• •    

浏览器缓存污染防御策略研究

戴成瑞1,陈伟2   

  1. 1. 江苏省南京市鼓楼区新模范马路66号南京邮电大学
    2. 南京邮电大学
  • 收稿日期:2017-09-04 修回日期:2017-11-06 发布日期:2017-11-06
  • 通讯作者: 陈伟

Research on Defense Strategy against Browser Cache Pollution

,CHEN Wei   

  • Received:2017-09-04 Revised:2017-11-06 Online:2017-11-06
  • Contact: CHEN Wei

摘要: 浏览器缓存主要用于加快用户对网络资源的请求速度,达到一种良好的用户体验,同时也面临着安全威胁,攻击者可以通过中间人攻击等方式实施缓存污染攻击,若用户没有清理浏览器缓存的习惯,这些被污染的资源将会长久的危害用户。无论攻击者采取何种方式,他们的目的都是一致的即污染用户的缓存,为此提出一种可调控的浏览器缓存污染防御策略,这种策略处于用户与服务器之间,不关注用户是否被污染,或者说攻击者使用何种方法进行浏览器缓存污染,对用户所请求的资源进行随机数判断、请求相应延时判断、资源代表性判断、哈希验证和众包策略。最后利用中间人攻击的方式模拟缓存污染攻击实验100条污染样本和100条正常样本,结果表明,在松弛条件下,污染样本的命中率达到87%,正常样本误判率为0%;而在严格条件下,污染样本的命中率达到95%,正常样本误判率为4%。该策略简化了缓存污染攻击防御的流程并可以通过不同的参数在用户体验性和安全性中取得平衡。

关键词: Web安全, 缓存污染防御, 中间人攻击, 用户行为, 用户体验

Abstract: Browser cache is mainly used to speed up the request procession of network resources in order to achieve good user experience. But it also faces security threats. Attackers can implement cache pollution attack via man-in-the-middle attacks. The polluted resource will be stay in user’s cache for a long time if they do not used to clean the cache. Regardless of the way in which the attacker takes, the purpose is to pollute the user’s browser cache. We propose a controllable browser cache pollution defense strategy which is deployed between the client and the server. The strategy does not focus on whether user’s cache is contaminated or not. It includes three types of judgement: random number, request-response delay and the popularity of resource. It also includes hash verification and crowdsourcing strategy. Finally we take simulation experiments via man-in-the-middle attack to pollute 100 samples which compare with 100 normal samples by the defense strategy. The result indicates that the hit-rate of polluted resource is 87% and the false positive rate of normal samples is 0% under loose conditions. While the former decreases to 95% and the latter decreases to 4% under strict conditions. The strategy simplifies the process of cache pollution prevention. It also makes tradeoff between the security and usability with different parameters to satisfy different users.

Key words: Keywords: Web Security, Cache Defense Strategy, Man-In-The-Middle Attack, User Behavior, User Experience

中图分类号: