The present invention generally relates to information security and more particularly to the protection of websites and website users against malware, attack, information theft, and other online threats.
Websites and website users are subject to an increasing array of online threats. Some seek to steal sensitive or confidential information, while others attempt to disrupt the normal operation of a site. Among the many kinds of threats are Distributed Denial of Service (DDoS) attacks, which generate a load to an origin database or application server and may be coordinated with existing botnet command and control systems. Other threats include URL enumeration or Predictable Resource Location attacks, which spider a site to harvest sensitive information embedded in the URL structure, such as catalog part numbers or flight numbers, application server session identifiers, user names or other resources. In some cases, if a site allows username or other sensitive information to be specified in a URL and returns a different response for valid and invalid inputs, an attacker can guess at valid values and harvest information.
Moreover, another security threat has emerged over the past few years that is causing some websites to suffer significant data and financial losses, particularly in the financial service industry. This type of malware attacks browsers by means of Trojan horses. They typically leverage a software plug-in that watches for known URLs and then taking action, such as recording keystrokes or transferring funds from a victim's bank account.
This relatively recent breed of malware can modify a transaction on-the-fly, i.e., as it is formed in the end user's web browser, and still display the user's intended transaction. Structurally, these attacks are referred to as a “man-in-the-middle” (or “man-in-the-browser”, MITB) attack as they live between the user and the security mechanisms of the user's web browser. As noted, such a Trojan operates by infecting the end user's computer and installing a new (malicious) browser extension. The malicious browser extension sets up a page handler that activates on a web page load and looks at the URL of the loaded web page. If the URL is on the list of web pages being targeted by the malware, then the browser extension “wakes up,” intercepts the data that is typed in by the end user, and potentially modifies the data that is sent from the browser to the web server.
Distinct from phishing attacks, which rely upon similar but fraudulent websites, these new attacks often cannot be detected by the user, as they are using real services, the user is correctly logged-in as normal, and there is no difference to be seen.
Such MITB attacks typically target financial institutions and especially business-to-business (B2B) banking, often focusing on money transfer transactions. One variant of the Zeus malware actually changes the destination banking address for money transfers as they are sent from the browser to the bank server while still displaying the desired transfer bank address to the end user in the browser. The impact of these attacks is significant enough that some banks have begun to deploy client software to their customers to attempt to address the problem.
Unfortunately, these are but a few examples of online threats facing today's website operators and users. Moreover, the threat landscape is always evolving, with new breeds of malware and destructive techniques emerging with some frequency.
In the face of this threat landscape, a variety of systems may be used to deliver Internet content to an end user. One approach is to use a distributed computer system such as a “content delivery network” or “CDN” that is operated and managed by a service provider. The service provider typically provides the content delivery service on behalf of third party customers. A “distributed system” of this type typically refers to a collection of autonomous computers linked by a network or networks, together with the software, systems, protocols and techniques designed to facilitate various services, such as website content delivery or the support of outsourced site infrastructure. Typically, such content delivery involves to the storage, caching, or transmission of content, streaming media and applications on behalf of content providers, including ancillary technologies used therewith including, without limitation, DNS query handling, provisioning, data monitoring and reporting, content targeting, personalization, and business intelligence.
In light of the foregoing, there is a need to defend and protect websites, website operators, and website users against an increasingly sophisticated and wide array of online threats. There is further a need to design content delivery systems, including without limitation CDNs, to address these threats. The present invention addresses these needs and other needs that will become apparent in view of this disclosure.
An approach referred to herein as URL obfuscation or, alternatively, web application obfuscation (WAO), can provide the ability to protect specific URLs or groups of URLs, as indicated by content providers, from attack. Although the specifics of the implementations may vary, in an exemplary case, this approach operates by detecting when a protected URL passes through a web proxy, for example as a link in a web page. The web proxy (which may be, e.g., a content server in a CDN) replaces that URL with another URL that contains an obfuscated value. Subsequent requests from the client browser back to proxy for the obfuscated URL are then translated back into the original URL format, and the proxy goes forward to an internal cache or to an origin server to request content at the protected URL. In this way, the protected URL is not visible to the client. This means that an attack becomes difficult if not impossible to target or automate for a protected URL. Further, the obfuscation functionality may be configured such that each client session sees a different random URL in place of the protected URL, further frustrating attempts to automate attacks or conduct reconnaissance against a site.
In short, by obscuring an origin URL as it is passed from an origin server to an end user browser, an attack surface of the origin server can be changed, mitigating replay and other attacks.
Periodically changing the surface of attack (e.g., the URL being returned to a client for a given web request) makes it more difficult for an attacker to, among other things, a) successfully reconnoiter a targeted site, and b) launch sustained application layer attacks such as DDoS (Distributed Denial of Service) attacks. (Hence, the name web application obfuscation.) The obfuscation approach may be applied to both highly dynamic or static web content. Once implemented, the URL links in pages returned to the browser (or other user agent) can be made to change, even when the content rendered in the browser appears the same. Human end users may not notice any changes, but malware will constantly be presented with unique URLs, significantly increasing the difficulty for an attacker to successful deploy a scripted attack.
A CDN, as modified by the teachings of this disclosure, provides a platform from which to implement URL obfuscation. A CDN content server sits in the middle of a communication path between a browser and a server. According to the teachings herein, the CDN can be viewed as a “good guy in the middle,” and that position allows the CDN to defend effectively against an array of attacks.
While a CDN provides an excellent platform from which to implement the teachings of this invention, the teachings herein are not limited to CDNs. Thus, in other aspects of the invention, a proxy server that is not in a CDN and that is modified with the teachings hereof may be placed downstream of a server or set of servers that provide content to requesting clients, e.g., effectively acting as a gateway. The content provider may operate both the proxy and the origin server(s). The proxy server obscures URLs as described herein, protecting the website and its users. Furthermore, in other aspects of the invention, an origin server itself may be modified in accordance with the teachings hereof by running a URL obfuscation process in conjunction with underlying web server functionality. In short, any content server may be used to implement the URL obfuscation techniques described herein, regardless of whether such content server is part of a CDN or operates as a proxy server.
In light of the foregoing, a variety of methods, systems, and apparatus for obscuring URLs are described throughout this disclosure. By way of illustration only, in one non-limiting aspect of the invention, a method operative at a content server involves receiving a request for content from a client, where the content includes a given URL. The content could be an HTML page with an embedded URL, for example. The method further includes replacing this first URL (also referred to as the “original URL”) with a second, different URL that includes an encrypted string that the client cannot decrypt (also referred to as the “alternate URL”), so as to prevent the client from determining the original URL. Conventional encryption techniques can be used in this process; typically, the encryption is associated with an encryption key that the web server does not provide to the client. The encrypted string might represent, for example, an encrypted version of part or all of the original URL, although this is not necessary. The content, with the alternate URL, is sent to the client in response to the request.
The end user may make request for the content located at the alternate URL. If so, the content server receives a second request for content that is associated with the alternate URL, e.g., it may be an HTTP Get request for content identified by the alternate URL. The content server decrypts the encrypted string in the alternate URL, recovering the original URL. The original URL can be used to retrieve the content, either from internal cache or from an origin server.
The alternate URL is typically created by modifying the original URL, for example, by replacing pathname or other part of the original URL with the encrypted string. The encrypted string may be generated by encrypting that part of the original URL, or the entire original URL, or some other part of it, etc. In the majority of cases, the alternate URL will include the same protocol and hostname as the original URL, with some or all of the pathname having been replaced/obscured with the encrypted string.
In some implementations, the alternate URL may be valid to obtain content only for a limited period of time, such as a for a client session, or a configurable numerical time period. Requests associated with the alternate URL after expiry of the limited period of time may represent suspicious activity, leading the server to raise an alarm, log the event, ignore the request, or take other appropriate action, rather than serve the requested content.
As suggested above, a content server in a CDN is advantageously used to implement the foregoing method. While the key used to decrypt the alternate URL may not be available to the client, other content servers in the CDN can be equipped with the necessary keys to decrypt the alternate URL, in the event that the request for the alternate URL is directed to a content server other than the one that originally served the alternate URL.
In another aspect of the invention, an exemplary method involves a content server receiving a request for content (such as a web page) from a client, where the requested content including a URL (a first URL) that identifies content on an origin server. The content server obtains the content from the origin server, and replaces the first URL with a second, alternate URL. The alternate URL is invalid to obtain given content from the origin server. In other words, the origin server may return a ‘content not found’ or other error, or may ignore a request directed to the alternate URL, or may serve a redirect to a landing page or validation page like a login page. If the client requests content using the alternate URL, the content server can translate it back to the first URL in order to obtain the requested content (from internal cache or from an origin server, for instance).
As mentioned previously, the alternate URL may be encrypted, and may be valid for limited times, and so on.
In another aspect of the invention, a method of protecting a website involves receiving information that indicates a URL that is to be protected from attack/malware. Such configuration information may be submitted via a customer content provider portal and transmitted to web servers in a configuration file, which may be XML-based or utilize another syntax. A given content server protects the protected URL (a first URL) by rewriting it with a second, different URL (thus creating an alternate URL) that includes an encrypted string that the client cannot decrypt, so as to prevent the client from determining the protected URL. This may be done once a client requests content that includes the protected URL (i.e., at the time it needs to be sent to the client), or beforehand. As noted, the content server may need to retrieve the requested content from an origin server—in which case, the URL modification may be done at that retrieval time.
Further, the content server may receive a request from a client associated with the protected URL (that is, rather than the alternate URL)—which may indicate a suspicious request. If so, the content server can generate an alarm, log an alert, ignore the request, flag the request as suspicious, or take another configurable action.
In yet another aspect of the invention, a content server may periodically change URLs that it gives out and/or for which it will respond with the requested content. For example, the content server generally responds to requests made to a given first URL by sending the resource identified by that URL. However, after a certain event occurs, the server treats this first URL as invalid for obtaining content—perhaps returning an error like an HTTP 404 error, ignoring the request, serving a redirect to a landing page or validation page like a login page. Any of a wide range of events might trigger this behavior, including for example the end of a client session, the expiration of an amount of time as configured by a content owner, a change in client identity, a detection of a security threat (e.g., represented by the client's actions or otherwise) that is directed against the first URL or based on a pattern of client requests. For an implementation leveraging a CDN, content provider customers of the CDN can specify the triggering event via a customer portal on a content provider by content provider, site by site, or even a URL by URL basis.
As the first URL is treated as invalid, the content server instead responds to client requests made to second, different URL. This second URL refers to the same resource as the prior URL but it is different from the prior URL.
The event that triggers the content server to treat the first URL as invalid can be a configurable option. For example, as noted above, the content server may be a content server in a CDN that delivers content on behalf of participating content providers. In such an implementation, a given content provider may be able to specify the particular event that will trigger expiry of its URLs. This configuration information can be incorporated into a metadata configuration file that is transmitted to the content server and which the content server applies when responding to a given client request.
While the foregoing description has focused on exemplary methods for illustrative purposes, those skilled in the art will understand that various computer system and computer apparatus can be specifically adapted into special-purpose machines and used to implement the teachings disclosed herein.
The invention will be more fully understood from the following detailed description taken in conjunction with the accompanying drawings, in which:
The following description sets forth embodiments to provide an overall understanding of the principles of the structure, function, manufacture, and use of the methods and apparatus disclosed herein. The methods and apparatus described herein and illustrated in the accompanying drawings are non-limiting examples; the scope of the present invention is defined solely by the claims. The features described or illustrated in connection with one exemplary embodiment may be combined with the features of other embodiments. Such modifications and variations are intended to be included within the scope of the present invention. All patents, publications and references cited herein are expressly incorporated herein by reference in their entirety.
Throughout this disclosure, the term URL is used to refer to uniform resource locators. As those skilled in the art will recognize, a given URL may contain several components, including a protocol (also referred to as a scheme), a hostname, a path (which may include a filename, if the URL is pointing to a particular file/resource rather than a directory), a query (e.g., a query string with query parameters), and a fragment. Thus a model URL may be written as <protocol>://<hostname>/<path><query><fragment>. This model URL is typically referred to as an absolute URL. In some cases, web content may include links using relative URLs, which locate a resource relative to a base location (the base location being the page in which the URL appears). Hence, an exemplary relative URL may omit the protocol and hostname and may include only the path, query, and/or fragment. In this disclosure, the term URL is used to refer to both absolute URLs and relative URLs (i.e., non-fully-qualified URLs).
As a URL may be used with any of a variety of protocols, it follows that the teachings apply not just to websites running HTTP but to the use of URLs in other network content delivery schemes, such as FTP.
Content Delivery Networks
The teachings herein may be implemented in a CDN. In a known system, such as that shown in
More detail about CDN operation can be found in U.S. Pat. Nos. 7,293,093 and 7,693,959, the disclosures of which are incorporated by reference.
As illustrated in
A CDN content server is configured to provide one or more extended content delivery features, preferably on a domain-specific, customer-specific basis, and preferably using configuration files that are distributed to the content servers using a configuration system. A given configuration file preferably is XML-based and includes a set of content handling rules and directives that facilitate one or more advanced content handling features. The configuration file may be delivered to the CDN content server via the data transport mechanism. U.S. Pat. No. 7,111,057 (the disclosure of which is hereby incorporated by reference) illustrates a useful infrastructure for delivering and managing content server content control information, and this and other content server control information can be provisioned by the CDN service provider itself, or (via an extranet or the like) the content provider customer who operates the origin server.
The CDN may include a storage subsystem, such as described in U.S. Pat. No. 7,472,178, the disclosure of which is incorporated herein by reference.
The CDN may operate a server cache hierarchy to provide intermediate caching of customer content; one such cache hierarchy subsystem is described in U.S. Pat. No. 7,376,716, the disclosure of which is incorporated herein by reference.
The CDN may provide secure content delivery among a client browser, edge server and customer origin server in the manner described in U.S. Publication No. 2004/0093419, the disclosure of which is incorporated herein by reference. Secure content delivery as described therein enforces SSL-based links between the client and the content server process, on the one hand, and between the content server process and an origin server process, on the other hand. This enables an SSL-protected web page and/or components thereof to be delivered via the edge server.
URL Obfuscation Overview
Generally, in the embodiment shown in
Turning to
Assume that the request is for an HTML homepage of a website of a CDN customer, e.g., located at http://www.customer.com/. If the content server 302 is configured as a caching server, it may check its cache and if the content is found and not stale (e.g., the TTL has not expired) serve the HTML page from the cache. Otherwise, the content server 302 makes a request to the customer origin server 304 for the content (step 312, shown in dotted line since its occurrence depends on whether the proxy server 304 is able to serve the content from cache).
In step 314, the origin server 304 responds to the content server's request with the HTML page. At this point, assume that the content server 302 detects that the page contains one or more embedded URLs that have been designated as “protected” by the content provider. Such protected URLs might be designated individually or by a partial pathname match, e.g., every URL under www.customer.com/directory/*, where the symbol “*” designates a wildcard operator. The content server 302 replaces part or all of these URLs with a URL containing an obscured value and then serves the modified page to the client 300. For example, the original page may contain a link in clear text, such as http://www.customer.com/directory/login.html, representing that the customer's homepage contains a link to an account login page. That URL is what would appear to the client without obfuscation in place. However, after being modified by the content server 302, that client's request returns an obfuscated URL link, such as http://www.customer.com/Ad5698cB23Tgh9, shown at step 316. Here, the entire pathname, including the object name (login.html) in the URL has been obfuscated with an encrypted string, while the hostname remains in clear-text. In other cases, of course, the obfuscation could be configured such that only some part of the pathname is obfuscated.
Subsequently, the client 300 requests the object at an obfuscated URL (step 318). Upon receiving this request, the content server 302 reverses the encryption to recover the original, clear-text URL, and serves the requested content from cache or retrieves it from the origin server 304, as indicated in steps 320a, 320b, 322, and 324. Preferably, other servers in the CDN would be able to reverse the encryption too were the request for the obfuscated URL made to them, which will be explained in more detail below.
In one embodiment, the obfuscated URL can be tied to the specific user agent session of the client 300 with the content server 302 (e.g., a given client HTTP session). Once that session times out, that obfuscated URL link could change again. The content server 302 would modify the URL for the link to http://www.customer.com/directory/login.html to be http://www.customer.com/fAz3698gh8741Tpm6 and the former obfuscated URL would become invalid for requests. Such a technique makes reconnaissance against the site difficult for an attacker because each request requires a timed session with the content server, and every request could return different obfuscations for the same URL. Further, the URL obfuscation at the content server 302 can also be tied to a timed window.
To illustrate how the session time out and the timed window might be done consider the following example. As illustrated above in
As can be seen from
A content server also might be enabled to detect a client request for a protected URL that has not been obfuscated and provide notice of this request. This feature can be configurable as to how such requests are to be handled. Among the possible options: an error can be returned; the request can be logged for alert or other purpose; the request can still be forwarded by the content server to the origin server, but with a specific additional HTTP header to identify this as a suspicious request; the request can be dropped or redirected to an alternate origin server; a redirect to a given page such as a login page can be delivered; or a specific error page can be served. The origin server can also be configured to respond only to requests from designated servers, which—to continue the foregoing example—may be a set of CDN servers providing the obfuscation service to the origin server customer.
System Level Design
In one embodiment, the mechanism to obfuscate URLs is implemented as salted, time-bounded encryption by proxying content servers. In particular, a content server can include a obfuscation module, which is configured as software module executed by a processor in the server machine. For example, the module may be integrated with or otherwise associated with the proxy 207 shown in the CDN content server of
In this embodiment, the obfuscation system operates on a content server according to the following high level approach.
Turning to
If it is a request for an unprotected entrance page, obtain the page from cache or from the origin server. Deliver the page according to content provider specific (or site specific) metadata rules and according to the process described in connection with
If the request is for a protected URL (under /PREFIX), attempt to reverse the encoding and encryption applied to the URL to recover the original URL. If successful, obtain the page referred to by the URL, and deliver the page accordance with the process described in connection with
If unsuccessful, the content server can record an error and deliver a HTTP 404 Not Found page or a 302 Redirect to the default page. The server can deliver a customized 404 page explaining the error and suggesting an alternative course of action (e.g., to click on one of the entrance pages).
Turning to
If the requested URL refers to a protected page, then for additional protection identity proofing can be leveraged to validate that the user has rights to access sensitive pages on the site. For example, to view a bank account or to search a product database may require a user to login. The identity proof can be extracted from information in a request header (such as a cookie) to establish permission to deliver it to the client. This may be done before the page is parsed to look for protected URLs to encrypt. If the identity is not proven the content server returns a redirect to an authentication URL. The authentication system preferably has resources to defend against a having to deny service to valid users if it is under heavy attack, e.g., by a DDOS attack.
It should be noted that the foregoing assumes that the protected URLs refer to pages (e.g., HTML pages) for convenience of illustration only. However, the protected URLs may in fact reference other types of content and resources, such as images, other multimedia, interactive content, or web applications. For example, in
Content Server Design
Generally, in this embodiment, when a content server receives a request it consults a content-provider-specific metadata configuration file to determine which features to apply to that request. The configuration options can be implemented to allow the proxy server to match requests by URL and apply obfuscation and de-obfuscation features and to determine the setting of variables on a per content-provider/customer basis. The configuration options may specify that only the filename and extension (and optionally a query string) be obscured, or they may instruct the proxy server to obscure the full path, and so on. The encryption algorithm (cipher) and key may be identified by configuration options.
If URL obfuscation is enabled for a given HTML content page, the content server parses the page, identifies the embedded resources that are to be obscured, modifies each one in place using reversible encryption, and emits the resulting page. Resources to be obscured are identified by configuration options, and may include HTML tags like “img src”, “a href”, and so forth.
Presented below is an exemplary obfuscation algorithm which uses symmetric-key encryption and URL encoding to create a valid URL string. A de-obfuscation algorithm reverses the process. Note that a given implementation may not involve every element below.
Exemplary obfuscation algorithm:
E
url=URL_ENCODE(hextime+nonce+special_char+CIPHER(HMAC(KeyCDN,KeyCust+hextime+nonce+hostname),target-url))
Where from right to left the values are:
The exemplary algorithm presented above uses a CDN network key to create an HMAC of the content-provider key, current time, end user nonce, and hostname. The HMAC output is used as a symmetric encryption key for the target-url. The resulting encrypted value (represented in base-64 notation for example) is appended to the clear text hextime and nonce values, with a special character separating the nonce from the cipher output.
It should be noted that while in this embodiment a special character is used to delineate the clear-text from the cipher, a variety of other delineation techniques/mechanisms could be used. For example, a string of characters could be used, or the cipher could be located in a given query string parameter or a URL parameter. The cipher text could also be located at a predetermined location, e.g., as a particular pathname component or directly following the hostname. Virtually any mechanism that allows one to differentiate the cipher from other components of the encoded string (the clear-text components) can be used. Moreover, the use of a specific one of such techniques, selected from amongst several, can itself be a configurable aspect of the system.
Configuration options may also specify how to determine the nonce. Preferably, it is a unique session identifier generated by the server at the time the end-user logs in to the system. As noted above, for example, it is stored in a session cookie or similar value such that URL lifetime is limited to the browser session lifetime. In some implementations, the content server may replace the leftmost nonce value (the one encoded in the URL but in clear text in the Eurl) with an empty string to avoid exposure to the end user of their nonce value. Note that in such an implementation, the nonce value should be consistently presented to the content server in subsequent requests so that the content server can compute the correct HMAC value as a decryption key.
The CDN key is distributed to secure content servers in the network. The key may be given timestamps, lifetimes, and periodically rotated. Using the hextime value that was placed in the URL, a given content server can tell which CDN Key to use for decryption.
The KeyCust key may be specified in the configuration file in clear text or deployed via separate secure infrastructure. Preferably the KeyCust key is a site unique value, although the key could be made to be common across a given customer's sites (i.e., a per-customer key). As with the CDN key, the KeyCust may be given timestamps, lifetimes, and periodically rotated. The hextime value placed in the URL can be used to determine which KeyCust to use for decryption.
Note that the target-url may be an absolute URL or a relative URL. In the latter case, before encoding/encrypting, the relative URL is either converted into an absolute URL by combining it with the resource location information of its parent object (e.g., the HTML page), or it is encoded/encrypted using the relative URL string alone. The former approach avoids the need to parse a client request to a URL that has been resolved by a browser combining an encoded relative URL and a separately encoded base (parent) URL.
Exemplary de-obfuscation algorithm. In this implementation any content server in the CDN can de-obfuscate, taking the following values as input:
Note that in the foregoing approach the de-obfuscation attempt will fail if the hextime is too far in the past, since the CDN key associated with that hextime will have expired. This and session (nonce) rollover together limit obscured URL replay attacks to not only a given user session but also a limited time period, irrespective of the session. The expiration time for the timestamp of the hextime can be a configuration option. The expiration time affects the end user experience on a web site since it will cause requests to fail when an obscured URL is too old.
Continuing the current example, de-obfuscation uses a URL_DECODE function, the symmetric opposite of URL_ENCODE described above, and a TAIL operator that returns the substring of the Eurl following the “special_char” special character in the decoded string. The TAIL substring returns the encrypted portion of the URL above. Taking these as input the target-url can be computed as follows:
target-url=URL_DECODE(CIPHER(HMAC(KeyCDN,KeyCust+hextime+nonce+hostname),TAIL(Eurl)))
Once decoded the target-url and obscured URL are both held in memory for use in content server match rules, which may drive other CDN functionality and behavior. The Eurl is also available for matching using a match selector.
Note that the nonce computation method cannot be changed without affecting current URLs; a change to the method requires browser sessions to be renewed.
Configuration Management
A variety of system features are configurable. Configuration options can be transmitted to a CDN by a given content provider through a configuration portal application provided by the CDN. Customer provided and other (internal) configuration options can be set using metadata distributed to content servers. The options use the capability of matching on a request URL by hostname, path, filename, extension, and other attributes. Within the match context, obfuscation can be enabled for text/html objects. The parameters are also specified in configuration elements. The following provides some example elements.
For more information about configuration and delivering metadata options and rules, see e.g., U.S. Pat. Nos. 7,240,100 and 7,111,057, the disclosures of which are hereby incorporated by reference in their entireties.
Attack Evolution
Attacks on web sites will continue to evolve. In further embodiments, other kinds of attacks can be addressed by modifying and obscuring form field names, object classes (such as in HTML div tags), and the page DOM tree structure. For example, the content server proxy (or associated software) may dynamically alter POST field names to obscure the desired information sought by malware. This technique is advantageous for defending against an attacker who tries to access the Document Object Module (DOM) tree in order to tell if a POST has the parameter they are interested in.
Even if an attacker is able to spider through a site, URL obfuscation can be implemented on the site such that an attack must enter at designated entrance pages and traverse obscured URLs in a particular request sequence, since the target URL is unpredictable otherwise. This provides an opportunity to differentiate human request behavior from that of a spider or bot (e.g., via behavioral analytics that examine information such as the sequence of URLs requested, the time between URL requests, patterns in URL requests, and so on) and layer in further identity proofing or other defensive maneuvers.
Furthermore, in some embodiments, the rewriting/encrypting of URLs can be accompanied by the deployment of decoys into pages as hidden links. They would not be visible to normal end users but bots may follow them. As with the results of behavioral analytics, requests for decoy objects can identify user agents or devices that are accessing content they should not be accessing. The system can then automatically raise alerts and potentially quarantine the bad user agent.
Exemplary Applications
The teachings herein can be used in a variety of circumstances and to address a range of security threats. Several example use cases are presented below to illustrate their value and flexibility. They should not be viewed as limiting or necessary to the practice of the subject matter disclosed herein.
DDoS Attacks. Fixed-URL distributed denial of service (DDoS) attacks generate load to an origin database or application server. These attacks may be coordinated with existing botnet command and control systems. URL obfuscation techniques can address these attacks by ensuring only recently-generated URLs are allowed to access origin infrastructure. Requests for other URLs may be discarded or dealt with by the content server. Because the content server can be part of a CDN or other distributed network of servers that is scaled to handle these increased loads, such attacks can be mitigated.
MITB Attacks. URL obfuscation techniques also can address Man-in-the-Browser (MITB) attacks that leverage a software plug-in that watch for known URLs and then take action, such as transferring funds from a victim's bank account, or recording keystrokes. A content server modified in accordance with this disclosure can defend against such attacks.
URL obfuscation can protect specific URLs, as identified by content providers, from being targeted by an MITB attack. The capability detects when a protected URL passes through the proxy server, and rewrite that URL with an obfuscated value. Subsequent requests from the browser back to proxy for the obfuscated URL are then translated back into the original URL format, and the content server goes forward to origin requesting the protected URL. In this way, the protected URL is not visible to the browser and thus also is not visible to the man-in-the-browser. This means that an MITB attack is not triggered for the protected URL, because the protected URL is not seen in the browser. Further, each browser session may see a different random URL in place of the protected URL, hindering attempts to automate such, as there is no pattern that can be matched by the malicious browser extension. In short, by obscuring the target URL and periodically changing it, the malware plug-in can be prevented from recognizing the target pages (e.g., bank account pages, streaming multimedia endpoints, web service endpoints, or otherwise).
URL enumeration or predictable resource location attacks. URL obfuscation may be used to address enumeration or predictable resource location attacks that spider a site to harvest sensitive information embedded in the URL structure, such as catalog part numbers or flight numbers, application server session identifiers, user names or other resources. If a website allows username or other sensitive information to be specified in a URL and returns a different response for valid and invalid inputs, an attacker may attempt to guess at valid values and harvest information. A URL-obscuring content server, however, can modify URLs to look like random strings, revealing no information about site structure or resources to spiders or other automated user agents, and thus preventing them from obtaining information or conducting reconnaissance against the site.
URL-based attacks. In-URL cross-site scripting, SQL injection or input-validation attacks that allow sensitive information to be conveyed in the URL. This category may include input validation attacks like buffer overflow or canonicalization (e.g., use of “../” in the path to escape the web root). A content server that obscures URLs can defend against these attacks since the only valid URLs are those generated by the content server, under direction of the content provider's origin server. Other URLs, including those that have been manipulated by an attacker, can be rejected. Furthermore, requests made to protected URLs in clear-text that do not originate from a known content server can be rejected at the origin server.
Polymorphism
The periodic changing of the URL name space for a given website can be thought of as a type of URL polymorphism. In addition, some embodiments can utilize polymorphic hostnames to switch hostname (and optionally protection level) for some users. To utilize such a facility:
Polymorphic hostnames used in such an approach are preferably in the same top level domain which is associated with the content provider.
Search Engines
In some embodiments, search engines can be blocked from protected (obscured) URLs, which will be of no use later anyway, because they will expire. A content server can match on search engine User-Agent strings and return a redirect or an error page to prevent indexing for such URLs.
Implementation with Computer Apparatus
The clients, servers, and other devices described herein may be implemented on conventional computer systems, as modified by the teachings hereof, with the functional characteristics described above realized in software, hardware, or a combination thereof.
Software may include one or several discrete programs. Any given function may comprise part of any given module, process, execution thread, or other such programming construct. Generalizing, each function described above may be implemented as computer code, namely, as a set of computer instructions, for performing the functionality described via execution of that code using conventional means, e.g., a processor, a computer, a machine, a system, digital data processing device, or other apparatus. In one embodiment, such software may be implemented in a programming language that runs in conjunction with a DNS-compliant name server (e.g., BIND).
Computer system 600 includes a processor 604 coupled to bus 601. In some systems, multiple processor and/or processor cores may be employed. Computer system 600 further includes a main memory 610, such as a random access memory (RAM) or other storage device, coupled to the bus 601 for storing information and instructions to be executed by processor 604. A read only memory (ROM) 608 is coupled to the bus 601 for storing information and instructions for processor 604. A non-volatile storage device 606, such as a magnetic disk, solid state memory (e.g., flash memory), or optical disk, is provided and coupled to bus 601 for storing information and instructions. Other application-specific integrated circuits (ASICs), field programmable gate arrays (FPGAs) or circuitry may be included in the computer system 600 to perform functions described herein.
A peripheral interface 612 communicatively couples computer system 600 to a user display 614 that displays the output of software executing on the computer system, and an input device 615 (e.g., a keyboard, mouse, trackpad, touchscreen) that communicates user input and instructions to the computer system 600. The peripheral interface 612 may include interface circuitry, control and/or level-shifting logic for local buses such as RS-485, Universal Serial Bus (USB), IEEE 1394, or other communication links.
Computer system 600 is coupled to a communication interface 616 that provides a link (e.g., at a physical layer, data link layer, or otherwise) between the system bus 601 and an external communication link. The communication interface 616 provides a network link 618. The communication interface 616 may represent a Ethernet or other network interface card (NIC), a wireless interface, modem, an optical interface, or other kind of input/output interface.
Network link 618 provides data communication through one or more networks to other devices. Such devices include other computer systems that are part of a local area network (LAN) 626. Furthermore, the network link 618 provides a link, via an internet service provider (ISP) 620, to the Internet 622. In turn, the Internet 622 may provide a link to other computing systems such as a remote server 630 and/or a remote client 631. Network link 618 and such networks may transmit data using packet-switched, circuit-switched, or other data-transmission approaches.
In operation, the computer system 600 may implement the functionality described herein as a result of the processor executing code. Such code is typically read from or provided by a non-transitory computer-readable medium, such as memory 610, ROM 608, or storage device 606. Other forms of non-transitory computer-readable media include disks, tapes, magnetic media, CD-ROMs, optical media, RAM, PROM, EPROM, and EEPROM. Any other non-transitory computer-readable medium may also be employed. Executing code may also be read from network link 618 (e.g., following temporary storage in an interface buffer, local memory, or other circuitry).
This application claims the benefit of priority of U.S. Provisional Application No. 61/392,823, filed Oct. 13, 2010, and of U.S. Provisional Application No. 61/504,812, filed Jul. 6, 2011, the disclosures of both of which are incorporated by reference.
Number | Date | Country | |
---|---|---|---|
61392823 | Oct 2010 | US | |
61504812 | Jul 2011 | US |