that it can detect and explain behaviorial anomaly by the inconsistency between the learned normalities and the runtime application behaviors. We model the invariants as first-order logics, transferrable to executable Python scripts to generate alarm with explainable root cause. Our extensive experiment shows that, on detecting the tamper attacks on the web applications as TrainTicket and NiceFish. WebNorm improves the precision and the recall of the baselines such as LogAnomaly, LogRobust, DeepLog, NeuralLog, PLELog, ReplicaWatcher by more than 56.1% and 35.1% respectively, serving as a new state-of-the-art anomaly detection solution.
Author Teoh, Xiwen
Lin, Yun
Liauw, Frank
Feng, Ruitao
Dong, Jin Song
Xu, Ming
Liao, Yifan
Zhang, Hongyu
Xie, Xiaofei
Author_xml – sequence: 1
  givenname: Yifan
  surname: Liao
  fullname: Liao, Yifan
  email: yifan.liao@nusricq.cn
  organization: Shanghai Jiao Tong University,China
– sequence: 2
  givenname: Ming
  surname: Xu
  fullname: Xu, Ming
  email: mingxu@nus.edu.sg
  organization: Shanghai Jiao Tong University,China
– sequence: 3
  givenname: Yun
  surname: Lin
  fullname: Lin, Yun
  email: lin_yun@sjtu.edu.cn
  organization: Shanghai Jiao Tong University,China
– sequence: 4
  givenname: Xiwen
  surname: Teoh
  fullname: Teoh, Xiwen
  email: xiwen@nus.edu.sg
  organization: National University of Singapore,Singapore,Singapore
– sequence: 5
  givenname: Xiaofei
  surname: Xie
  fullname: Xie, Xiaofei
  email: xfxie@smu.edu.sg
  organization: Singapore Management University,Singapore,Singapore
– sequence: 6
  givenname: Ruitao
  surname: Feng
  fullname: Feng, Ruitao
  email: rtfeng@smu.edu.sg
  organization: Singapore Management University,Singapore,Singapore
– sequence: 7
  givenname: Frank
  surname: Liauw
  fullname: Liauw, Frank
  email: Frank_LIAUW@tech.gov.sg
  organization: Government Technology Agency of Singapore,Singapore,Singapore
– sequence: 8
  givenname: Hongyu
  surname: Zhang
  fullname: Zhang, Hongyu
  email: hongyujohn@gmail.com
  organization: Chongqing University,China
– sequence: 9
  givenname: Jin Song
  surname: Dong
  fullname: Dong, Jin Song
  email: dcsdjs@nus.edu.sg
  organization: National University of Singapore,Singapore,Singapore
BookMark eNotkD1PwzAYhA0CiVIyszD4D6T4tR27GUsoH1IFSxFjZSevwSJ1qthF5N-TCKa7G57T6S7JWegCEnINbAEgi1uhSlCcLUYtGJcnJCt1uZSMaeByqU_JjCspcig0vyBZjN6y0RYKQM3I5z0mrJMPH9SEhq5_Dq3xYYqr0O1N6zHSyhwjNtQO9B0t3Zr9AXu6SsnUX5F-e0Pvjr5tJqbqQvQxYaiH3JoJeun6qSUNV-TcmTZi9q9z8vaw3lZP-eb18blabXIzjk25dNqBUAJQS6fqUoPUEmpXFhY148o2lnMntQXuoJS1s8IqIewSCw6KMTEnN3-9HhF3h97vTT_sgGk1nlOKX7baWWc
CODEN IEEPAD
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1145/3691620.3695024
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISBN 9798400712487
EISSN 2643-1572
EndPage 543
ExternalDocumentID 10765029
Genre orig-research
GroupedDBID 6IE
6IF
6IH
6IK
6IL
6IM
6IN
6J9
AAJGR
AAWTH
ABLEC
ACREN
ADYOE
ADZIZ
AFYQB
ALMA_UNASSIGNED_HOLDINGS
AMTXH
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IEGSK
IPLJI
M43
OCL
RIE
RIL
ID FETCH-LOGICAL-a248t-4f7f13631e74f6c9714741cf95be7026bdb22f47b12f194cfb3b633b8e5216003
IEDL.DBID RIE
IngestDate Wed Jan 15 06:20:43 EST 2025
IsPeerReviewed false
IsScholarly true
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-a248t-4f7f13631e74f6c9714741cf95be7026bdb22f47b12f194cfb3b633b8e5216003
PageCount 13
ParticipantIDs ieee_primary_10765029
PublicationCentury 2000
PublicationDate 2024-Oct.-27
PublicationDateYYYYMMDD 2024-10-27
PublicationDate_xml – month: 10
  year: 2024
  text: 2024-Oct.-27
  day: 27
PublicationDecade 2020
PublicationTitle IEEE/ACM International Conference on Automated Software Engineering : [proceedings]
PublicationTitleAbbrev ASE
PublicationYear 2024
Publisher ACM
Publisher_xml – name: ACM
SSID ssib057256116
ssj0051577
Score 2.289874
Snippet Web applications are crucial infrastructures in the modern society, which have high demand of reliability and security. However, their frontend can be...
SourceID ieee
SourceType Publisher
StartPage 531
SubjectTerms Anomaly detection
Detectors
log detection
Logic
Monitoring
Predictive models
Python
Reliability
Runtime
Security
web security
Web services
Title Detecting and Explaining Anomalies Caused by Web Tamper Attacks via Building Consistency-based Normality
URI https://ieeexplore.ieee.org/document/10765029
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjZ1LS8NAEMcX25On-qj4Zg9eU7uP7DbHWi0iWDy02FvJZicoYiptItRP70weioLgLYQQlt3ZzG-yM_Nn7AL6sZSJ7wfCewxQFCUBgHUEcn1HDk-XWof3E3M703fzcF4Xq5e1MABQJp9Bjy7Ls3y_TAr6VYY73CJQyKjFWmhnVbFWYzyhRectiHWqzzD6aWvrXj5Ch5fKIAhJjFFNhK_QP8RUSl8y7rBJM4oqheSlV-Sul3z8atD472HusO532R5_-HJIu2wLsj3WaXQbeL2N99nTNdDRAT7D48xzSsOrdCL4MFu-IpjDmo_iYg2euw1_BMenMdL1ig_znEry-ftzzK9qPW1eSn6uCb03AflEzyfEwYT3XTYb30xHt0GtuBDEUg_yQKc2FcooAVanJoms0EgcSRqFDixGa847KVNtnZCpiHSSOuWMUm4ASAGITuqAtbNlBoeMI6jhGvnEmZQa5GBgRn2EtDMIyJGMB0esSzO3eKuaaiyaSTv-4_4J25a4buQ2pD1l7XxVwBnyQO7OSzv4BMc3sqQ
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjZ3PS8MwFMeDzoOe5o-Jv83Ba-eSpsl6nNMxdSseNtxtNE2CInaytcL8632v7RQFwVsppYQ0yffzmrz3JeTCtmLOE9PymDEQoPh4CMAqjSDX0ih4ovA6HEayPxZ3k2BSJasXuTDW2uLwmW3iZbGXb2ZJjr_KYIYrAAoerpONAMIKVaZrrYZPoEC-GdJOuRCDUitVVfNhIrj0JaAQhyhVhvAS8cNOpVCTXp1Eq3aUh0hemnmmm8nHrxKN_27oNml8J-7Rhy9J2iFrNt0l9ZVzA60m8h55ura4eQDP0Dg1FA_ilU4RtJPOXgHN7YJ243xhDdVL-mg1HcXA13PayTJMyqfvzzG9qhy1aWH6uUD4XnqoioZGSMII-A0y7t2Mun2v8lzwYi7amSeccsyXPrNKOJmEiglgjsSFgbYK4jVtNOdOKM24Y6FInPa19H3dtsABAE_-Pqmls9QeEAqoBquBSbR0WCIHQjOsJCS0BEQOedw-JA3suelbWVZjuuq0oz_un5PN_mg4mA5uo_tjssXhG6KIcHVCatk8t6dAB5k-K8bEJ1uttfY
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=IEEE%2FACM+International+Conference+on+Automated+Software+Engineering+%3A+%5Bproceedings%5D&rft.atitle=Detecting+and+Explaining+Anomalies+Caused+by+Web+Tamper+Attacks+via+Building+Consistency-based+Normality&rft.au=Liao%2C+Yifan&rft.au=Xu%2C+Ming&rft.au=Lin%2C+Yun&rft.au=Teoh%2C+Xiwen&rft.date=2024-10-27&rft.pub=ACM&rft.eissn=2643-1572&rft.spage=531&rft.epage=543&rft_id=info:doi/10.1145%2F3691620.3695024&rft.externalDocID=10765029