ARC: Protecting against HTTP parameter pollution attacks using application request caches

0Citations
Citations of this article
31Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

HTTP Parameter Pollution (HPP) vulnerabilities allow attackers to exploit web applications by manipulating the query parameters of the requested URLs. In this paper, we present Application Request Cache (ARC), a framework for protecting web applications against HPP exploitation. ARC hosts all benign URL schemas, which act as generators of the complete functional set of URLs that compose the application's logic. For each incoming request, ARC exports the URL, extracts the associated schema, and searches for it in the set of already known benign schemas. In case the schema is not found, the request is rejected, and the event is recorded. ARC can be transparently integrated with existing web applications without any modifications to the server and client code. It is implemented in Google's Go language and uses efficient data structures for storing the URL schemas, imposing negligible computational overhead on the web application server. When running on a 4-core Linux server, ARC can process hundreds of thousands of URL requests per second. A typical URL resolution is in the scale of microseconds. © 2012 Springer-Verlag.

Author supplied keywords

Cite

CITATION STYLE

APA

Athanasopoulos, E., Kemerlis, V. P., Polychronakis, M., & Markatos, E. P. (2012). ARC: Protecting against HTTP parameter pollution attacks using application request caches. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7341 LNCS, pp. 400–417). https://doi.org/10.1007/978-3-642-31284-7_24

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free