As the world is increasingly turning to web-based applications for not only e-commerce, but also business tools and entertainment purposes, Web assets hosted in, for non-limiting examples, traditional datacenters, private clouds, public clouds, and other form factors are rapidly growing. These Web assets range from documents to media files and executable files in full, partial or compressed form hosted by, for a non-limiting example, Web applications, sites, and/or platforms. For non-limiting examples, partial form of files can be but is not limited to a macro inside an office document, a JS linked by a HTML document, and a code section or snippet of a Lambda Deployment Package. As the popularity of the hosted Web assets grows, there is an increasing need to ensure all of the Web assets are trust-worthy, authentic and tamper-free, as cyber criminals can utilize Web applications of the trusted Web assets to mount attacks against the users of these applications. If undetected and un-deterred, such attacks can easily penetrate and disrupt normal applications of the users.
In many cases, the Web application sites/platforms being attacked can be but are not limited to social networking sites, such as Facebook, Twitter, and Google+, where a large community of users can be affected when a document or URL on the Web site tampered by an attacker is shared among them. In order to stop the spoofed and/or malicious content from being distributed over the platforms and to protect the brands and reputation of the owners of the Web application platforms, it is desirable to be able to automatically scan all of the published Web assets on the platforms and actively provide preventative warning and mitigation if it is determined that such Web assets have been tampered as a result of malware attacks.
The foregoing examples of the related art and limitations related therewith are intended to be illustrative and not exclusive. Other limitations of the related art will become apparent upon a reading of the specification and a study of the drawings.
Aspects of the present disclosure are best understood from the following detailed description when read with the accompanying figures. It is noted that, in accordance with the standard practice in the industry, various features are not drawn to scale. In fact, the dimensions of the various features may be arbitrarily increased or reduced for clarity of discussion.
The following disclosure provides many different embodiments, or examples, for implementing different features of the subject matter. Specific examples of components and arrangements are described below to simplify the present disclosure. These are, of course, merely examples and are not intended to be limiting. In addition, the present disclosure may repeat reference numerals and/or letters in the various examples. This repetition is for the purpose of simplicity and clarity and does not in itself dictate a relationship between the various embodiments and/or configurations discussed. The approach is illustrated by way of example and not by way of limitation in the figures of the accompanying drawings in which like references indicate similar elements. It should be noted that references to “an” or “one” or “some” embodiment(s) in this disclosure are not necessarily to the same embodiment, and such references mean at least one.
A new approach is proposed that contemplates systems and methods to provide identification and mitigation of malware attack via Web assets hosted on a Web application, site, or platform in an automated and proactive manner. Here, the Web assets can be but are not limited to URLs, document objects and executable programs. From the moment the Web assets are hosted on the Web application platform and protected by a Web application security device, such as a Web application firewall, the hosted Web assets are constantly monitored and assessed for potential risks. Whenever there is a new instance or a modification of a Web asset, a copy of the Web asset is automatically downloaded and analyzed for potential vulnerabilities. If a suspicious indicator of malicious contents in the Web asset is detected during the analysis, a plurality of security policies are created and applied to the Web application security device to mitigate threats of the Web asset and protect users of the Web application against malware attacks via the tampered Web asset.
Since the proposed approach is agentless, i.e., it does not require agents to be installed on the server(s) of the hosting Web applications/sites, it enables unsupervised self-servicing of attack prevention to provide maximum detection for the Web applications without human intervention. In addition, by automatically and proactively identifying and mitigating attacks via the hosted Web assets, the proposed approach can provide instantaneous protection for the Web applications without delay, which is vital for timing-critical Web applications.
In the example of
In the example of
In the example of
In the example of
In the example of
In the example of
In the example of
The flowchart 200 of the example of
The flowchart 200 of the example of
The flowchart 200 of the example of
One embodiment may be implemented using a conventional general purpose or a specialized digital computer or microprocessor(s) programmed according to the teachings of the present disclosure, as will be apparent to those skilled in the computer art. Appropriate software coding can readily be prepared by skilled programmers based on the teachings of the present disclosure, as will be apparent to those skilled in the software art. The invention may also be implemented by the preparation of integrated circuits or by interconnecting an appropriate network of conventional component circuits, as will be readily apparent to those skilled in the art.
The methods and system described herein may be at least partially embodied in the form of computer-implemented processes and apparatus for practicing those processes. The disclosed methods may also be at least partially embodied in the form of tangible, non-transitory machine readable storage media encoded with computer program code. The media may include, for example, RAMs, ROMs, CD-ROMs, DVD-ROMs, BD-ROMs, hard disk drives, flash memories, or any other non-transitory machine-readable storage medium, wherein, when the computer program code is loaded into and executed by a computer, the computer becomes an apparatus for practicing the method. The methods may also be at least partially embodied in the form of a computer into which computer program code is loaded and/or executed, such that, the computer becomes a special purpose computer for practicing the methods. When implemented on a general-purpose processor, the computer program code segments configure the processor to create specific logic circuits. The methods may alternatively be at least partially embodied in a digital signal processor formed of application specific integrated circuits for performing the methods.
The foregoing description of various embodiments of the claimed subject matter has been provided for the purposes of illustration and description. It is not intended to be exhaustive or to limit the claimed subject matter to the precise forms disclosed. Many modifications and variations will be apparent to the practitioner skilled in the art. Embodiments were chosen and described in order to best describe the principles of the invention and its practical application, thereby enabling others skilled in the relevant art to understand the claimed subject matter, the various embodiments and with various modifications that are suited to the particular use contemplated.
This application claims the benefit of U.S. Provisional Patent Application No. 62/342,152, filed May 26, 2016, and entitled “Method and apparatus for actively identifying and mitigating hosted Web assets against malware attacks,” which is incorporated herein in its entirety by reference.
Number | Name | Date | Kind |
---|---|---|---|
6567918 | Flynn | May 2003 | B1 |
7496960 | Chen | Feb 2009 | B1 |
7841008 | Cole | Nov 2010 | B1 |
7865953 | Hsieh | Jan 2011 | B1 |
8201257 | Andres | Jun 2012 | B1 |
8505094 | Xuewen | Aug 2013 | B1 |
8516590 | Ranadive | Aug 2013 | B1 |
8800040 | Tan | Aug 2014 | B1 |
8898272 | Young | Nov 2014 | B1 |
8984640 | Emigh | Mar 2015 | B1 |
9043894 | Dennison | May 2015 | B1 |
9118714 | Thomson | Aug 2015 | B1 |
9172712 | Sheleheda | Oct 2015 | B2 |
9294498 | Yampolskiy | Mar 2016 | B1 |
9405736 | Davison | Aug 2016 | B1 |
9436838 | Li | Sep 2016 | B2 |
9438613 | Paithane | Sep 2016 | B1 |
9635039 | Islam | Apr 2017 | B1 |
9635041 | Warman | Apr 2017 | B1 |
9912718 | Lepeska | Mar 2018 | B1 |
9922191 | Grafi | Mar 2018 | B1 |
10057279 | Balduzzi | Aug 2018 | B1 |
10079876 | Chung | Sep 2018 | B1 |
10104113 | Stein | Oct 2018 | B1 |
20020095567 | Royer | Jul 2002 | A1 |
20020095605 | Royer | Jul 2002 | A1 |
20020133697 | Royer | Sep 2002 | A1 |
20020135612 | Royer | Sep 2002 | A1 |
20050028104 | Apparao | Feb 2005 | A1 |
20050172130 | Roberts | Aug 2005 | A1 |
20050187934 | Motsinger | Aug 2005 | A1 |
20050188079 | Motsinger | Aug 2005 | A1 |
20050188080 | Motsinger | Aug 2005 | A1 |
20050188222 | Motsinger | Aug 2005 | A1 |
20050198099 | Motsinger | Sep 2005 | A1 |
20060015722 | Rowan | Jan 2006 | A1 |
20060101120 | Helsper | May 2006 | A1 |
20060272011 | Ide | Nov 2006 | A1 |
20070005367 | DeJean | Jan 2007 | A1 |
20080010368 | Hubbard | Jan 2008 | A1 |
20080010683 | Baddour | Jan 2008 | A1 |
20080133540 | Hubbard | Jun 2008 | A1 |
20090248696 | Rowles | Oct 2009 | A1 |
20090249482 | Sarathy | Oct 2009 | A1 |
20090249484 | Howard | Oct 2009 | A1 |
20090300045 | Chaudhry | Dec 2009 | A1 |
20090328142 | Wang | Dec 2009 | A1 |
20100083380 | Harris | Apr 2010 | A1 |
20100100743 | Ali | Apr 2010 | A1 |
20100128918 | MacWan | May 2010 | A1 |
20100229159 | Odaira | Sep 2010 | A1 |
20110040769 | Tseng | Feb 2011 | A1 |
20110185436 | Koulinitch | Jul 2011 | A1 |
20110219448 | Sreedharan | Sep 2011 | A1 |
20110289582 | Kejriwal | Nov 2011 | A1 |
20110321160 | Mohandas | Dec 2011 | A1 |
20120011588 | Milener | Jan 2012 | A1 |
20120023579 | Zaitsev | Jan 2012 | A1 |
20120124664 | Stein | May 2012 | A1 |
20120185859 | Kashiwaya | Jul 2012 | A1 |
20120227112 | Capasso | Sep 2012 | A1 |
20120311707 | Provos | Dec 2012 | A1 |
20120317642 | Royal | Dec 2012 | A1 |
20130055369 | Kumar | Feb 2013 | A1 |
20130067577 | Turbin | Mar 2013 | A1 |
20130074188 | Giakouminakis | Mar 2013 | A1 |
20130074191 | Ben-Reuven | Mar 2013 | A1 |
20130097706 | Titonis | Apr 2013 | A1 |
20130117854 | Britton | May 2013 | A1 |
20130205361 | Narayanaswamy | Aug 2013 | A1 |
20130227636 | Bettini | Aug 2013 | A1 |
20130227683 | Bettini | Aug 2013 | A1 |
20130311906 | Mackin | Nov 2013 | A1 |
20130326620 | Merza | Dec 2013 | A1 |
20130347094 | Bettini | Dec 2013 | A1 |
20140041029 | Zhou | Feb 2014 | A1 |
20140059649 | Hu | Feb 2014 | A1 |
20140075564 | Singla | Mar 2014 | A1 |
20140082726 | Dreller | Mar 2014 | A1 |
20140173730 | Bejerasco | Jun 2014 | A1 |
20140173739 | Ahuja | Jun 2014 | A1 |
20140189069 | Gero | Jul 2014 | A1 |
20140310807 | Qi | Oct 2014 | A1 |
20140325662 | Foster | Oct 2014 | A1 |
20140366143 | Sandler | Dec 2014 | A1 |
20150012383 | Touboul | Jan 2015 | A1 |
20150033342 | Zhang | Jan 2015 | A1 |
20150066575 | Baikalov | Mar 2015 | A1 |
20150067839 | Wardman | Mar 2015 | A1 |
20150096023 | Mesdaq | Apr 2015 | A1 |
20150237068 | Sandke | Aug 2015 | A1 |
20150261951 | Abuelsaad | Sep 2015 | A1 |
20150261955 | Huang | Sep 2015 | A1 |
20150326572 | Oyman | Nov 2015 | A1 |
20150350205 | Oyman | Dec 2015 | A1 |
20160036795 | Lietz | Feb 2016 | A1 |
20160036816 | Srinivasan | Feb 2016 | A1 |
20160036833 | Ardeli | Feb 2016 | A1 |
20160088015 | Sivan | Mar 2016 | A1 |
20160112440 | Kolton | Apr 2016 | A1 |
20160125185 | Wang | May 2016 | A1 |
20160164915 | Cook | Jun 2016 | A1 |
20160173509 | Ray | Jun 2016 | A1 |
20160173510 | Harris | Jun 2016 | A1 |
20160173525 | Thomas | Jun 2016 | A1 |
20160248785 | Petry | Aug 2016 | A1 |
20160269433 | Jiang | Sep 2016 | A1 |
20160277194 | Sun | Sep 2016 | A1 |
20160285914 | Singh | Sep 2016 | A1 |
20160294851 | Langton | Oct 2016 | A1 |
20160337379 | Godlewski | Nov 2016 | A1 |
20160364567 | Akiyama | Dec 2016 | A1 |
20160381058 | Antony | Dec 2016 | A1 |
20170063920 | Thomas | Mar 2017 | A1 |
20170070460 | Bejerasco | Mar 2017 | A1 |
20170180413 | Petry | Jun 2017 | A1 |
20170223024 | Desai | Aug 2017 | A1 |
20170279831 | Di Pietro | Sep 2017 | A1 |
20180013789 | Damian | Jan 2018 | A1 |
20180077120 | Baughman | Mar 2018 | A1 |
20180097822 | Huang | Apr 2018 | A1 |
20180109498 | Singh | Apr 2018 | A1 |
20180115463 | Sinha | Apr 2018 | A1 |
20180124110 | Hunt | May 2018 | A1 |
20180191765 | Cho | Jul 2018 | A1 |
20190014087 | Robinson | Jan 2019 | A1 |
20190075130 | Petry | Mar 2019 | A1 |
20190165997 | Shaikh | May 2019 | A1 |
20190166013 | Shaikh | May 2019 | A1 |
20190166037 | Shaikh | May 2019 | A1 |
20190173750 | Shaikh | Jun 2019 | A1 |
Entry |
---|
M. Fire, R. Goldschmidt and Y. Elovici, “Online Social Networks: Threats and Solutions,” in IEEE Communications Surveys & Tutorials, vol. 16, No. 4, pp. 2019-2036, Fourthquarter 2014. |
Number | Date | Country | |
---|---|---|---|
20170344743 A1 | Nov 2017 | US |
Number | Date | Country | |
---|---|---|---|
62342152 | May 2016 | US |